https://vulnerability.cert.dk/rss/recent/github/10Most recent entries from github2025-08-18T01:06:29.583074+00:00Vulnerability-Lookupcert@cert.dkpython-feedgenContains only the most 10 recent entries.https://vulnerability.cert.dk/vuln/ghsa-j2x9-qg6q-8wg7ghsa-j2x9-qg6q-8wg72025-08-18T01:06:29.588863+00:00In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate command request size
In commit 2b9b8f3b68ed ("ksmbd: validate command payload size"), except
for SMB2_OPLOCK_BREAK_HE command, the request size of other commands
is not checked, it's not expected. Fix it by add check for request
size of other commands.https://vulnerability.cert.dk/vuln/ghsa-mr68-gqxj-cfm9ghsa-mr68-gqxj-cfm92025-08-18T01:06:29.588856+00:00In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix out-of-bound read in smb2_write
ksmbd_smb2_check_message doesn't validate hdr->NextCommand. If
->NextCommand is bigger than Offset + Length of smb2 write, It will
allow oversized smb2 write length. It will cause OOB read in smb2_write.https://vulnerability.cert.dk/vuln/ghsa-pm54-8x3h-h6h9ghsa-pm54-8x3h-h6h92025-08-18T01:06:29.588850+00:00In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix out of bounds read in smb2_sess_setup
ksmbd does not consider the case of that smb2 session setup is
in compound request. If this is the second payload of the compound,
OOB read issue occurs while processing the first payload in
the smb2_sess_setup().https://vulnerability.cert.dk/vuln/ghsa-xv7h-524v-h227ghsa-xv7h-524v-h2272025-08-18T01:06:29.588844+00:00In the Linux kernel, the following vulnerability has been resolved:
ksmbd: not allow guest user on multichannel
This patch return STATUS_NOT_SUPPORTED if binding session is guest.https://vulnerability.cert.dk/vuln/ghsa-4mwr-r297-936cghsa-4mwr-r297-936c2025-08-18T01:06:29.588838+00:00A vulnerability was found in Tenda AC20 16.03.08.12. This vulnerability affects the function save_virtualser_data of the file /goform/formSetVirtualSer. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.https://vulnerability.cert.dk/vuln/ghsa-9jpq-fvjm-jmvcghsa-9jpq-fvjm-jmvc2025-08-18T01:06:29.588831+00:00A vulnerability has been found in Tenda AC20 16.03.08.12. This affects the function set_qosMib_list of the file /goform/SetNetControlList of the component SetNetControlList Endpoint. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.https://vulnerability.cert.dk/vuln/ghsa-pfjv-frc7-c4fmghsa-pfjv-frc7-c4fm2025-08-18T01:06:29.588825+00:00A vulnerability was determined in Tenda AC20 16.03.08.12. This issue affects the function sub_48E628 of the file /goform/SetIpMacBind. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.https://vulnerability.cert.dk/vuln/ghsa-vmg3-7v43-9g23ghsa-vmg3-7v43-9g232025-08-18T01:06:29.588817+00:00NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.https://vulnerability.cert.dk/vuln/ghsa-vq2h-cfxr-pp9qghsa-vq2h-cfxr-pp9q2025-08-18T01:06:29.588807+00:00A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.https://vulnerability.cert.dk/vuln/ghsa-x5w2-r7p8-rfh5ghsa-x5w2-r7p8-rfh52025-08-18T01:06:29.588779+00:00A vulnerability was identified in Tenda AC20 16.03.08.12. Affected is the function websFormDefine of the file /goform/telnet of the component Telnet Service. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.