oss-security mailing list
Recent messages:
- 2025/07/14 #1:
CVE-2025-53689: Apache Jackrabbit: XXE vulnerability in
jackrabbit-spi-commons (Julian Reschke <reschke@...che.org>)
- 2025/07/13 #1:
https://issues.apache.org/jira/browse/ZEPPELIN-6101:
CVE-2024-41169: Apache Zeppelin: raft directory listing and file read (PJ Fanning <fanningpj@...che.org>)
- 2025/07/12 #1:
Re: GHSL-2025-054: Use After Free (UAF) in Poppler - CVE-2025-52886 (Kevin Backhouse <kevinbackhouse@...hub.com>)
- 2025/07/11 #5:
GHSL-2025-054: Use After Free (UAF) in Poppler -
CVE-2025-52886 (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2025/07/11 #4:
PHP security releases 8.4.10, 8.3.23, 8.2.29, 8.1.33 (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2025/07/11 #3:
gnutls 3.8.10 fixes 4 CVEs (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2025/07/11 #2:
Re: 5 security issues disclosed in libxml2 (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2025/07/11 #1:
CVE-2025-48924: Apache Commons Lang:
ClassUtils.getClass(...) can throw a StackOverflowError on very long
inputs ("Gary D. Gregory" <ggregory@...che.org>)
- 2025/07/10 #13:
CVE-2025-53506: Apache Tomcat: DoS via excessive h2 streams at
connection start (Mark Thomas <markt@...che.org>)
- 2025/07/10 #12:
CVE-2025-52520: Apache Tomcat: DoS via integer overflow in multipart
file upload (Mark Thomas <markt@...che.org>)
- 2025/07/10 #11:
CVE-2025-52434: Apache Tomcat: APR/Native Connector crash leading to
DoS (Mark Thomas <markt@...che.org>)
- 2025/07/10 #10:
CVE-2025-53020: Apache HTTP Server: HTTP/2 DoS by Memory Increase (Eric Covener <covener@...che.org>)
- 2025/07/10 #9:
CVE-2025-49812: Apache HTTP Server: mod_ssl TLS upgrade attack (Eric Covener <covener@...che.org>)
- 2025/07/10 #8:
CVE-2025-23048: Apache HTTP Server: mod_ssl access control bypass
with session resumption (Eric Covener <covener@...che.org>)
- 2025/07/10 #7:
CVE-2025-49630: Apache HTTP Server: mod_proxy_http2 denial of
service (Eric Covener <covener@...che.org>)
- 2025/07/10 #6:
CVE-2024-47252: Apache HTTP Server: mod_ssl error log variable
escaping (Eric Covener <covener@...che.org>)
- 2025/07/10 #5:
CVE-2024-43394: Apache HTTP Server: SSRF on Windows due to UNC
paths (Eric Covener <covener@...che.org>)
- 2025/07/10 #4:
CVE-2024-43204: Apache HTTP Server: SSRF with mod_headers setting
Content-Type header (Eric Covener <covener@...che.org>)
- 2025/07/10 #3:
CVE-2024-42516: Apache HTTP Server: HTTP response splitting (Eric Covener <covener@...che.org>)
- 2025/07/10 #2:
CVE fixes in Apache HTTP Server 2.4.64 (Solar Designer <solar@...nwall.com>)
- 2025/07/10 #1:
Release of pqcscan ("Vincent Berg" <gvb@...ilax.io>)
- 2025/07/09 #4:
Multiple vulnerabilities in Jenkins plugins (Kevin Guerroudj <kguerroudj@...udbees.com>)
- 2025/07/09 #3:
Opossum attack / Opportunistic HTTP (RFC 2817) insecure (Hanno Böck <hanno@...eck.de>)
- 2025/07/09 #2:
Re: Fwd: Node.js security updates for all active
release lines, May 2025 (Salvatore Bonaccorso <carnil@...ian.org>)
- 2025/07/09 #1:
Re: Fwd: Node.js security updates for all active release lines, May 2025 (Solar Designer <solar@...nwall.com>)
- 2025/07/08 #5:
Go 1.24.5 & 1.23.11 fix CVE-2025-4674 (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2025/07/08 #4:
Multiple vulnerabilities fixed in Git (Taylor Blau <me@...ylorr.com>)
- 2025/07/08 #3:
Fwd: Node.js security updates for all active release lines, May
2025 (Rafael Gonzaga <work@...aelgss.dev>)
- 2025/07/08 #2:
Xen Security Advisory 471 v1 (CVE-2024-36350,CVE-2024-36357) -
x86: Transitive Scheduler Attacks (Xen.org security team <security@....org>)
- 2025/07/08 #1:
Re: Electric Charger Research (Solar Designer <solar@...nwall.com>)
- 2025/07/07 #2:
Electric Charger Research (Brandon Perry <bperry.volatile@...il.com>)
- 2025/07/07 #1:
Re: CVE-2025-27446: Apache APISIX Java Plugin Runner: Local listening
file permissions in APISIX plugin runner allow a loc… (Cuong Duy <duycuong200798@...il.com>)
- 2025/07/06 #1:
CVE-2025-27446: Apache APISIX Java Plugin Runner: Local listening
file permissions in APISIX plugin runner allow a local a… (YuanSheng Wang <membphis@...che.org>)
- 2025/07/05 #1:
Re: DoS segfault (NULL pointer deref) in SOPE / SOGo (Salvatore Bonaccorso <carnil@...ian.org>)
- 2025/07/03 #1:
CVE-2025-53367: An exploitable OOB write in DjVuLibre (Kevin Backhouse <kevinbackhouse@...hub.com>)
- 2025/07/02 #3:
DoS segfault (NULL pointer deref) in SOPE / SOGo (Stefan Bühler <source@...uehler.de>)
- 2025/07/02 #2:
CVE-2025-38089: Linux kernel: NFS server remote DoS via NULL pointer dereference (tianshuo han <hantianshuo233@...il.com>)
- 2025/07/02 #1:
CVE-2025-46647: Apache APISIX: improper validation of issuer from
introspection discovery url in plugin openid-connect (Junxu Chen <chenjunxu@...che.org>)
- 2025/07/01 #2:
CVE-2024-35164: Apache Guacamole: Improper input validation of
console codes (Michael Jumper <mjumper@...che.org>)
- 2025/07/01 #1:
Xen Security Advisory 470 v2 (CVE-2025-27465) - x86: Incorrect
stubs exception handling for flags recovery (Xen.org security team <security@....org>)
- 2025/06/30 #3:
CVE-2025-32463: sudo local privilege escalation via chroot option ("Todd C. Miller" <Todd.Miller@...o.ws>)
- 2025/06/30 #2:
CVE-2025-32462: sudo local privilege escalation via host option ("Todd C. Miller" <Todd.Miller@...o.ws>)
- 2025/06/30 #1:
CVE-2024-39954: Apache EventMesh Runtime: SSRF (Xue Weiming <mikexue@...che.org>)
- 2025/06/28 #1:
CVE-2025-32897: Apache Seata (incubating): Deserialization of
untrusted Data in Apache Seata Server (Min Ji <jimin@...che.org>)
- 2025/06/27 #2:
libssh 0.11.2 security and bugfix release (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2025/06/27 #1:
Re: CVE-2025-52555 Ceph: CephFS Permission Escalation
Vulnerability in Ceph Fuse mounted FS (Jacob Bachmeyer <jcb62281@...il.com>)
- 2025/06/26 #1:
CVE-2025-52555 Ceph: CephFS Permission Escalation Vulnerability in
Ceph Fuse mounted FS ("Sage [They / Them] McTaggart" <amctagga@...hat.com>)
- 2025/06/25 #1:
Re: sox_ng fixes 20 CVEs in sox (Martin Guy <martinwguy@...il.com>)
- 2025/06/24 #8:
Re: xdg-open bypassing SameSite=Strict (Lucas Holt <luke@...lishgames.com>)
- 2025/06/24 #7:
Re: xdg-open bypassing SameSite=Strict (Gabriel Corona <gabriel.corona@...e.fr>)
- 2025/06/24 #6:
Re: xdg-open bypassing SameSite=Strict (Anton Luka Šijanec <anton@...anec.eu>)
- 2025/06/24 #5:
Re: xdg-open bypassing SameSite=Strict (grape mingijung <mingijung.grape@...il.com>)
- 2025/06/24 #4:
sox_ng fixes 20 CVEs in sox (Martin Guy <martinwguy@...il.com>)
- 2025/06/24 #3:
CVE-2025-50213: Apache Airflow Providers Snowflake: Potential SQL
injection in CopyFromExternalStageToSnowflakeOperator (Elad Kalif <eladkal@...che.org>)
- 2025/06/24 #2:
Re: xdg-open bypassing SameSite=Strict (Simon McVittie <smcv@...ian.org>)
- 2025/06/24 #1:
CPython: Multiple CVEs (1 CRITICAL, 3 HIGH, 1
MODERATE) affecting the tarfile module (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2025/06/23 #2:
Re: xdg-open bypassing SameSite=Strict (Solar Designer <solar@...nwall.com>)
- 2025/06/23 #1:
xdg-open bypassing SameSite=Strict (grape mingijung <mingijung.grape@...il.com>)
- 2025/06/20 #3:
Re: path traversal in tar extract in intel
cve-bin-tool (lists@...atla.org.uk)
- 2025/06/20 #2:
ClamAV 1.4.3 and 1.0.9 security patch versions
published (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2025/06/20 #1:
Re: path traversal in tar extract in intel
cve-bin-tool (Jakub Wilk <jwilk@...lk.net>)
- 2025/06/19 #1:
[kubernetes] CVE-2025-4563: Nodes can bypass dynamic resource
allocation authorization checks (Rita Zhang <rita.z.zhang@...il.com>)
- 2025/06/18 #2:
Fwd: X.Org Security Advisory: multiple security issues X.Org X server
and Xwayland (Olivier Fourdan <ofourdan@...hat.com>)
- 2025/06/18 #1:
Re: CVE-2025-6019: LPE from allow_active to root in
libblockdev via udisks (Jakub Wilk <jwilk@...lk.net>)
- 2025/06/17 #7:
[ANNOUNCE] Apache Traffic Server has an ACL issue, and also has a
vulnerability in ESI processing (Masakazu Kitajo <maskit@...che.org>)
- 2025/06/17 #6:
Re: CVE-2025-6019: LPE from allow_active to root in
libblockdev via udisks (Simon McVittie <smcv@...ian.org>)
- 2025/06/17 #5:
Re: CVE-2025-6019: LPE from allow_active to root in libblockdev via
udisks (Qualys Security Advisory <qsa@...lys.com>)
- 2025/06/17 #4:
CVE-2025-6019: LPE from allow_active to root in libblockdev via
udisks (Qualys Security Advisory <qsa@...lys.com>)
- 2025/06/17 #3:
Fwd: X.Org Security Advisory: multiple security issues X.Org X server
and Xwayland (Olivier Fourdan <ofourdan@...hat.com>)
- 2025/06/17 #2:
[kubernetes] Race Condition in Go allows Volume Deletion in older
Kubernetes versions (Craig Ingram <cjingram@...gle.com>)
- 2025/06/17 #1:
pam: pam_namespace local privilege escalation (CVE-2025-6020) (BAL-PETRE Olivier <Olivier.Bal-Petre@....gouv.fr>)
- 2025/06/16 #6:
5 security issues disclosed in libxml2 (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2025/06/16 #5:
CVE-2025-4748: Erlang/OTP 17.0–28.0.0 absolute-path traversal in zip:unzip/zip:extract (Jonatan Männchen <jonatan@...nnchen.ch>)
- 2025/06/16 #4:
CVE-2025-48976: Apache Commons FileUpload, Apache Commons
FileUpload: FileUpload DoS via part headers ("Gary D. Gregory" <ggregory@...che.org>)
- 2025/06/16 #3:
CVE-2025-49124: Apache Tomcat: exe side-loading via icalcs.exe in
Tomcat installer for Windows (Mark Thomas <markt@...che.org>)
- 2025/06/16 #2:
CVE-2025-49125: Apache Tomcat: Security constraint bypass for
pre/post-resources (Mark Thomas <markt@...che.org>)
- 2025/06/16 #1:
CVE-2025-48988: Apache Tomcat: FileUpload large number of parts with
headers DoS (Mark Thomas <markt@...che.org>)
- 2025/06/15 #1:
Re: Local information disclosure in apport and systemd-coredump (Solar Designer <solar@...nwall.com>)
- 2025/06/14 #2:
CVE-2025-47869: Apache NuttX RTOS: examples/xmlrpc: Fix calls
buffers size. (Tomasz Cedro <cederom@...che.org>)
- 2025/06/14 #1:
CVE-2025-47868: Apache NuttX RTOS: tools/bdf-converter.:
tools/bdf-converter: Fix loop termination condition. (Tomasz Cedro <cederom@...che.org>)
- 2025/06/13 #1:
sslh: Remote Denial-of-Service Vulnerabilities (CVE-2025-46807,
CVE-2025-46806) (Matthias Gerstner <mgerstner@...e.de>)
- 2025/06/11 #5:
Re: Linux kernel: HFS+ filesystem implementation
issues, exposure in distros (Demi Marie Obenour <demiobenour@...il.com>)
- 2025/06/11 #4:
Re: Linux kernel: HFS+ filesystem implementation
issues, exposure in distros (Marc Deslauriers <marc.deslauriers@...onical.com>)
- 2025/06/11 #3:
Re: Linux kernel: HFS+ filesystem implementation
issues, exposure in distros (Simon McVittie <smcv@...ian.org>)
- 2025/06/11 #2:
Re: Linux kernel: HFS+ filesystem implementation
issues, exposure in distros (Marc Deslauriers <marc.deslauriers@...onical.com>)
- 2025/06/11 #1:
Re: Linux kernel: HFS+ filesystem implementation
issues, exposure in distros (Demi Marie Obenour <demiobenour@...il.com>)
- 2025/06/10 #5:
CVE-2025-49091: Konsole: Code execution from web browser using URL schemes
handled by KDE's KTelnetService and Konsole < … (Dennis Dast <dennis.dast@...ofnet.de>)
- 2025/06/10 #4:
Re: Django CVE-2025-48432 (follow-up patch releases) (Sebastian Pipping <sebastian@...ping.org>)
- 2025/06/10 #3:
Re: Django CVE-2025-48432 (follow-up patch releases) (Sarah Boyce <sarahboyce@...ngoproject.com>)
- 2025/06/10 #2:
Django CVE-2025-48432 (follow-up patch releases) (Sarah Boyce <sarahboyce@...ngoproject.com>)
- 2025/06/10 #1:
Re: Local information disclosure in apport and
systemd-coredump (Zbigniew Jędrzejewski-Szmek <zbyszek@...waw.pl>)
- 2025/06/09 #3:
CVE-2025-27819: Apache Kafka: Possible RCE/Denial of service
attack via SASL JAAS JndiLoginModule configuration (Luke Chen <showuon@...che.org>)
- 2025/06/09 #2:
CVE-2025-27818: Apache Kafka: Possible RCE attack via SASL JAAS
LdapLoginModule configuration (Luke Chen <showuon@...che.org>)
- 2025/06/09 #1:
CVE-2025-27817: Apache Kafka Client: Arbitrary file read and SSRF
vulnerability (Luke Chen <showuon@...che.org>)
- 2025/06/07 #5:
Re: Re: Re: Linux kernel: HFS+ filesystem
implementation, issues, exposure in distros (Sasha Levin <sashal@...nel.org>)
- 2025/06/07 #4:
Re: Re: Re: Linux kernel: HFS+ filesystem
implementation, issues, exposure in distros (Bastian Blank <bblank@...nkmo.de>)
- 2025/06/07 #3:
Re: Re: Re: Linux kernel: HFS+ filesystem
implementation, issues, exposure in distros (Sasha Levin <sashal@...nel.org>)
- 2025/06/07 #2:
Re: Linux kernel: HFS+ filesystem implementation
issues, exposure in distros (Simon McVittie <smcv@...ian.org>)
- 2025/06/07 #1:
Re: Re: Re: Linux kernel: HFS+ filesystem
implementation, issues, exposure in distros (Greg KH <greg@...ah.com>)
- 2025/06/06 #12:
Re: Re: Linux kernel: HFS+ filesystem implementation, issues,
exposure in distros (Attila Szasz <szasza.contact@...il.com>)
31298 messages
Powered by blists - more mailing lists
Please check out the
Open Source Software Security Wiki, which is counterpart to this
mailing list.
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.