Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 451-475 di 4351 risultati
Pagina 19 di 175

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2026-23216 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()28-02-2026451
MSRC Security UpdateCVE-2025-68358 btrfs: fix racy bitfield write in btrfs_clear_space_info_full()28-02-2026452
MSRC Security UpdateCVE-2025-68725 bpf: Do not let BPF test infra emit invalid GSO types to stack28-02-2026453
MSRC Security UpdateCVE-2025-68223 drm/radeon: delete radeon_fence_process in is_signaled, no deadlock28-02-2026454
MSRC Security UpdateCVE-2025-40164 usbnet: Fix using smp_processor_id() in preemptible code warnings28-02-2026455
MSRC Security UpdateCVE-2025-40005 spi: cadence-quadspi: Implement refcount to handle unbind during busy28-02-2026456
MSRC Security UpdateCVE-2025-38162 netfilter: nft_set_pipapo: prevent overflow in lookup table allocation28-02-2026457
MSRC Security UpdateCVE-2026-28364 In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.28-02-2026458
MSRC Security UpdateCVE-2025-40082 hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()28-02-2026459
MSRC Security UpdateCVE-2026-22999 net/sched: sch_qfq: do not free existing class in qfq_change_class()28-02-2026460
MSRC Security UpdateCVE-2026-22998 nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec28-02-2026461
MSRC Security UpdateCVE-2026-22997 net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts28-02-2026462
MSRC Security UpdateCVE-2026-22996 net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv28-02-2026463
MSRC Security UpdateCVE-2026-22992 libceph: return the handler error from mon_handle_auth_done()28-02-2026464
MSRC Security UpdateCVE-2026-22991 libceph: make free_choose_arg_map() resilient to partial allocation28-02-2026465
MSRC Security UpdateCVE-2026-22990 libceph: replace overzealous BUG_ON in osdmap_apply_incremental()28-02-2026466
MSRC Security UpdateCVE-2026-22984 libceph: prevent potential out-of-bounds reads in handle_auth_done()28-02-2026467
MSRC Security UpdateCVE-2026-22982 net: mscc: ocelot: Fix crash when adding interface under a lag28-02-2026468
MSRC Security UpdateCVE-2026-22980 nfsd: provide locking for v4_end_grace28-02-2026469
MSRC Security UpdateCVE-2026-22979 net: fix memory leak in skb_segment_list for GRO packets28-02-2026470
MSRC Security UpdateCVE-2026-22978 wifi: avoid kernel-infoleak from struct iw_point28-02-2026471
MSRC Security UpdateCVE-2026-22977 net: sock: fix hardened usercopy panic in sock_recv_errqueue28-02-2026472
MSRC Security UpdateCVE-2026-22976 net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset28-02-2026473
MSRC Security UpdateCVE-2025-71163 dmaengine: idxd: fix device leaks on compat bind and unbind28-02-2026474
MSRC Security UpdateCVE-2025-71162 dmaengine: tegra-adma: Fix use-after-free28-02-2026475
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter