/* * Copyright (c) 2024 Beijing University of Posts and Telecommunications. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */
{ "month":"2025-09", "release_time":"", "vulnerabilities":[ { "month":"2025-09", "vul_id":{ "cve":"CVE-2025-37959", "openharmony-sa":" " }, "severity":"medium", "vul_description":{ "zh":"bpf_redirect_peer在跨网络命名空间重定向数据包时缺少必要的skb清理操作,导致XFRM解密状态等扩展信息在命名空间间泄露,引发目标命名空间中的XFRM策略检查异常。", "en":"bpf_redirect_peer lacks necessary skb scrubbing when redirecting packets across network namespaces, causing leakage of extension information such as XFRM decryption state between namespaces and triggering XFRM policy check anomalies in the target namespace." },
"vul_impact":{ "zh":"该漏洞破坏网络命名空间隔离性,可能导致加密通信数据包被错误丢弃,影响基于BPF重定向的容器网络功能的正常运行。", "en":"This vulnerability breaks network namespace isolation, potentially causing encrypted communication packets to be incorrectly dropped, affecting the normal operation of BPF-based container networking features." },