24h | 7d | 30d

Overview

  • Red Hat
  • Enterprise Linux 9
  • OpenSSH

01 Jul 2024
Published
11 Dec 2025
Updated

CVSS
Pending
EPSS
25.87%

KEV

Description

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture fallback

@r @ireneista it should be possible to package a secure messenger client in a stable linux distro like debian and have it still be usable 3+ years after release with only fixes for specific vulns backported.

and there should be a single digit number of these vulns, if any, if you designed your network and parsing architecture right.

Like, if you exclude DOSes and bugs in non-default features, CVE-2024-6387 is the last SSH vuln that I actually worry about. The last one of substance before that was the 2023 double-free that's not believed exploitable, then we get all the way back to CVE-2016-0777 and 0778 for another bad one.

Why can we not make a messenger with that kind of security record? One where running an early-2025 release today is perfectly safe?

  • 0
  • 2
  • 0
  • 19h ago

Overview

  • Pending

14 Jan 2016
Published
05 Aug 2024
Updated

CVSS
Pending
EPSS
67.20%

KEV

Description

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture fallback

@r @ireneista it should be possible to package a secure messenger client in a stable linux distro like debian and have it still be usable 3+ years after release with only fixes for specific vulns backported.

and there should be a single digit number of these vulns, if any, if you designed your network and parsing architecture right.

Like, if you exclude DOSes and bugs in non-default features, CVE-2024-6387 is the last SSH vuln that I actually worry about. The last one of substance before that was the 2023 double-free that's not believed exploitable, then we get all the way back to CVE-2016-0777 and 0778 for another bad one.

Why can we not make a messenger with that kind of security record? One where running an early-2025 release today is perfectly safe?

  • 0
  • 2
  • 0
  • 19h ago

Overview

  • Linux
  • Linux

22 Jul 2025
Published
07 Jan 2026
Updated

CVSS
Pending
EPSS
0.08%

Description

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
🚨 URGENT: #SUSE Kernel RT Live Patch 2 (SUSE-SU-2026:0489-1) 🚨 Four critical CVEs fixed including CVE-2025-38352 (Race Condition) & CVE-2025-40129 (Unauthenticated NFS DoS). Read more: 👉 tinyurl.com/33fw5wb5 #Security
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Linux
  • Linux

12 Nov 2025
Published
01 Dec 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_disconnect() for the TFO socket. After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(), where reqsk_put() is called due to !reqsk->sk. Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the last req->rsk_refcnt and frees reqsk, and __reqsk_free() at the drop_and_free label causes the refcount underflow for the listener and double-free of the reqsk. Let's remove reqsk_fastopen_remove() in tcp_conn_request(). Note that other callers make sure tp->fastopen_rsk is not NULL. [0]: refcount_t: underflow; use-after-free. WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28) Modules linked in: CPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:refcount_warn_saturate (lib/refcount.c:28) Code: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff <0f> 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6 RSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246 RAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900 RDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280 RBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280 R10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100 R13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8 FS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0 Call Trace: <IRQ> tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301) tcp_rcv_state_process (net/ipv4/tcp_input.c:6708) tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670) tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906) ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438) ip6_input (net/ipv6/ip6_input.c:500) ipv6_rcv (net/ipv6/ip6_input.c:311) __netif_receive_skb (net/core/dev.c:6104) process_backlog (net/core/dev.c:6456) __napi_poll (net/core/dev.c:7506) net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696) handle_softirqs (kernel/softirq.c:579) do_softirq (kernel/softirq.c:480) </IRQ>

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture fallback
Critical #Linux Kernel update from @SUSE! 🛡️ SUSE-SU-2026:0491-1 patches CVE-2025-40129 (remote DoS in SUNRPC) & CVE-2025-40186 (local privilege escalation in TCP). Read more: 👉 tinyurl.com/yvh83tt6 #Security
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Feb 2026
Published
13 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
5.83%

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
~Sophos~ Microsoft's February update addresses 58 vulnerabilities, including 5 critical and 6 actively exploited in the wild. - IOCs: CVE-2026-21510, CVE-2026-21513, CVE-2026-21514 - #Microsoft #PatchTuesday #ThreatIntel
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Google
  • Chrome

11 Feb 2026
Published
12 Feb 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture fallback
Google、Chrome 145のデスクトップ向け安定版で3件の重大な脆弱性を修正(CVE-2026-2313,CVE-2026-2314,CVE-2026-2315) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Google
  • Chrome

11 Feb 2026
Published
12 Feb 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture fallback
Google、Chrome 145のデスクトップ向け安定版で3件の重大な脆弱性を修正(CVE-2026-2313,CVE-2026-2314,CVE-2026-2315) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Google
  • Chrome

11 Feb 2026
Published
12 Feb 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture fallback
Google、Chrome 145のデスクトップ向け安定版で3件の重大な脆弱性を修正(CVE-2026-2313,CVE-2026-2314,CVE-2026-2315) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Feb 2026
Published
13 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
4.82%

Description

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
~Sophos~ Microsoft's February update addresses 58 vulnerabilities, including 5 critical and 6 actively exploited in the wild. - IOCs: CVE-2026-21510, CVE-2026-21513, CVE-2026-21514 - #Microsoft #PatchTuesday #ThreatIntel
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Microsoft
  • Microsoft 365 Apps for Enterprise

10 Feb 2026
Published
13 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.68%

Description

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
~Sophos~ Microsoft's February update addresses 58 vulnerabilities, including 5 critical and 6 actively exploited in the wild. - IOCs: CVE-2026-21510, CVE-2026-21513, CVE-2026-21514 - #Microsoft #PatchTuesday #ThreatIntel
  • 0
  • 0
  • 0
  • 1h ago
Showing 41 to 50 of 50 CVEs