24h | 7d | 30d

Overview

  • Linux
  • Linux

12 Nov 2025
Published
01 Dec 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() The cpufreq_cpu_put() call in update_qos_request() takes place too early because the latter subsequently calls freq_qos_update_request() that indirectly accesses the policy object in question through the QoS request object passed to it. Fortunately, update_qos_request() is called under intel_pstate_driver_lock, so this issue does not matter for changing the intel_pstate operation mode, but it theoretically can cause a crash to occur on CPU device hot removal (which currently can only happen in virt, but it is formally supported nevertheless). Address this issue by modifying update_qos_request() to drop the reference to the policy later.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture
CVE-2025-40194 cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() scq.ms/3YdSiG0 #MicrosoftSecurity #cybersecurity
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Linux
  • Linux

06 Dec 2025
Published
06 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: exfat: fix improper check of dentry.stream.valid_size We found an infinite loop bug in the exFAT file system that can lead to a Denial-of-Service (DoS) condition. When a dentry in an exFAT filesystem is malformed, the following system calls — SYS_openat, SYS_ftruncate, and SYS_pwrite64 — can cause the kernel to hang. Root cause analysis shows that the size validation code in exfat_find() does not check whether dentry.stream.valid_size is negative. As a result, the system calls mentioned above can succeed and eventually trigger the DoS issue. This patch adds a check for negative dentry.stream.valid_size to prevent this vulnerability.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture
CVE-2025-40287 exfat: fix improper check of dentry.stream/.valid_size scq.ms/3Yf8abj #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Pending

24 Sep 2014
Published
22 Oct 2025
Updated

CVSS
Pending
EPSS
94.22%

Description

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture
ShellShock (CVE-2014-6271) analysis: Last month, we saw a notable resurgence in exploitation attempts, with 900+ attempts. This highlights the ongoing risks posed by legacy vulnerabilities. View the full ShellShock breakdown: go.f5.net/6axv05yx
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Apache Software Foundation
  • Apache Tika PDF parser module
  • org.apache.tika:tika-parser-pdf-module

20 Aug 2025
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a dependency in several Tika packages including at least: tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc and tika-server-standard. Users are recommended to upgrade to version 3.2.2, which fixes this issue.

Statistics

  • 1 Post
  • 29 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture

On Apache Tika vulnerability CVE-2025-66516

- The fix was released in August.

- It's the same vulnerability as CVE-2025-54988 from August, they just issued a new CVE (which they probably shouldn't have) as they filed the scope wrong.

- It doesn't provide RCE. You can read local files with it as the Java user, e.g. /etc/passwd.

- Exploitation requires knowing a specific endpoint which processes PDFs to be vulnerable (so exploitation would be tailored).

It's not one to panic over.

  • 7
  • 22
  • 0
  • 4h ago

Overview

  • Apache Software Foundation
  • Apache Tika core
  • org.apache.tika:tika-core

04 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.

Statistics

  • 1 Post
  • 29 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture

On Apache Tika vulnerability CVE-2025-66516

- The fix was released in August.

- It's the same vulnerability as CVE-2025-54988 from August, they just issued a new CVE (which they probably shouldn't have) as they filed the scope wrong.

- It doesn't provide RCE. You can read local files with it as the Java user, e.g. /etc/passwd.

- Exploitation requires knowing a specific endpoint which processes PDFs to be vulnerable (so exploitation would be tailored).

It's not one to panic over.

  • 7
  • 22
  • 0
  • 4h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

09 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
4.17%

Description

Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Statistics

  • 2 Posts

Last activity: 2 hours ago

Fediverse

Profile picture

This Week in Security: Hornet, Gogs, and Blinkenlights

Microsoft has published a patch-set for the Linux kernel, proposing the Hornet Linux Security Module (LSM). If you haven’t been keeping up with the kernel contributor scoreboard, Microsoft is #11 at time of writing and that might surprise you. The reality is that Microsoft’s biggest source of revenue is their cloud offering, and Azure is over half Linux, so Microsoft really is incentivized to make Linux better.

The Hornet LSM is all about more secure eBPF programs, which requires another aside: What is eBPF? First implemented in the Berkeley Packet Filter, it’s a virtual machine in the kernel, that allows executing programs in kernel space. It was quickly realized that this ability to run a script in kernel space was useful for far more than just filtering packets, and the extended Berkeley Packet Filter was born. eBPF is now used for load balancing, system auditing, security and intrusion detection, and lots more.

This unique ability to load scripts from user space into kernel space has made eBPF useful for malware and spyware applications, too. There is already a signature scheme to restrict eBPF programs, but Hornet allows for stricter checks and auditing. The patch is considered a Request For Comments (RFC), and points out that this existing protection may be subject to Time Of Check / Time Of Use (TOCTOU) attacks. It remains to be seen whether Hornet passes muster and lands in the upstream kernel.

Patch Tuesday


Linux obviously isn’t the only ongoing concern for Microsoft, and it’s the time of month to talk about patch Tuesday. There are 57 fixes that are considered vulnerabilities, and additional changes that are just classified internally as bug fixes. There were three of those vulnerabilities that were publicly known before the fix, and one of those was known to be actively used in attacks in the wild.

CVE-2025-62221 was an escalation of privilege flaw in the Windows Cloud Files Mini Filter Driver. In Windows, a minifilter is a kernel driver that attach to the file system software, to monitor or modify file operations. This flaw was a use-after-free that allowed a lesser-privileged attacker to gain SYSTEM privileges.

Gogs


Researchers at Wiz found an active exploitation campaign that uses CVE-2025-8110, a previously unknown vulnerability in Gogs. The GO Git Service, hence the name, is a self-hosted GitHub/GitLab alternative written in Go. It’s reasonably popular, with 1,400 of them exposed to the Internet.

The vulnerability was a bypass of CVE-2024-55947, a path traversal vulnerability that allowed a malicious user to upload files to arbitrary locations. That was fixed with Gogs 0.13.1, but the fix failed to account for symbolic links (symlinks). Namely, as far as the git protocol is concerned, symlinks are completely legal. The path traversal checking doesn’t check for symlinks during normal git access, so a symlink pointing outside the repository can easily be created. And then the HTTPS file API can be used to upload a file to that symlink, again allowing for arbitrary writes.

The active exploitation on this vulnerability is particularly widespread. Of the 1400 Gogs instances on the Internet, over 700 show signs of compromise, in the form of new repositories with randomized names. It’s possible that even more instances have been compromised, and the signs have been covered. The attack added a symlink to .git/config, and then overwriting that file with a new config that defines the sshCommand setting. After exploitation, a Supershell malware was installed, establishing ongoing remote control.

The most troubling element of this story is that the vulnerability was first discovered in the wild back in July and was reported to the Gogs project at that time. As of December 11, the vulnerability has not been fixed or acknowledged. After five months of exploitation without a patch, it seems time to acknowledge that Gogs is effectively unmaintained. There are a couple of active forks that don’t seem to be vulnerable to this attack; time to migrate.

Blinkenlights


There’s an old story I always considered apocryphal, that data could be extracted from the blinking lights of network equipment, leading to a few ISPs to boast that they covered all their LEDs with tape for security. While there may have been a bit of truth to that idea, it definitely served as inspiration for [Damien Cauquil] at Quarkslab, reverse engineering a very cheap smart watch.

The watches were €11.99 last Christmas, and a price point that cheap tickles the curiosity of nearly any hacker. What’s on the inside? What does the firmware look like? The micro-controller was by the JieLi brand, and it’s a bit obscure, with no good way to pull the firmware back off. With no leads there, [Damien] turned to the Android app and the Bluetooth Low Energy connection. One of the functions of the app is uploading custom watch dials. Which of course had to be tested by creating a custom watch face featuring a certain Rick Astley.

But those custom watch faces have a quirk. The format internally uses byte offsets, and the watch doesn’t check for that offset to be out of bounds. A ridiculous scheme was concocted to abuse this memory leak to push firmware bytes out as pixel data. It took a Raspberry Pi Pico sniffing the SPI bus to actually recover those bytes, but it worked! Quite the epic hack.

Bits and Bytes


Libpng has an out of bounds read vulnerability, that was just fixed in 1.6.52. What’s weird about this one is that the vulnerability is can be triggered by completely legitimate PNG images. The good news is that is vulnerability only effects the simplified API, so not every user of libpng is in the blast radius.

And finally, Google has pushed out an out-of-band update to Chrome, fixing a vulnerability that is being exploited in the wild. The Hacker News managed to connect the bug ID to a pull request in the LibANGLE library, a translation layer between OpenGL US calls into Direct3D, Vulkan, and Metal. The details there suggests the flaw is limited to the macOS platform, as the fix is in the metal renderer. Regardless, time to update!

hackaday.com/2025/12/12/this-w…

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture
~Sophos~ Microsoft's Dec Patch Tuesday fixes 56 vulns, including two critical Office RCEs and one actively exploited flaw, CVE-2025-62221. - IOCs: CVE-2025-62554, CVE-2025-62557, CVE-2025-62221 - #Microsoft #PatchTuesday #ThreatIntel
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Python Software Foundation
  • CPython

07 Oct 2025
Published
02 Dec 2025
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
0.11%

KEV

Description

The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations. Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.

Statistics

  • 2 Posts

Last activity: 19 hours ago

Bluesky

Profile picture
🚨 Security Update: #SUSE patches Python3 vulnerabilities CVE-2025-6075 & CVE-2025-8291 affecting #openSUSE Leap, SLE, and container deployments. Read more: 👉 tinyurl.com/34wxxkuc #Security
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
#SUSE #Python3 security update 2025:4368-1 patches CVE-2025-6075 (performance degradation in os.path.expandvars()) and CVE-2025-8291 (ZIP archive parsing inconsistency). Read more: 👉 tinyurl.com/5fd2h2k9 #Security
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture
New vulnerabilities have been discovered in the React Scripting Component (RSC) library, according to a report by The Hacker News. These vulnerabilities, tracked as CVE-2022-44228 and CVE-2022-44229, can lead to arbitrary code execution and information disclosure.0.2 and earlier versions.0.
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Python Software Foundation
  • CPython

31 Oct 2025
Published
02 Dec 2025
Updated

CVSS v4.0
LOW (1.8)
EPSS
0.02%

KEV

Description

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

Statistics

  • 2 Posts

Last activity: 19 hours ago

Bluesky

Profile picture
🚨 Security Update: #SUSE patches Python3 vulnerabilities CVE-2025-6075 & CVE-2025-8291 affecting #openSUSE Leap, SLE, and container deployments. Read more: 👉 tinyurl.com/34wxxkuc #Security
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
#SUSE #Python3 security update 2025:4368-1 patches CVE-2025-6075 (performance degradation in os.path.expandvars()) and CVE-2025-8291 (ZIP archive parsing inconsistency). Read more: 👉 tinyurl.com/5fd2h2k9 #Security
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture
Stable Channel Update for Desktop URL: chromereleases.googleblog.com/2025/12/stab... Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: None CVEs: CVE-2025-14372, CVE-2025-14373 See also: www.theregister.com/2025/12/11/g...
  • 0
  • 0
  • 0
  • 7h ago
Showing 31 to 40 of 84 CVEs