Windows update
- 
													CVE-2025-53783 Microsoft Teams Remote Code Execution VulnerabilityUpdated product information in the Software Update table. This is an informational change only.
- 
													Chromium: CVE-2023-4863 Heap buffer overflow in WebPUpdated product information in the Software Update table. This is an informational change only.
- 
													CVE-2025-40025 f2fs: fix to do sanity check on node footer for non inode dnodeInformation published.
- 
													CVE-2025-40051 vhost: vringh: Modify the return value checkInformation published.
- 
													CVE-2025-40077 f2fs: fix to avoid overflow while left shift operationInformation published.
- 
													CVE-2025-40064 smc: Fix use-after-free in __pnet_find_base_ndev().Information published.
- 
													CVE-2025-40038 KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't validInformation published.
- 
													CVE-2025-40042 tracing: Fix race condition in kprobe initialization causing NULL pointer dereferenceInformation published.
- 
													CVE-2025-40029 bus: fsl-mc: Check return value of platform_get_resource()Information published.
- 
													CVE-2025-40061 RDMA/rxe: Fix race in do_task() when drainingInformation published.
- 
													CVE-2025-40078 bpf: Explicitly check accesses to bpf_sock_addrInformation published.
- 
													CVE-2025-40044 fs: udf: fix OOB read in lengthAllocDescs handlingInformation published.
- 
													CVE-2025-40052 smb: client: fix crypto buffers in non-linear memoryInformation published.
- 
													CVE-2025-40030 pinctrl: check the return value of pinmux_ops::get_function_name()Information published.
- 
													CVE-2025-40035 Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leakInformation published.
- 
													CVE-2025-40053 net: dlink: handle copy_thresh allocation failureInformation published.
- 
													CVE-2025-40055 ocfs2: fix double free in user_cluster_connect()Information published.
- 
													CVE-2025-40056 vhost: vringh: Fix copy_to_iter return value checkInformation published.
- 
													CVE-2025-40040 mm/ksm: fix flag-dropping behavior in ksm_madviseInformation published.
- 
													CVE-2025-40026 KVM: x86: Don't (re)check L1 intercepts when completing userspace I/OInformation published.
- 
													CVE-2025-40060 coresight: trbe: Return NULL pointer for allocation failuresInformation published.
- 
													CVE-2025-40080 nbd: restrict sockets to TCP and UDPInformation published.
- 
													CVE-2025-40032 PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before releaseInformation published.
- 
													CVE-2025-40033 remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()Information published.
- 
													CVE-2025-40074 ipv4: start using dst_dev_rcu()Information published.
- 
													CVE-2025-40043 net: nfc: nci: Add parameter validation for packet dataInformation published.
- 
													CVE-2025-40039 ksmbd: Fix race condition in RPC handle list accessInformation published.
- 
													CVE-2025-40036 misc: fastrpc: fix possible map leak in fastrpc_put_argsInformation published.
- 
													CVE-2025-40048 uio_hv_generic: Let userspace take care of interrupt maskInformation published.
- 
													CVE-2025-40081 perf: arm_spe: Prevent overflow in PERF_IDX2OFF()Information published.
- 
													CVE-2025-40049 Squashfs: fix uninit-value in squashfs_get_parentInformation published.
- 
													CVE-2025-11840 GNU Binutils ldmisc.c vfinfo out-of-boundsInformation published.
- 
													CVE-2025-40027 net/9p: fix double req put in p9_fd_cancelledInformation published.
- 
													CVE-2025-40065 RISC-V: KVM: Write hgatp register with valid mode bitsInformation published.
- 
													CVE-2025-40075 tcp_metrics: use dst_dev_net_rcu()Information published.
- 
													CVE-2025-40057 ptp: Add a upper bound on max_vclocksInformation published.
- 
													CVE-2025-40068 fs: ntfs3: Fix integer overflow in run_unpack()Information published.
- 
													CVE-2025-40079 riscv, bpf: Sign extend struct ops return values properlyInformation published.
- 
													CVE-2025-40071 tty: n_gsm: Don't block input queue by waiting MSCInformation published.
- 
													CVE-2025-59503 Azure Compute Resource Provider Elevation of Privilege VulnerabilityUpdated one or more CVSS scores for the affected products. This is an informational change only.
- 
													CVE-2025-59287 Windows Server Update Service (WSUS) Remote Code Execution VulnerabilitySecurity hotpatch updates are now available for supported versions of Windows Server 2022 and Windows Server 2025. Note that a reboot will be required after you install these hotpatch updates.
- 
													CVE-2025-59287 Windows Server Update Service (WSUS) Remote Code Execution VulnerabilityUpdated links to security updates. This is an informational change only.
- 
													CVE-2025-11411 Possible domain hijacking via promiscuous records in the authority sectionInformation published.
- 
													CVE-2025-62813 LZ4 through 1.10.0 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact when the application processes untrusted LZ4 frames. For example, LZ4F_createCDict_advanced in lib/lz4frame.c mishandles NULL checks.Information published.
- 
													CVE-2022-49173 spi: fsi: Implement a timeout for polling statusInformation published.
- 
													CVE-2022-49469 btrfs: fix anon_dev leak in create_subvol()Information published.
- 
													CVE-2022-49543 ath11k: fix the warning of dev_wake in mhi_pm_disable_transition()Information published.
- 
													CVE-2022-49552 bpf: Fix combination of jit blinding and pointers to bpf subprogs.Information published.
- 
													CVE-2022-49562 KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bitsInformation published.
- 
													CVE-2022-49610 KVM: VMX: Prevent RSB underflow before vmenterInformation published.
Приглашаю на лучшие дистанционные курсы повышения квалификации, курсы профессиональной переподготовки и курсы по специальностям на проверенной образовательной платформе «Знанио».
Воспользуйтесь моим купоном «9954514» при оформлении заказа, чтобы получить скидку -50% на https://znanio.ru на все курсы и другие услуги портала.
