Количество 24
Количество 24
ELSA-2025-7433
ELSA-2025-7433: nodejs:22 security update (IMPORTANT)
ELSA-2025-4459
ELSA-2025-4459: nodejs:22 security update (IMPORTANT)
CVE-2025-31498
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.
CVE-2025-31498
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.
CVE-2025-31498
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.
CVE-2025-31498
c-ares has a use-after-free in read_answers()
CVE-2025-31498
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4 ...
CVE-2025-3277
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
CVE-2025-3277
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
CVE-2025-3277
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
CVE-2025-3277
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
CVE-2025-3277
An integer overflow can be triggered in SQLite\u2019s `concat_ws()` fu ...
ELSA-2025-7502
ELSA-2025-7502: nodejs22 security update (MODERATE)
ELSA-2025-7426
ELSA-2025-7426: nodejs:20 security update (MODERATE)
ELSA-2025-4461
ELSA-2025-4461: nodejs:20 security update (MODERATE)
BDU:2025-04858
Уязвимость библиотеки асинхронных DNS-запросов C-ares, связанная с возможностью использования памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
RLSA-2025:7517
Important: sqlite security update
GHSA-g2ph-wvc2-ph4v
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
ELSA-2025-7517
ELSA-2025-7517: sqlite security update (IMPORTANT)
SUSE-SU-2025:1456-1
Security update for sqlite3
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2025-7433 ELSA-2025-7433: nodejs:22 security update (IMPORTANT) | 6 месяцев назад | |||
ELSA-2025-4459 ELSA-2025-4459: nodejs:22 security update (IMPORTANT) | 6 месяцев назад | |||
CVE-2025-31498 c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5. | 0% Низкий | 7 месяцев назад | ||
CVE-2025-31498 c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5. | CVSS3: 7 | 0% Низкий | 7 месяцев назад | |
CVE-2025-31498 c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5. | 0% Низкий | 7 месяцев назад | ||
CVE-2025-31498 c-ares has a use-after-free in read_answers() | 0% Низкий | 7 месяцев назад | ||
CVE-2025-31498 c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4 ... | 0% Низкий | 7 месяцев назад | ||
CVE-2025-3277 An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | 7 месяцев назад | |
CVE-2025-3277 An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution. | CVSS3: 7.3 | 0% Низкий | 7 месяцев назад | |
CVE-2025-3277 An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | 7 месяцев назад | |
CVE-2025-3277 An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution. | 0% Низкий | 2 месяца назад | ||
CVE-2025-3277 An integer overflow can be triggered in SQLite\u2019s `concat_ws()` fu ... | CVSS3: 9.8 | 0% Низкий | 7 месяцев назад | |
ELSA-2025-7502 ELSA-2025-7502: nodejs22 security update (MODERATE) | 4 месяца назад | |||
ELSA-2025-7426 ELSA-2025-7426: nodejs:20 security update (MODERATE) | 6 месяцев назад | |||
ELSA-2025-4461 ELSA-2025-4461: nodejs:20 security update (MODERATE) | 6 месяцев назад | |||
BDU:2025-04858 Уязвимость библиотеки асинхронных DNS-запросов C-ares, связанная с возможностью использования памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7 | 0% Низкий | 7 месяцев назад | |
RLSA-2025:7517 Important: sqlite security update | 0% Низкий | около 1 месяца назад | ||
GHSA-g2ph-wvc2-ph4v An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | 7 месяцев назад | |
ELSA-2025-7517 ELSA-2025-7517: sqlite security update (IMPORTANT) | 4 месяца назад | |||
SUSE-SU-2025:1456-1 Security update for sqlite3 | 6 месяцев назад |
Уязвимостей на страницу