| CVE-2025-59681 |
An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() are subject to SQL injection in column aliases, when using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to these methods (on MySQL and MariaDB). |
Important |
python-django |
是 |
完成修复 |
2025-11-10 |
2026-01-04 |
| CVE-2025-58183 |
tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations. |
Moderate |
grafana, weldr-client, go-toolset:an8, skopeo, container-tools:an8, osbuild-composer, golang |
是 |
完成修复 |
2025-11-10 |
2025-12-11 |
| CVE-2025-57833 |
An issue was discovered in Django 4.2 before 4.2.24, 5.1 before 5.1.12, and 5.2 before 5.2.6. FilteredRelation is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed QuerySet.annotate() or QuerySet.alias(). |
Important |
python-django |
是 |
完成修复 |
2025-11-10 |
2026-01-04 |
| CVE-2025-57803 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-28 and 7.1.2-2 for ImageMagick's 32-bit build, a 32-bit integer overflow in the BMP encoder’s scanline-stride computation collapses bytes_per_line (stride) to a tiny value while the per-row writer still emits 3 × width bytes for 24-bpp images. The row base pointer advances using the (overflowed) stride, so the first row immediately writes past its slot and into adjacent heap memory with attacker-controlled bytes. This is a classic, powerful primitive for heap corruption in common auto-convert pipelines. This issue has been patched in versions 6.9.13-28 and 7.1.2-2. |
Important |
ImageMagick |
否 |
完成修复 |
2025-11-10 |
2025-12-29 |
| CVE-2025-57052 |
cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters. |
Important |
cjson |
是 |
完成修复 |
2025-11-10 |
2025-12-29 |
| CVE-2025-55298 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to ImageMagick versions 6.9.13-28 and 7.1.2-2, a format string bug vulnerability exists in InterpretImageFilename function where user input is directly passed to FormatLocaleString without proper sanitization. An attacker can overwrite arbitrary memory regions, enabling a wide range of attacks from heap overflow to remote code execution. This issue has been patched in versions 6.9.13-28 and 7.1.2-2. |
Important |
ImageMagick |
否 |
完成修复 |
2025-11-10 |
2025-12-29 |
| CVE-2025-55154 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-27 and 7.1.2-1, the magnified size calculations in ReadOneMNGIMage (in coders/png.c) are unsafe and can overflow, leading to memory corruption. This issue has been patched in versions 6.9.13-27 and 7.1.2-1. |
Important |
ImageMagick |
否 |
完成修复 |
2025-11-10 |
2025-12-29 |
| CVE-2025-54989 |
Firebird is a relational database. Prior to versions 3.0.13, 4.0.6, and 5.0.3, there is an XDR message parsing NULL pointer dereference denial-of-service vulnerability in Firebird. This specific flaw exists within the parsing of xdr message from client. It leads to NULL pointer dereference and DoS. This issue has been patched in versions 3.0.13, 4.0.6, and 5.0.3. |
Important |
firebird |
否 |
完成修复 |
2025-11-10 |
2025-12-29 |
| CVE-2025-40108 |
In the Linux kernel, the following vulnerability has been resolved:\n\nserial: qcom-geni: Fix blocked task\n\nRevert commit 1afa70632c39 ("serial: qcom-geni: Enable PM runtime for\nserial driver") and its dependent commit 86fa39dd6fb7 ("serial:\nqcom-geni: Enable Serial on SA8255p Qualcomm platforms") because the\nfirst one causes regression - hang task on Qualcomm RB1 board (QRB2210)\nand unable to use serial at all during normal boot:\n\n INFO: task kworker/u16:0:12 blocked for more than 42 seconds.\n Not tainted 6.17.0-rc1-00004-g53e760d89498 #9\n "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.\n task:kworker/u16:0 state:D stack:0 pid:12 tgid:12 ppid:2 task_flags:0x4208060 flags:0x00000010\n Workqueue: async async_run_entry_fn\n Call trace:\n __switch_to+0xe8/0x1a0 (T)\n __schedule+0x290/0x7c0\n schedule+0x34/0x118\n rpm_resume+0x14c/0x66c\n rpm_resume+0x2a4/0x66c\n rpm_resume+0x2a4/0x66c\n rpm_resume+0x2a4/0x66c\n __pm_runtime_resume+0x50/0x9c\n __driver_probe_device+0x58/0x120\n driver_probe_device+0x3c/0x154\n __driver_attach_async_helper+0x4c/0xc0\n async_run_entry_fn+0x34/0xe0\n process_one_work+0x148/0x290\n worker_thread+0x2c4/0x3e0\n kthread+0x118/0x1c0\n ret_from_fork+0x10/0x20\n\nThe issue was reported on 12th of August and was ignored by author of\ncommits introducing issue for two weeks. Only after complaining author\nproduced a fix which did not work, so if original commits cannot be\nreliably fixed for 5 weeks, they obviously are buggy and need to be\ndropped. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10, kernel:4.18 |
否 |
完成修复 |
2025-11-10 |
2026-01-25 |
| CVE-2025-31133 |
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3. |
Important |
container-tools:4.0, container-tools:2.0, runc, container-tools:3.0, container-tools:an8, container-tools:1.0 |
否 |
完成修复 |
2025-11-10 |
2025-12-29 |
| CVE-2025-25474 |
DCMTK v3.6.9+ DEV was discovered to contain a buffer overflow via the component /dcmimgle/diinpxt.h. |
Important |
dcmtk |
是 |
完成修复 |
2025-11-10 |
2025-12-29 |
| CVE-2025-25472 |
A buffer overflow in DCMTK git master v3.6.9+ DEV allows attackers to cause a Denial of Service (DoS) via a crafted DCM file. |
Important |
dcmtk |
是 |
完成修复 |
2025-11-10 |
2025-12-29 |
| CVE-2025-22921 |
FFmpeg git-master,N-113007-g8d24a28d06 was discovered to contain a segmentation violation via the component /libavcodec/jpeg2000dec.c. |
Moderate |
ffmpeg |
是 |
完成修复 |
2025-11-10 |
2025-12-06 |
| CVE-2025-12863 |
A flaw was found in the xmlSetTreeDoc() function of the libxml2 XML parsing library. This function is responsible for updating document pointers when XML nodes are moved between documents. Due to improper handling of namespace references, a namespace pointer may remain linked to a freed memory region when the original document is destroyed. As a result, subsequent operations that access the namespace can lead to a use-after-free condition, causing an application crash. |
Important |
libxml2 |
否 |
完成修复 |
2025-11-10 |
2026-01-04 |
| CVE-2025-11230 |
A flaw was found in haproxy. A stemming from an inefficient algorithmic complexity issue within its bundled mjson parsing library. This vulnerability is triggered when haproxy is configured to analyze JSON content, such as with the json_query or jwt_payload_query function |
Important |
haproxy |
否 |
完成修复 |
2025-11-10 |
2025-12-29 |
| CVE-2023-53154 |
parse_string in cJSON before 1.7.18 has a heap-based buffer over-read via {"1":1, with no trailing newline if cJSON_ParseWithLength is called. |
Low |
cjson |
否 |
完成修复 |
2025-11-10 |
2026-01-22 |
| CVE-2023-49060 |
An attacker could have accessed internal pages or data by ex-filtrating a security key from ReaderMode via the `referrerpolicy` attribute. This vulnerability affects Firefox for iOS < 120. |
Critical |
firefox |
否 |
完成修复 |
2025-11-07 |
2026-01-04 |
| CVE-2025-61723 |
The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs. |
Moderate |
golang, git-lfs, osbuild-composer, grafana-pcp, weldr-client, grafana |
是 |
完成修复 |
2025-11-03 |
2025-12-11 |
| CVE-2025-59682 |
An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory. |
Important |
python-django |
是 |
完成修复 |
2025-11-03 |
2026-01-04 |
| CVE-2025-58185 |
No description is available for this CVE. |
Moderate |
golang, git-lfs, osbuild-composer, grafana-pcp, weldr-client, grafana |
是 |
完成修复 |
2025-11-03 |
2025-12-11 |
| CVE-2025-40101 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-11-03 |
2026-02-02 |
| CVE-2025-40098 |
In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-11-03 |
2026-02-02 |
| CVE-2025-40091 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-11-03 |
2025-12-08 |
| CVE-2025-40090 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-11-03 |
2026-01-06 |
| CVE-2025-40089 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-11-03 |
2026-02-02 |
| CVE-2025-40086 |
In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don't allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08) |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-11-03 |
2026-01-25 |
| CVE-2025-12464 |
A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service. |
Moderate |
qemu |
是 |
完成修复 |
2025-11-03 |
2025-12-18 |
| CVE-2025-58189 |
When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped. |
Moderate |
golang, git-lfs, osbuild-composer, grafana-pcp, weldr-client, grafana |
是 |
完成修复 |
2025-10-31 |
2025-12-11 |
| CVE-2025-40104 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-31 |
2026-01-04 |
| CVE-2025-40102 |
In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn't been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would've been\nthrown away by the eventual reset of the vCPU's state. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-31 |
2025-12-08 |
| CVE-2023-7324 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-30 |
2026-02-02 |
| CVE-2025-40082 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40081 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-01-07 |
| CVE-2025-40080 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2025-12-31 |
| CVE-2025-40079 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-01-07 |
| CVE-2025-40076 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40075 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-01-04 |
| CVE-2025-40074 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-10-29 |
2025-12-30 |
| CVE-2025-40073 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40072 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40071 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2025-12-23 |
| CVE-2025-40070 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40069 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40067 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40066 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40065 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-01-31 |
| CVE-2025-40064 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-10-29 |
2025-12-23 |
| CVE-2025-40063 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40062 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40061 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2025-12-23 |
| CVE-2025-40059 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40058 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40047 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40046 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40045 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40041 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40038 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-01-31 |
| CVE-2025-40037 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40034 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40031 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40029 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2025-12-11 |
| CVE-2025-40028 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-02-02 |
| CVE-2025-40026 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-29 |
2026-01-31 |
| CVE-2025-8677 |
Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion.\nThis issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. |
Important |
bind9.16, bind |
否 |
完成修复 |
2025-10-28 |
2026-01-06 |
| CVE-2025-55752 |
Relative Path Traversal vulnerability in Apache Tomcat.\n\nThe fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.\n\n\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.\nUsers are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue. |
Important |
tomcat, pki-deps:10.6, log4j:2 |
是 |
完成修复 |
2025-10-28 |
2025-12-30 |
| CVE-2025-40780 |
A vulnerability was found in BIND resolvers caused by a weakness in the Pseudo Random Number Generator (PRNG). This weakness allows an attacker to potentially predict the source port and query ID used by BIND, enabling cache poisoning attacks. If successful, the attacker can inject malicious DNS responses into the resolver’s cache, causing clients to receive spoofed DNS data. Authoritative servers are generally unaffected, but recursive resolvers are exposed to this risk. Exploitation is remote and does not require user interaction. |
Important |
bind9.16, bind |
否 |
完成修复 |
2025-10-28 |
2026-01-04 |
| CVE-2025-40778 |
Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache.\nThis issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. |
Important |
bind9.16, bind |
否 |
完成修复 |
2025-10-28 |
2026-01-04 |
| CVE-2025-12198 |
A heap-based buffer overflow vulnerability in dnsmasq within the parse_hex() function of src/util.c. When parsing malformed DHCP option values in configuration files, dnsmasq miscalculates the output length and writes beyond the allocated heap buffer. This can cause a crash (Denial of Service) and, in some cases, memory corruption that may enable arbitrary code execution. The flaw is triggered during configuration parsing, so an attacker who can supply or modify the dnsmasq configuration file could exploit it. |
Important |
dnsmasq |
否 |
完成修复 |
2025-10-28 |
2026-01-04 |
| CVE-2025-61748 |
No description is available for this CVE. |
Moderate |
java-1.8.0-openjdk, java-17-openjdk, java-21-openjdk |
否 |
完成修复 |
2025-10-27 |
2025-12-05 |
| CVE-2025-53066 |
No description is available for this CVE. |
Moderate |
java-11-openjdk, java-1.8.0-openjdk, java-17-openjdk, java-21-openjdk |
否 |
完成修复 |
2025-10-27 |
2025-12-05 |
| CVE-2025-53057 |
No description is available for this CVE. |
Moderate |
java-11-openjdk, java-1.8.0-openjdk, java-17-openjdk, java-21-openjdk |
否 |
完成修复 |
2025-10-27 |
2025-12-05 |
| CVE-2025-40023 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-02-02 |
| CVE-2025-40022 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-02-02 |
| CVE-2025-40020 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2025-12-31 |
| CVE-2025-40018 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2025-12-23 |
| CVE-2023-53733 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-02-02 |
| CVE-2023-53703 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-02-02 |
| CVE-2023-53702 |
No description is available for this CVE. |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-01-25 |
| CVE-2023-53701 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-10-27 |
2026-01-23 |
| CVE-2023-53694 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-02-02 |
| CVE-2022-50573 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-02-02 |
| CVE-2022-50565 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-02-02 |
| CVE-2022-50559 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-02-02 |
| CVE-2022-50557 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-27 |
2026-02-02 |
| CVE-2025-39702 |
In the Linux kernel, the following vulnerability has been resolved:\nipv6: sr: Fix MAC comparison to be constant-time\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-24 |
2025-12-31 |
| CVE-2025-21839 |
In the Linux kernel, the following vulnerability has been resolved:\nKVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop\nMove the conditional loading of hardware DR6 with the guest's DR6 value\nout of the core .vcpu_run() loop to fix a bug where KVM can load hardware\nwith a stale vcpu->arch.dr6.\nWhen the guest accesses a DR and host userspace isn't debugging the guest,\nKVM disables DR interception and loads the guest's values into hardware on\nVM-Enter and saves them on VM-Exit. This allows the guest to access DRs\nat will, e.g. so that a sequence of DR accesses to configure a breakpoint\nonly generates one VM-Exit.\nFor DR0-DR3, the logic/behavior is identical between VMX and SVM, and also\nidentical between KVM_DEBUGREG_BP_ENABLED (userspace debugging the guest)\nand KVM_DEBUGREG_WONT_EXIT (guest using DRs), and so KVM handles loading\nDR0-DR3 in common code, _outside_ of the core kvm_x86_ops.vcpu_run() loop.\nBut for DR6, the guest's value doesn't need to be loaded into hardware for\nKVM_DEBUGREG_BP_ENABLED, and SVM provides a dedicated VMCB field whereas\nVMX requires software to manually load the guest value, and so loading the\nguest's value into DR6 is handled by {svm,vmx}_vcpu_run(), i.e. is done\n_inside_ the core run loop.\nUnfortunately, saving the guest values on VM-Exit is initiated by common\nx86, again outside of the core run loop. If the guest modifies DR6 (in\nhardware, when DR interception is disabled), and then the next VM-Exit is\na fastpath VM-Exit, KVM will reload hardware DR6 with vcpu->arch.dr6 and\nclobber the guest's actual value.\nThe bug shows up primarily with nested VMX because KVM handles the VMX\npreemption timer in the fastpath, and the window between hardware DR6\nbeing modified (in guest context) and DR6 being read by guest software is\norders of magnitude larger in a nested setup. E.g. in non-nested, the\nVMX preemption timer would need to fire precisely between #DB injection\nand the #DB handler's read of DR6, whereas with a KVM-on-KVM setup, the\nwindow where hardware DR6 is "dirty" extends all the way from L1 writing\nDR6 to VMRESUME (in L1).\nL1's view:\n==========\n\nCPU 0/KVM-7289 [023] d.... 2925.640961: kvm_entry: vcpu 0\nA: L1 Writes DR6\nCPU 0/KVM-7289 [023] d.... 2925.640963: : Set DRs, DR6 = 0xffff0ff1\nB: CPU 0/KVM-7289 [023] d.... 2925.640967: kvm_exit: vcpu 0 reason EXTERNAL_INTERRUPT intr_info 0x800000ec\nD: L1 reads DR6, arch.dr6 = 0\nCPU 0/KVM-7289 [023] d.... 2925.640969: : Sync DRs, DR6 = 0xffff0ff0\nCPU 0/KVM-7289 [023] d.... 2925.640976: kvm_entry: vcpu 0\nL2 reads DR6, L1 disables DR interception\nCPU 0/KVM-7289 [023] d.... 2925.640980: kvm_exit: vcpu 0 reason DR_ACCESS info1 0x0000000000000216\nCPU 0/KVM-7289 [023] d.... 2925.640983: kvm_entry: vcpu 0\nCPU 0/KVM-7289 [023] d.... 2925.640983: : Set DRs, DR6 = 0xffff0ff0\nL2 detects failure\nCPU 0/KVM-7289 [023] d.... 2925.640987: kvm_exit: vcpu 0 reason HLT\nL1 reads DR6 (confirms failure)\nCPU 0/KVM-7289 [023] d.... 2925.640990: : Sync DRs, DR6 = 0xffff0ff0\nL0's view:\n==========\nL2 reads DR6, arch.dr6 = 0\nCPU 23/KVM-5046 [001] d.... 3410.005610: kvm_exit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216\nCPU 23/KVM-5046 [001] ..... 3410.005610: kvm_nested_vmexit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216\nL2 => L1 nested VM-Exit\nCPU 23/KVM-5046 [001] ..... 3410.005610: kvm_nested_vmexit_inject: reason: DR_ACCESS ext_inf1: 0x0000000000000216\nCPU 23/KVM-5046 [001] d.... 3410.005610: kvm_entry: vcpu 23\nCPU 23/KVM-5046 [001] d.... 3410.005611: kvm_exit: vcpu 23 reason VMREAD\nCPU 23/KVM-5046 [001] d.... 3410.005611: kvm_entry: vcpu 23\nCPU 23/KVM-5046 [001] d.... 3410.\n---truncated--- |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-24 |
2025-12-19 |
| CVE-2025-21816 |
In the Linux kernel, the following vulnerability has been resolved:\nhrtimers: Force migrate away hrtimers queued after CPUHP_AP_HRTIMERS_DYING\nhrtimers are migrated away from the dying CPU to any online target at\nthe CPUHP_AP_HRTIMERS_DYING stage in order not to delay bandwidth timers\nhandling tasks involved in the CPU hotplug forward progress.\nHowever wakeups can still be performed by the outgoing CPU after\nCPUHP_AP_HRTIMERS_DYING. Those can result again in bandwidth timers being\narmed. Depending on several considerations (crystal ball power management\nbased election, earliest timer already enqueued, timer migration enabled or\nnot), the target may eventually be the current CPU even if offline. If that\nhappens, the timer is eventually ignored.\nThe most notable example is RCU which had to deal with each and every of\nthose wake-ups by deferring them to an online CPU, along with related\nworkarounds:\n_ e787644caf76 (rcu: Defer RCU kthreads wakeup when CPU is dying)\n_ 9139f93209d1 (rcu/nocb: Fix RT throttling hrtimer armed from offline CPU)\n_ f7345ccc62a4 (rcu/nocb: Fix rcuog wake-up from offline softirq)\nThe problem isn't confined to RCU though as the stop machine kthread\n(which runs CPUHP_AP_HRTIMERS_DYING) reports its completion at the end\nof its work through cpu_stop_signal_done() and performs a wake up that\neventually arms the deadline server timer:\nWARNING: CPU: 94 PID: 588 at kernel/time/hrtimer.c:1086 hrtimer_start_range_ns+0x289/0x2d0\nCPU: 94 UID: 0 PID: 588 Comm: migration/94 Not tainted\nStopper: multi_cpu_stop+0x0/0x120 <- stop_machine_cpuslocked+0x66/0xc0\nRIP: 0010:hrtimer_start_range_ns+0x289/0x2d0\nCall Trace:\n\nstart_dl_timer\nenqueue_dl_entity\ndl_server_start\nenqueue_task_fair\nenqueue_task\nttwu_do_activate\ntry_to_wake_up\ncomplete\ncpu_stopper_thread\nInstead of providing yet another bandaid to work around the situation, fix\nit in the hrtimers infrastructure instead: always migrate away a timer to\nan online target whenever it is enqueued from an offline CPU.\nThis will also allow to revert all the above RCU disgraceful hacks. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-24 |
2026-02-02 |
| CVE-2025-1215 |
A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component. |
Important |
vim |
是 |
完成修复 |
2025-10-24 |
2026-01-04 |
| CVE-2023-53732 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2026-02-02 |
| CVE-2023-53731 |
No description is available for this CVE. |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2026-01-25 |
| CVE-2023-53730 |
No description is available for this CVE. |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2026-01-25 |
| CVE-2023-53729 |
No description is available for this CVE. |
Important |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2025-12-05 |
| CVE-2023-53728 |
No description is available for this CVE. |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2026-01-25 |
| CVE-2023-53727 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2026-02-02 |
| CVE-2023-53726 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2026-02-02 |
| CVE-2023-53725 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2026-02-02 |
| CVE-2023-53724 |
No description is available for this CVE. |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2026-01-25 |
| CVE-2023-53723 |
No description is available for this CVE. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-10-23 |
2026-02-02 |