Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 2026-2050 di 2375 risultati
Pagina 82 di 95

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-39905 net: phylink: add lock for serializing concurrent pl->phydev writes with resolver07-12-20252026
MSRC Security UpdateCVE-2024-42064 drm/amd/display: Skip pipe if the pipe idx not set properly07-12-20252027
MSRC Security UpdateCVE-2025-37745 PM: hibernate: Avoid deadlock in hibernate_compressor_param_set()07-12-20252028
MSRC Security UpdateCVE-2025-39901 i40e: remove read access to debugfs files07-12-20252029
MSRC Security UpdateCVE-2025-10158 Rsync: Out of bounds array access via negative index07-12-20252030
MSRC Security UpdateCVE-2025-21885 RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers07-12-20252031
MSRC Security UpdateCVE-2025-39927 ceph: fix race condition validating r_parent before applying state07-12-20252032
MSRC Security UpdateCVE-2024-57872 scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove()07-12-20252033
MSRC Security UpdateCVE-2025-37945 net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-controlled PHY07-12-20252034
MSRC Security UpdateCVE-2024-57804 scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs07-12-20252035
MSRC Security UpdateCVE-2025-55560 An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor.07-12-20252036
MSRC Security UpdateCVE-2018-7159 The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete.07-12-20252037
MSRC Security UpdateCVE-2025-21892 RDMA/mlx5: Fix the recovery flow of the UMR QP07-12-20252038
MSRC Security UpdateCVE-2025-46152 In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument.07-12-20252039
MSRC Security UpdateCVE-2024-35794 dm-raid: really frozen sync_thread during suspend07-12-20252040
MSRC Security UpdateCVE-2025-12748 Libvirt: denial of service in xml parsing07-12-20252041
MSRC Security UpdateCVE-2025-10911 Libxslt: use-after-free with key data stored cross-rvt07-12-20252042
MSRC Security UpdateCVE-2024-56782 ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration()07-12-20252043
MSRC Security UpdateCVE-2025-21985 drm/amd/display: Fix out-of-bound accesses07-12-20252044
MSRC Security UpdateCVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.07-12-20252045
MSRC Security UpdateCVE-2024-56775 drm/amd/display: Fix handling of plane refcount07-12-20252046
MSRC Security UpdateCVE-2025-40202 ipmi: Rework user message limit handling07-12-20252047
MSRC Security UpdateCVE-2025-21732 RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error07-12-20252048
MSRC Security UpdateCVE-2025-58354 Kata Containers coco-tdx malicious host can circumvent initdata verification07-12-20252049
MSRC Security UpdateCVE-2024-25740 A memory leak flaw was found in the UBI driver in drivers/mtd/ubi/attach.c in the Linux kernel through 6.7.4 for UBI_IOCATT, because kobj->name is not released.07-12-20252050
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter