Advisory Week


Week 16, 2025
National Cyber Awareness System
 
CISA Releases Seven Industrial Control Systems Advisories
CISA Releases Five Industrial Control Systems Advisories
Ubuntu Security Notices
 
Linux kernel (Oracle) vulnerabilities: USN-7455-4
Linux kernel (HWE) vulnerabilities: USN-7449-2
Linux kernel (IBM) vulnerabilities: USN-7463-1 / USN-7458-1
Linux kernel (AWS FIPS) vulnerabilities: USN-7462-2
Linux kernel vulnerabilities: USN-7462-1 / USN-7461-1 / USN-7455-1 / USN-7452-1 / USN-7451-1 / USN-7450-1 / USN-7449-1 / USN-7448-1 / USN-7445-1
Linux kernel (FIPS) vulnerabilities: USN-7461-2 / USN-7455-2
Linux kernel (Azure FIPS) vulnerabilities: USN-7460-1
Linux kernel (Intel IoTG) vulnerabilities: USN-7459-1
OpenSSH vulnerability: USN-7457-1
Linux kernel (Real-time) vulnerabilities: USN-7455-3 / USN-7453-1
libarchive vulnerabilities: USN-7454-1
mod_auth_openidc vulnerability: USN-7446-1
Yelp vulnerability: USN-7447-1
Perl vulnerability: USN-7434-2
HAProxy vulnerability: USN-7431-2
Erlang vulnerability: USN-7443-2
Linux kernel (GCP) vulnerabilities: USN-7402-5
Synapse vulnerabilities: USN-7444-1
Red Hat Security Advisory
 
Important: mod_auth_openidc:2.3 security update: RHSA-2025:4192 / RHSA-2025:4128
Moderate: Red Hat OpenStack Platform 17.1 (python-django) security update: RHSA-2025:4187
Important: thunderbird security update: RHSA-2025:4170 / RHSA-2025:4169 / RHSA-2025:4032 / RHSA-2025:4031 / RHSA-2025:4030 / RHSA-2025:4029 / RHSA-2025:4027 / RHSA-2025:4026
Important: OpenShift Container Platform 4.17.26 bug fix and security update: RHSA-2025:4012
Important: OpenShift Container Platform 4.16.39 bug fix and security update: RHSA-2025:4008
Important: OpenShift Container Platform 4.16.39 security and extras update: RHSA-2025:4007
Important: OpenShift Container Platform 4.18.10 bug fix and security update: RHSA-2025:4019
Important: libxslt security update: RHSA-2025:4098 / RHSA-2025:4025
Important: OpenShift Container Platform 4.18.10 security and extras update: RHSA-2025:4018
Moderate: bluez security update: RHSA-2025:4043
Important: virtuoso-opensource security update: RHSA-2025:4039
Cisco Security Advisory
 
Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server
Amazon AWS Security Advisories
 
CVE-2025-3857 - Infinite loop condition in Amazon.IonDotnet
Github Security Advisories
 
[GHSA-733v-p3h5-qpq7] GraphQL Armor Cost-Limit Plugin Bypass via Introspection Query Obfuscation
[GHSA-95fc-g4gj-mqmx] Steve doesn’t verify a server’s certificate and is susceptible to man-in-the-middle (MitM) attacks
[GHSA-xgpc-q899-67p8] Fleet doesn’t validate a server’s certificate when connecting through SSH
[GHSA-8h6m-wv39-239m] Rancher users who can create Projects can gain access to arbitrary projects
[GHSA-f3gw-9ww9-jmc3] Craft CMS Allows Remote Code Execution
[GHSA-cpj6-fhp6-mr6j] React Router allows pre-render data spoofing on React-Router framework mode
[GHSA-f46r-rw29-r322] React Router allows a DoS via cache poisoning by forcing SPA mode
[GHSA-vqfr-h8mv-ghfj] h11 accepts some malformed Chunked-Encoding bodies
[GHSA-pj3v-9cm8-gvj8] tRPC 11 WebSocket DoS Vulnerability
[GHSA-2jh5-g5ch-43q5] YoutubeDLSharp allows command injection onwindows system due to non sanitized arguments
[GHSA-f2f7-gj54-6vpv] LLaMA-Factory Allows Arbitrary Code Execution via Unsafe Deserialization in Ilamafy_baichuan2.py
[GHSA-pmc3-p9hx-jq96] uTLS ServerHellos are accepted without checking TLS 1.3 downgrade canaries
[GHSA-f69v-xrj8-rhxf] org.xwiki.platform:xwiki-platform-rest-server allows SQL injection in query endpoint of REST API
[GHSA-g9jj-75mx-wjcx] org.xwiki.platform:xwiki-platform-oldcore allows SQL injection in short form select requests through the script query API
[GHSA-8cc4-rfj6-fhg4] pnpm uses the md5 path shortening function causes packet paths to coincide, which causes indirect packet overwriting
[GHSA-ggpf-24jw-3fcw] CVE-2025-24357 Malicious model remote code execution fix bypass with PyTorch < 2.6.0
[GHSA-33qr-m49q-rxfx] Compromised xrpl.js versions 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2
[GHSA-hg25-w3vg-7279] XSS in the /download Endpoint of the JPA Web API
[GHSA-88h5-34xw-2q56] XSS in the /files Endpoint of the Generic REST API
[GHSA-w3mp-6vrj-875g] Cuba has a DoS in the File Storage
[GHSA-f3gv-cwwh-758m] io.jmix.localfs:jmix-localfs affected by DoS in the Local File Storage
[GHSA-x27v-f838-jh93] io.jmix.rest:jmix-rest allows XSS in the /files Endpoint of the Generic REST API
[GHSA-hcrc-79hj-m3qh] Wazuh server vulnerable to remote code execution
[GHSA-jx4g-3xqm-62vh] io.jmix.localfs:jmix-localfs has a Path Traversal in Local File Storage
[GHSA-qw93-h6pf-226x] OctoPrint Authenticated Reverse Proxy Page Authentication Bypass
[GHSA-mxr3-8whj-j74r] Harden-Runner allows evasion of 'disable-sudo' policy
[GHSA-7m6v-q233-q9j9] Minio Operator uses Kubernetes apiserver audience for AssumeRoleWithWebIdentity STS
[GHSA-5w6v-399v-w3cc] Nokogiri updates packaged libxml2 to v2.13.8 to resolve CVE-2025-32414 and CVE-2025-32415
[GHSA-gm2p-wf5c-w3pj] Infinite loop condition in Amazon.IonDotnet
[GHSA-5vxx-c285-pcq4] In Cilium, packets from terminating endpoints may not be encrypted in Wireguard-enabled clusters
[GHSA-6p68-w45g-48j7] Traefik has a possible vulnerability with the path matchers
Spring Security Advisories
 
CVE-2025-22235 - Medium - CVE-2025-22235: Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed
CVE-2025-22234 - Medium - CVE-2025-22234: Spring Security BCryptPasswordEncoder maximum password length breaks timing attack mitigation
Switch to Daily Mode
  We're thrilled to announce the launch of AdvisoryDaily, a once a day version of this newsletter.

Get AdvisoryDaily