CVE Notify
18.5K subscribers
4 photos
163K links
Alert on the latest CVEs

Partner channel: @malwr
Download Telegram
🚨 CVE-2025-62168
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.

πŸŽ–@cveNotify
🚨 CVE-2025-27064
Information disclosure while registering commands from clients with diag through diagHal.

πŸŽ–@cveNotify
🚨 CVE-2025-27070
Memory corruption while performing encryption and decryption commands.

πŸŽ–@cveNotify
🚨 CVE-2025-27074
Memory corruption while processing a GP command response.

πŸŽ–@cveNotify
🚨 CVE-2025-47352
Memory corruption while processing audio streaming operations.

πŸŽ–@cveNotify
🚨 CVE-2025-47353
Memory corruption while processing request sent from GVM.

πŸŽ–@cveNotify
🚨 CVE-2025-47357
Information Disclosure when a user-level driver performs QFPROM read or write operations on Fuse regions.

πŸŽ–@cveNotify
🚨 CVE-2025-47360
Memory corruption while processing client message during device management.

πŸŽ–@cveNotify
🚨 CVE-2025-47361
Memory corruption when triggering a subsystem crash with an out-of-range identifier.

πŸŽ–@cveNotify
🚨 CVE-2025-47362
Information disclosure while processing message from client with invalid payload.

πŸŽ–@cveNotify
🚨 CVE-2025-47365
Memory corruption while processing large input data from a remote source via a communication interface.

πŸŽ–@cveNotify
🚨 CVE-2025-47367
Memory corruption while accessing a buffer during IOCTL processing.

πŸŽ–@cveNotify
🚨 CVE-2025-47368
Memory corruption when dereferencing an invalid userspace address in a user buffer during MCDM IOCTL processing.

πŸŽ–@cveNotify
🚨 CVE-2025-47370
Transient DOS when a remote device sends an invalid connection request during BT connectable LE scan.

πŸŽ–@cveNotify
🚨 CVE-2025-23157
In the Linux kernel, the following vulnerability has been resolved:

media: venus: hfi_parser: add check to avoid out of bound access

There is a possibility that init_codecs is invoked multiple times during
manipulated payload from video firmware. In such case, if codecs_count
can get incremented to value more than MAX_CODEC_NUM, there can be OOB
access. Reset the count so that it always starts from beginning.

πŸŽ–@cveNotify
🚨 CVE-2025-23145
In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix NULL pointer in can_accept_new_subflow

When testing valkey benchmark tool with MPTCP, the kernel panics in
'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL.

Call trace:

mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P)
subflow_syn_recv_sock (./net/mptcp/subflow.c:854)
tcp_check_req (./net/ipv4/tcp_minisocks.c:863)
tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268)
ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207)
ip_local_deliver_finish (./net/ipv4/ip_input.c:234)
ip_local_deliver (./net/ipv4/ip_input.c:254)
ip_rcv_finish (./net/ipv4/ip_input.c:449)
...

According to the debug log, the same req received two SYN-ACK in a very
short time, very likely because the client retransmits the syn ack due
to multiple reasons.

Even if the packets are transmitted with a relevant time interval, they
can be processed by the server on different CPUs concurrently). The
'subflow_req->msk' ownership is transferred to the subflow the first,
and there will be a risk of a null pointer dereference here.

This patch fixes this issue by moving the 'subflow_req->msk' under the
`own_req == true` conditional.

Note that the !msk check in subflow_hmac_valid() can be dropped, because
the same check already exists under the own_req mpj branch where the
code has been moved to.

πŸŽ–@cveNotify
🚨 CVE-2025-23146
In the Linux kernel, the following vulnerability has been resolved:

mfd: ene-kb3930: Fix a potential NULL pointer dereference

The off_gpios could be NULL. Add missing check in the kb3930_probe().
This is similar to the issue fixed in commit b1ba8bcb2d1f
("backlight: hx8357: Fix potential NULL pointer dereference").

This was detected by our static analysis tool.

πŸŽ–@cveNotify
🚨 CVE-2025-23147
In the Linux kernel, the following vulnerability has been resolved:

i3c: Add NULL pointer check in i3c_master_queue_ibi()

The I3C master driver may receive an IBI from a target device that has not
been probed yet. In such cases, the master calls `i3c_master_queue_ibi()`
to queue an IBI work task, leading to "Unable to handle kernel read from
unreadable memory" and resulting in a kernel panic.

Typical IBI handling flow:
1. The I3C master scans target devices and probes their respective drivers.
2. The target device driver calls `i3c_device_request_ibi()` to enable IBI
and assigns `dev->ibi = ibi`.
3. The I3C master receives an IBI from the target device and calls
`i3c_master_queue_ibi()` to queue the target device driver’s IBI
handler task.

However, since target device events are asynchronous to the I3C probe
sequence, step 3 may occur before step 2, causing `dev->ibi` to be `NULL`,
leading to a kernel panic.

Add a NULL pointer check in `i3c_master_queue_ibi()` to prevent accessing
an uninitialized `dev->ibi`, ensuring stability.

πŸŽ–@cveNotify
🚨 CVE-2025-23148
In the Linux kernel, the following vulnerability has been resolved:

soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe()

soc_dev_attr->revision could be NULL, thus,
a pointer check is added to prevent potential NULL pointer dereference.
This is similar to the fix in commit 3027e7b15b02
("ice: Fix some null pointer dereference issues in ice_ptp.c").

This issue is found by our static analysis tool.

πŸŽ–@cveNotify
πŸ”₯1
🚨 CVE-2025-27041
Transient DOS while processing video packets received from video firmware.

πŸŽ–@cveNotify