Количество 18 769
Количество 18 769
CVE-2025-7395
Domain Name Validation Bypass with Apple Native Certificate Validation
CVE-2025-7394
In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report.
CVE-2025-7345
Gdk‑pixbuf: heap‑buffer‑overflow in gdk‑pixbuf
CVE-2025-7339
on-headers vulnerable to http response header manipulation
CVE-2025-7207
mruby nregs codegen.c scope_new heap-based overflow
CVE-2025-7069
HDF5 H5FSsection.c H5FS__sect_link_size heap-based overflow
CVE-2025-7068
HDF5 H5FL.c H5FL__malloc memory leak
CVE-2025-7067
HDF5 H5FScache.c H5FS__sinfo_serialize_node_cb heap-based overflow
CVE-2025-7039
Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()
CVE-2025-6965
Integer Truncation on SQLite
CVE-2025-69277
libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group.
CVE-2025-68973
In GnuPG through 2.4.8, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)
CVE-2025-68972
In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.
CVE-2025-68766
irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()
CVE-2025-68765
mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()
CVE-2025-68764
NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags
CVE-2025-68763
crypto: starfive - Correctly handle return of sg_nents_for_len
CVE-2025-68759
wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()
CVE-2025-68758
backlight: led-bl: Add devlink to supplier LEDs
CVE-2025-68757
drm/vgem-fence: Fix potential deadlock on release
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-7395 Domain Name Validation Bypass with Apple Native Certificate Validation | 0% Низкий | 5 месяцев назад | ||
CVE-2025-7394 In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report. | 0% Низкий | 5 месяцев назад | ||
CVE-2025-7345 Gdk‑pixbuf: heap‑buffer‑overflow in gdk‑pixbuf | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад | |
CVE-2025-7339 on-headers vulnerable to http response header manipulation | 0% Низкий | 5 месяцев назад | ||
CVE-2025-7207 mruby nregs codegen.c scope_new heap-based overflow | 0% Низкий | 5 месяцев назад | ||
CVE-2025-7069 HDF5 H5FSsection.c H5FS__sect_link_size heap-based overflow | 0% Низкий | 5 месяцев назад | ||
CVE-2025-7068 HDF5 H5FL.c H5FL__malloc memory leak | CVSS3: 3.3 | 0% Низкий | 5 месяцев назад | |
CVE-2025-7067 HDF5 H5FScache.c H5FS__sinfo_serialize_node_cb heap-based overflow | CVSS3: 3.3 | 0% Низкий | 5 месяцев назад | |
CVE-2025-7039 Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file() | CVSS3: 3.7 | 0% Низкий | 5 месяцев назад | |
CVE-2025-6965 Integer Truncation on SQLite | CVSS3: 9.8 | 0% Низкий | 6 месяцев назад | |
CVE-2025-69277 libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. | 0% Низкий | около 1 месяца назад | ||
CVE-2025-68973 In GnuPG through 2.4.8, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.) | CVSS3: 7.8 | 0% Низкий | около 1 месяца назад | |
CVE-2025-68972 In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line. | CVSS3: 5.9 | 0% Низкий | около 1 месяца назад | |
CVE-2025-68766 irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() | 0% Низкий | около 1 месяца назад | ||
CVE-2025-68765 mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() | 0% Низкий | около 1 месяца назад | ||
CVE-2025-68764 NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags | 0% Низкий | около 1 месяца назад | ||
CVE-2025-68763 crypto: starfive - Correctly handle return of sg_nents_for_len | 0% Низкий | около 1 месяца назад | ||
CVE-2025-68759 wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() | 0% Низкий | около 1 месяца назад | ||
CVE-2025-68758 backlight: led-bl: Add devlink to supplier LEDs | 0% Низкий | около 1 месяца назад | ||
CVE-2025-68757 drm/vgem-fence: Fix potential deadlock on release | 0% Низкий | около 1 месяца назад |
Уязвимостей на страницу