Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 826-850 di 2375 risultati
Pagina 34 di 95

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-37907 accel/ivpu: Fix locking order in ivpu_job_submit08-01-2026826
MSRC Security UpdateCVE-2023-52586 drm/msm/dpu: Add mutex lock in control vblank irq08-01-2026827
MSRC Security UpdateCVE-2024-42065 drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init08-01-2026828
MSRC Security UpdateCVE-2024-36024 drm/amd/display: Disable idle reallow as part of command/gpint execution08-01-2026829
MSRC Security UpdateCVE-2024-42081 drm/xe/xe_devcoredump: Check NULL before assignments08-01-2026830
MSRC Security UpdateCVE-2025-21696 mm: clear uffd-wp PTE/PMD state on mremap()08-01-2026831
MSRC Security UpdateCVE-2024-26914 drm/amd/display: fix incorrect mpc_combine array size08-01-2026832
MSRC Security UpdateCVE-2025-1149 GNU Binutils ld xmalloc.c xstrdup memory leak08-01-2026833
MSRC Security UpdateCVE-2024-42066 drm/xe: Fix potential integer overflow in page size calculation08-01-2026834
MSRC Security UpdateCVE-2025-1152 GNU Binutils ld xstrdup.c xstrdup memory leak08-01-2026835
MSRC Security UpdateCVE-2025-1151 GNU Binutils ld xmemdup.c xmemdup memory leak08-01-2026836
MSRC Security UpdateCVE-2024-42064 drm/amd/display: Skip pipe if the pipe idx not set properly08-01-2026837
MSRC Security UpdateCVE-2024-58006 PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar()08-01-2026838
MSRC Security UpdateCVE-2025-21682 eth: bnxt: always recalculate features after XDP clearing, fix null-deref08-01-2026839
MSRC Security UpdateCVE-2025-37822 riscv: uprobes: Add missing fence.i after building the XOL buffer08-01-2026840
MSRC Security UpdateCVE-2025-37882 usb: xhci: Fix isochronous Ring Underrun/Overrun event handling08-01-2026841
MSRC Security UpdateCVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.08-01-2026842
MSRC Security UpdateCVE-2025-37856 btrfs: harden block_group::bg_list against list_del() races08-01-2026843
MSRC Security UpdateCVE-2025-37807 bpf: Fix kmemleak warning for percpu hashmap08-01-2026844
MSRC Security UpdateCVE-2024-23848 In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.08-01-2026845
Unit42Securing Vibe Coding Tools: Scaling Productivity Without Scaling Risk08-01-2026846
MSRC Security UpdateCVE-2025-1744 Out-of-bounds Write in radare208-01-2026847
MSRC Security UpdateCVE-2025-68766 irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()08-01-2026848
MSRC Security UpdateCVE-2025-68753 ALSA: firewire-motu: add bounds check in put_user loop for DSP events08-01-2026849
MSRC Security UpdateCVE-2025-15284 arrayLimit bypass in bracket notation allows DoS via memory exhaustion08-01-2026850
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter