Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 1726-1750 di 3902 risultati
Pagina 70 di 157

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2024-35869 smb: client: guarantee refcounted children from parent session18-02-20261726
MSRC Security UpdateCVE-2022-49108 clk: mediatek: Fix memory leaks on probe18-02-20261727
MSRC Security UpdateCVE-2025-68362 wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()18-02-20261728
MSRC Security UpdateCVE-2025-38225 media: imx-jpeg: Cleanup after an allocation error18-02-20261729
MSRC Security UpdateCVE-2025-37792 Bluetooth: btrtl: Prevent potential NULL dereference18-02-20261730
MSRC Security UpdateCVE-2025-6021 Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml218-02-20261731
MSRC Security UpdateCVE-2024-57892 ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv18-02-20261732
MSRC Security UpdateCVE-2024-49890 drm/amd/pm: ensure the fw_info is not null before using it18-02-20261733
MSRC Security UpdateCVE-2024-26986 drm/amdkfd: Fix memory leak in create_process failure18-02-20261734
MSRC Security UpdateCVE-2025-7394 In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report.18-02-20261735
MSRC Security UpdateCVE-2024-35843 iommu/vt-d: Use device rbtree in iopf reporting path18-02-20261736
MSRC Security UpdateCVE-2024-2511 Unbounded memory growth with session handling in TLSv1.318-02-20261737
MSRC Security UpdateCVE-2023-47100 In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.18-02-20261738
MSRC Security UpdateCVE-2025-21791 vrf: use RCU protection in l3mdev_l3_out()18-02-20261739
MSRC Security UpdateCVE-2024-4603 Excessive time spent checking DSA keys and parameters18-02-20261740
MSRC Security UpdateCVE-2025-37781 i2c: cros-ec-tunnel: defer probe if parent EC is not present18-02-20261741
MSRC Security UpdateCVE-2025-68354 regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex18-02-20261742
MSRC Security UpdateCVE-2025-38218 f2fs: fix to do sanity check on sit_bitmap_size18-02-20261743
MSRC Security UpdateCVE-2024-57801 net/mlx5e: Skip restore TC rules for vport rep without loaded flag18-02-20261744
MSRC Security UpdateCVE-2024-49892 drm/amd/display: Initialize get_bytes_per_element's default to 118-02-20261745
MSRC Security UpdateCVE-2023-31486 HTTP::Tiny before 0.083 a Perl core module since 5.13.9 and available standalone on CPAN has an insecure default TLS configuration where users must opt in to verify certificates.18-02-20261746
MSRC Security UpdateCVE-2025-38352 posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()18-02-20261747
MSRC Security UpdateCVE-2023-51780 An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.18-02-20261748
MSRC Security UpdateCVE-2025-37930 drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()18-02-20261749
MSRC Security UpdateCVE-2025-68349 NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid18-02-20261750
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter