Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-46805 (GCVE-0-2025-46805)
Vulnerability from cvelistv5 – Published: 2025-05-26 13:16 – Updated: 2025-05-27 14:10
VLAI?
EPSS
Title
Screen has a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root
Summary
Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.
Severity ?
5.5 (Medium)
CWE
- CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Assigner
References
Impacted products
Date Public ?
2025-05-12 15:24
Credits
Matthias Gerstner, SUSE
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-46805",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-27T14:10:31.731680Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T14:10:49.034Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://git.savannah.gnu.org/cgit/screen.git",
"defaultStatus": "unaffected",
"packageName": "screen",
"versions": [
{
"lessThanOrEqual": "5.0.0",
"status": "affected",
"version": "5.0.",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.9.1",
"status": "affected",
"version": "?",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Matthias Gerstner, SUSE"
}
],
"datePublic": "2025-05-12T15:24:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root."
}
],
"value": "Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-367",
"description": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-26T13:23:17.702Z",
"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb",
"shortName": "suse"
},
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46805"
},
{
"url": "https://www.openwall.com/lists/oss-security/2025/05/12/1"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Screen has a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb",
"assignerShortName": "suse",
"cveId": "CVE-2025-46805",
"datePublished": "2025-05-26T13:16:40.969Z",
"dateReserved": "2025-04-30T11:28:04.728Z",
"dateUpdated": "2025-05-27T14:10:49.034Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-46805\",\"sourceIdentifier\":\"meissner@suse.de\",\"published\":\"2025-05-26T14:15:20.037\",\"lastModified\":\"2025-05-28T15:01:30.720\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.\"},{\"lang\":\"es\",\"value\":\"La versi\u00f3n de Screen 5.0.0 y las versiones anteriores 4 tienen una ejecuci\u00f3n TOCTOU que potencialmente permite enviar SIGHUP, SIGCONT a procesos privilegiados cuando se instala setuid-root.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"meissner@suse.de\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"meissner@suse.de\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"meissner@suse.de\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"references\":[{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46805\",\"source\":\"meissner@suse.de\"},{\"url\":\"https://www.openwall.com/lists/oss-security/2025/05/12/1\",\"source\":\"meissner@suse.de\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-46805\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-27T14:10:31.731680Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-27T14:10:41.871Z\"}}], \"cna\": {\"title\": \"Screen has a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Matthias Gerstner, SUSE\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 5.7, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"5.0.\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.0.0\"}, {\"status\": \"affected\", \"version\": \"?\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.1\"}], \"packageName\": \"screen\", \"collectionURL\": \"https://git.savannah.gnu.org/cgit/screen.git\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2025-05-12T15:24:00.000Z\", \"references\": [{\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46805\"}, {\"url\": \"https://www.openwall.com/lists/oss-security/2025/05/12/1\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-367\", \"description\": \"CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition\"}]}], \"providerMetadata\": {\"orgId\": \"404e59f5-483d-4b8a-8e7a-e67604dd8afb\", \"shortName\": \"suse\", \"dateUpdated\": \"2025-05-26T13:23:17.702Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-46805\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-27T14:10:49.034Z\", \"dateReserved\": \"2025-04-30T11:28:04.728Z\", \"assignerOrgId\": \"404e59f5-483d-4b8a-8e7a-e67604dd8afb\", \"datePublished\": \"2025-05-26T13:16:40.969Z\", \"assignerShortName\": \"suse\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CNVD-2025-15358
Vulnerability from cnvd - Published: 2025-07-09
VLAI Severity ?
Title
Gnu Screen竞争条件漏洞
Description
Gnu Screen是由GNU项目开发的终端复用工具,允许用户在同一物理终端中创建多个虚拟终端会话,并支持会话恢复、窗口切换及多用户共享等功能。
Gnu Screen存在竞争条件漏洞,该漏洞源于TOCTOU竞争条件,攻击者可利用该漏洞向特权进程发送SIGHUP和SIGCONT信号。
Severity
中
Patch Name
Gnu Screen竞争条件漏洞的补丁
Patch Description
Gnu Screen是由GNU项目开发的终端复用工具,允许用户在同一物理终端中创建多个虚拟终端会话,并支持会话恢复、窗口切换及多用户共享等功能。
Gnu Screen存在竞争条件漏洞,该漏洞源于TOCTOU竞争条件,攻击者可利用该漏洞向特权进程发送SIGHUP和SIGCONT信号。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级程序修复该安全问题,详情见厂商官网: https://ftp.gnu.org/gnu/screen/
Reference
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46805
Impacted products
| Name | Gnu Screen <=5.0.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-46805",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-46805"
}
},
"description": "Gnu Screen\u662f\u7531GNU\u9879\u76ee\u5f00\u53d1\u7684\u7ec8\u7aef\u590d\u7528\u5de5\u5177\uff0c\u5141\u8bb8\u7528\u6237\u5728\u540c\u4e00\u7269\u7406\u7ec8\u7aef\u4e2d\u521b\u5efa\u591a\u4e2a\u865a\u62df\u7ec8\u7aef\u4f1a\u8bdd\uff0c\u5e76\u652f\u6301\u4f1a\u8bdd\u6062\u590d\u3001\u7a97\u53e3\u5207\u6362\u53ca\u591a\u7528\u6237\u5171\u4eab\u7b49\u529f\u80fd\u3002\n\nGnu Screen\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eTOCTOU\u7ade\u4e89\u6761\u4ef6\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5411\u7279\u6743\u8fdb\u7a0b\u53d1\u9001SIGHUP\u548cSIGCONT\u4fe1\u53f7\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51\uff1a\r\nhttps://ftp.gnu.org/gnu/screen/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-15358",
"openTime": "2025-07-09",
"patchDescription": "Gnu Screen\u662f\u7531GNU\u9879\u76ee\u5f00\u53d1\u7684\u7ec8\u7aef\u590d\u7528\u5de5\u5177\uff0c\u5141\u8bb8\u7528\u6237\u5728\u540c\u4e00\u7269\u7406\u7ec8\u7aef\u4e2d\u521b\u5efa\u591a\u4e2a\u865a\u62df\u7ec8\u7aef\u4f1a\u8bdd\uff0c\u5e76\u652f\u6301\u4f1a\u8bdd\u6062\u590d\u3001\u7a97\u53e3\u5207\u6362\u53ca\u591a\u7528\u6237\u5171\u4eab\u7b49\u529f\u80fd\u3002\r\n\r\nGnu Screen\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eTOCTOU\u7ade\u4e89\u6761\u4ef6\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5411\u7279\u6743\u8fdb\u7a0b\u53d1\u9001SIGHUP\u548cSIGCONT\u4fe1\u53f7\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Gnu Screen\u7ade\u4e89\u6761\u4ef6\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Gnu Screen \u003c=5.0.0"
},
"referenceLink": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46805",
"serverity": "\u4e2d",
"submitTime": "2025-05-30",
"title": "Gnu Screen\u7ade\u4e89\u6761\u4ef6\u6f0f\u6d1e"
}
GHSA-V9HV-WGMV-7QJ2
Vulnerability from github – Published: 2025-05-26 15:30 – Updated: 2025-05-26 15:30
VLAI?
Details
Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-46805"
],
"database_specific": {
"cwe_ids": [
"CWE-367"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-05-26T14:15:20Z",
"severity": "MODERATE"
},
"details": "Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.",
"id": "GHSA-v9hv-wgmv-7qj2",
"modified": "2025-05-26T15:30:34Z",
"published": "2025-05-26T15:30:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46805"
},
{
"type": "WEB",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46805"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2025/05/12/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
WID-SEC-W-2025-1034
Vulnerability from csaf_certbund - Published: 2025-05-13 22:00 - Updated: 2025-11-10 23:00Summary
screen: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Screen ist ein Terminalmultiplexer, der es ermöglicht, mehrere Sitzungen innerhalb eines einzigen Terminalfensters zu nutzen.
Angriff: Ein lokaler Angreifer kann mehrere Schwachstellen in screen ausnutzen, um seine Privilegien zu erhöhen, Daten zu manipulieren oder Informationen offenzulegen.
Betroffene Betriebssysteme: - Linux
References
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Screen ist ein Terminalmultiplexer, der es erm\u00f6glicht, mehrere Sitzungen innerhalb eines einzigen Terminalfensters zu nutzen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in screen ausnutzen, um seine Privilegien zu erh\u00f6hen, Daten zu manipulieren oder Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1034 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1034.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1034 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1034"
},
{
"category": "external",
"summary": "GNU screen Git commit version 5.0.1 vom 2025-05-13",
"url": "https://git.savannah.gnu.org/cgit/screen.git/commit/?h=screen-v5"
},
{
"category": "external",
"summary": "GNU screen Git commit CVE-2025-23395 vom 2025-05-13",
"url": "https://git.savannah.gnu.org/cgit/screen.git/commit/?id=e894caeffccdb62f9c644989a936dc7ec83cc747"
},
{
"category": "external",
"summary": "GNU screen Git commit CVE-2025-46802 vom 2025-05-13",
"url": "https://git.savannah.gnu.org/cgit/screen.git/commit/?h=screen-v4\u0026id=049b26b22e197ba3be9c46e5c193032e01a4724a"
},
{
"category": "external",
"summary": "GNU screen Git commit CVE-2025-46803 vom 2025-05-13",
"url": "https://git.savannah.gnu.org/cgit/screen.git/commit/?id=d5d7bf43f3842e8b62d5f34eb4b031de7c8098c1"
},
{
"category": "external",
"summary": "GNU screen Git commit CVE-2025-46804 vom 2025-05-13",
"url": "https://git.savannah.gnu.org/cgit/screen.git/commit/?h=screen-v4\u0026id=e0eef5aac453fa98a2664416a56c50ad1d00cb30"
},
{
"category": "external",
"summary": "GNU screen Git commit CVE-2025-46805 vom 2025-05-13",
"url": "https://git.savannah.gnu.org/cgit/screen.git/commit/?h=screen-v4\u0026id=161f85b98b7e1d5e4893aeed20f4cdb5e3dfaaa4"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-202505-1 vom 2025-05-13",
"url": "https://security.archlinux.org/ASA-202505-1"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15164-1 vom 2025-05-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EHAVZBGPF26QCKDE25CJVWLHNTDLGTXQ/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2878 vom 2025-06-12",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2878.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20403-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021519.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02016-1 vom 2025-06-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021578.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-824E33E598 vom 2025-06-26",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-824e33e598"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2025-70302AABFF vom 2025-06-26",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-70302aabff"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20439-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021670.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2025-BEEB62AD3C vom 2025-06-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-beeb62ad3c"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-F055A0D751 vom 2025-06-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-f055a0d751"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-653690F2F7 vom 2025-06-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-653690f2f7"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2878 vom 2025-06-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2878.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02186-1 vom 2025-07-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021732.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-381 vom 2025-11-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000390206/dsa-2025-381-security-update-for-dell-powerscale-onefs-multiple-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "screen: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-10T23:00:00.000+00:00",
"generator": {
"date": "2025-11-11T07:07:29.423+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1034",
"initial_release_date": "2025-05-13T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "11"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell PowerScale OneFS",
"product": {
"name": "Dell PowerScale OneFS",
"product_id": "T048394",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerscale_onefs:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.0.1",
"product": {
"name": "Open Source screen \u003c5.0.1",
"product_id": "T043696"
}
},
{
"category": "product_version",
"name": "5.0.1",
"product": {
"name": "Open Source screen 5.0.1",
"product_id": "T043696-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gnu:screen:5.0.1"
}
}
}
],
"category": "product_name",
"name": "screen"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-23395",
"product_status": {
"known_affected": [
"T043696",
"T002207",
"T048394",
"T013312",
"T027843",
"398363",
"74185"
]
},
"release_date": "2025-05-13T22:00:00.000+00:00",
"title": "CVE-2025-23395"
},
{
"cve": "CVE-2025-46802",
"product_status": {
"known_affected": [
"T043696",
"T002207",
"T048394",
"T013312",
"T027843",
"398363",
"74185"
]
},
"release_date": "2025-05-13T22:00:00.000+00:00",
"title": "CVE-2025-46802"
},
{
"cve": "CVE-2025-46803",
"product_status": {
"known_affected": [
"T043696",
"T002207",
"T048394",
"T013312",
"T027843",
"398363",
"74185"
]
},
"release_date": "2025-05-13T22:00:00.000+00:00",
"title": "CVE-2025-46803"
},
{
"cve": "CVE-2025-46804",
"product_status": {
"known_affected": [
"T043696",
"T002207",
"T048394",
"T013312",
"T027843",
"398363",
"74185"
]
},
"release_date": "2025-05-13T22:00:00.000+00:00",
"title": "CVE-2025-46804"
},
{
"cve": "CVE-2025-46805",
"product_status": {
"known_affected": [
"T043696",
"T002207",
"T048394",
"T013312",
"T027843",
"398363",
"74185"
]
},
"release_date": "2025-05-13T22:00:00.000+00:00",
"title": "CVE-2025-46805"
}
]
}
WID-SEC-W-2025-1850
Vulnerability from csaf_certbund - Published: 2025-08-14 22:00 - Updated: 2025-11-17 23:00Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme: - UNIX
- Windows
References
| URL | Category | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1850 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1850.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1850 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1850"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX25-014 vom 2025-08-14",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-XRX25-014-for-Xerox-FreeFlow-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX25-015 vom 2025-08-14",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-XRX25-015-Xerox-FreeFlow-Print-Server-v2_Windows-10.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-017 vom 2025-10-07",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/10/Xerox-Security-Bulletin-XRX25-017-for-Xerox-FreeFlow-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-016 vom 2025-10-07",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/10/Xerox-Security-Bulletin-XRX25-016-for-Xerox-FreeFlow-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-018 vom 2025-11-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/11/Xerox-Security-Bulletin-XRX25-018-Xerox-FreeFlow-Print-Server-v7.pdf"
}
],
"source_lang": "en-US",
"title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2025-11-17T23:00:00.000+00:00",
"generator": {
"date": "2025-11-18T08:12:52.112+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1850",
"initial_release_date": "2025-08-14T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-14T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
},
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T035098",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T046288",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v2",
"product": {
"name": "Xerox FreeFlow Print Server v2",
"product_id": "T046289",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v2"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12718",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-12718"
},
{
"cve": "CVE-2024-12797",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-12797"
},
{
"cve": "CVE-2024-13176",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-13176"
},
{
"cve": "CVE-2024-36350",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-36350"
},
{
"cve": "CVE-2024-36357",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-36357"
},
{
"cve": "CVE-2024-37894",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-37894"
},
{
"cve": "CVE-2024-42516",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-42516"
},
{
"cve": "CVE-2024-43204",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-43204"
},
{
"cve": "CVE-2024-43394",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-43394"
},
{
"cve": "CVE-2024-45802",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-45802"
},
{
"cve": "CVE-2024-47252",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-47252"
},
{
"cve": "CVE-2024-48615",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-48615"
},
{
"cve": "CVE-2024-56406",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-56406"
},
{
"cve": "CVE-2024-8176",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2024-8176"
},
{
"cve": "CVE-2025-1632",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-1632"
},
{
"cve": "CVE-2025-1795",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-1795"
},
{
"cve": "CVE-2025-21574",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21574"
},
{
"cve": "CVE-2025-21575",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21575"
},
{
"cve": "CVE-2025-21577",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21577"
},
{
"cve": "CVE-2025-21579",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21579"
},
{
"cve": "CVE-2025-21580",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21580"
},
{
"cve": "CVE-2025-21581",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21581"
},
{
"cve": "CVE-2025-21583",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21583"
},
{
"cve": "CVE-2025-21584",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21584"
},
{
"cve": "CVE-2025-21585",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21585"
},
{
"cve": "CVE-2025-21588",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-21588"
},
{
"cve": "CVE-2025-23048",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-23048"
},
{
"cve": "CVE-2025-25724",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-25724"
},
{
"cve": "CVE-2025-2817",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-2817"
},
{
"cve": "CVE-2025-29915",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-29915"
},
{
"cve": "CVE-2025-29916",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-29916"
},
{
"cve": "CVE-2025-29917",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-29917"
},
{
"cve": "CVE-2025-29918",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-29918"
},
{
"cve": "CVE-2025-30681",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30681"
},
{
"cve": "CVE-2025-30682",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30682"
},
{
"cve": "CVE-2025-30683",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30683"
},
{
"cve": "CVE-2025-30684",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30684"
},
{
"cve": "CVE-2025-30685",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30685"
},
{
"cve": "CVE-2025-30687",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30687"
},
{
"cve": "CVE-2025-30688",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30688"
},
{
"cve": "CVE-2025-30689",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30689"
},
{
"cve": "CVE-2025-30693",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30693"
},
{
"cve": "CVE-2025-30695",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30695"
},
{
"cve": "CVE-2025-30696",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30696"
},
{
"cve": "CVE-2025-30699",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30699"
},
{
"cve": "CVE-2025-30703",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30703"
},
{
"cve": "CVE-2025-30704",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30704"
},
{
"cve": "CVE-2025-30705",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30705"
},
{
"cve": "CVE-2025-30715",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30715"
},
{
"cve": "CVE-2025-30721",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30721"
},
{
"cve": "CVE-2025-30722",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30722"
},
{
"cve": "CVE-2025-30749",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30749"
},
{
"cve": "CVE-2025-30754",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30754"
},
{
"cve": "CVE-2025-30761",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-30761"
},
{
"cve": "CVE-2025-31498",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-31498"
},
{
"cve": "CVE-2025-31650",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-31650"
},
{
"cve": "CVE-2025-31651",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-31651"
},
{
"cve": "CVE-2025-3875",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-3875"
},
{
"cve": "CVE-2025-3877",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-3877"
},
{
"cve": "CVE-2025-3909",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-3909"
},
{
"cve": "CVE-2025-3932",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-3932"
},
{
"cve": "CVE-2025-4082",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4082"
},
{
"cve": "CVE-2025-4083",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4083"
},
{
"cve": "CVE-2025-4084",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4084"
},
{
"cve": "CVE-2025-4085",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4085"
},
{
"cve": "CVE-2025-4086",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4086"
},
{
"cve": "CVE-2025-4087",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4087"
},
{
"cve": "CVE-2025-4088",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4088"
},
{
"cve": "CVE-2025-4089",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4089"
},
{
"cve": "CVE-2025-4090",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4090"
},
{
"cve": "CVE-2025-40909",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-40909"
},
{
"cve": "CVE-2025-4091",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4091"
},
{
"cve": "CVE-2025-4092",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4092"
},
{
"cve": "CVE-2025-4093",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4093"
},
{
"cve": "CVE-2025-4138",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4138"
},
{
"cve": "CVE-2025-4330",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4330"
},
{
"cve": "CVE-2025-4516",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4516"
},
{
"cve": "CVE-2025-4517",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4517"
},
{
"cve": "CVE-2025-4575",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4575"
},
{
"cve": "CVE-2025-46701",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-46701"
},
{
"cve": "CVE-2025-46802",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-46802"
},
{
"cve": "CVE-2025-46804",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-46804"
},
{
"cve": "CVE-2025-46805",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-46805"
},
{
"cve": "CVE-2025-47159",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47159"
},
{
"cve": "CVE-2025-47971",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47971"
},
{
"cve": "CVE-2025-47972",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47972"
},
{
"cve": "CVE-2025-47973",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47973"
},
{
"cve": "CVE-2025-47975",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47975"
},
{
"cve": "CVE-2025-47976",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47976"
},
{
"cve": "CVE-2025-47980",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47980"
},
{
"cve": "CVE-2025-47981",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47981"
},
{
"cve": "CVE-2025-47982",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47982"
},
{
"cve": "CVE-2025-47984",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47984"
},
{
"cve": "CVE-2025-47985",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47985"
},
{
"cve": "CVE-2025-47986",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47986"
},
{
"cve": "CVE-2025-47987",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47987"
},
{
"cve": "CVE-2025-47991",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47991"
},
{
"cve": "CVE-2025-47996",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47996"
},
{
"cve": "CVE-2025-47999",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-47999"
},
{
"cve": "CVE-2025-48000",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48000"
},
{
"cve": "CVE-2025-48001",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48001"
},
{
"cve": "CVE-2025-48799",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48799"
},
{
"cve": "CVE-2025-48800",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48800"
},
{
"cve": "CVE-2025-48803",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48803"
},
{
"cve": "CVE-2025-48804",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48804"
},
{
"cve": "CVE-2025-48805",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48805"
},
{
"cve": "CVE-2025-48806",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48806"
},
{
"cve": "CVE-2025-48808",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48808"
},
{
"cve": "CVE-2025-48811",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48811"
},
{
"cve": "CVE-2025-48814",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48814"
},
{
"cve": "CVE-2025-48815",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48815"
},
{
"cve": "CVE-2025-48816",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48816"
},
{
"cve": "CVE-2025-48817",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48817"
},
{
"cve": "CVE-2025-48818",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48818"
},
{
"cve": "CVE-2025-48819",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48819"
},
{
"cve": "CVE-2025-48820",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48820"
},
{
"cve": "CVE-2025-48821",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48821"
},
{
"cve": "CVE-2025-48822",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48822"
},
{
"cve": "CVE-2025-48823",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-48823"
},
{
"cve": "CVE-2025-4918",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4918"
},
{
"cve": "CVE-2025-4919",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-4919"
},
{
"cve": "CVE-2025-49630",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49630"
},
{
"cve": "CVE-2025-49658",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49658"
},
{
"cve": "CVE-2025-49659",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49659"
},
{
"cve": "CVE-2025-49660",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49660"
},
{
"cve": "CVE-2025-49661",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49661"
},
{
"cve": "CVE-2025-49664",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49664"
},
{
"cve": "CVE-2025-49665",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49665"
},
{
"cve": "CVE-2025-49667",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49667"
},
{
"cve": "CVE-2025-49675",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49675"
},
{
"cve": "CVE-2025-49678",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49678"
},
{
"cve": "CVE-2025-49679",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49679"
},
{
"cve": "CVE-2025-49680",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49680"
},
{
"cve": "CVE-2025-49683",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49683"
},
{
"cve": "CVE-2025-49684",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49684"
},
{
"cve": "CVE-2025-49686",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49686"
},
{
"cve": "CVE-2025-49687",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49687"
},
{
"cve": "CVE-2025-49689",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49689"
},
{
"cve": "CVE-2025-49691",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49691"
},
{
"cve": "CVE-2025-49709",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49709"
},
{
"cve": "CVE-2025-49710",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49710"
},
{
"cve": "CVE-2025-49721",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49721"
},
{
"cve": "CVE-2025-49722",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49722"
},
{
"cve": "CVE-2025-49725",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49725"
},
{
"cve": "CVE-2025-49726",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49726"
},
{
"cve": "CVE-2025-49727",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49727"
},
{
"cve": "CVE-2025-49730",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49730"
},
{
"cve": "CVE-2025-49732",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49732"
},
{
"cve": "CVE-2025-49740",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49740"
},
{
"cve": "CVE-2025-49742",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49742"
},
{
"cve": "CVE-2025-49744",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49744"
},
{
"cve": "CVE-2025-49760",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49760"
},
{
"cve": "CVE-2025-49812",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-49812"
},
{
"cve": "CVE-2025-50059",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-50059"
},
{
"cve": "CVE-2025-50106",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-50106"
},
{
"cve": "CVE-2025-5263",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5263"
},
{
"cve": "CVE-2025-5264",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5264"
},
{
"cve": "CVE-2025-5265",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5265"
},
{
"cve": "CVE-2025-5266",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5266"
},
{
"cve": "CVE-2025-5267",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5267"
},
{
"cve": "CVE-2025-5268",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5268"
},
{
"cve": "CVE-2025-5269",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5269"
},
{
"cve": "CVE-2025-5270",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5270"
},
{
"cve": "CVE-2025-5271",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5271"
},
{
"cve": "CVE-2025-5272",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5272"
},
{
"cve": "CVE-2025-5283",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5283"
},
{
"cve": "CVE-2025-53020",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-53020"
},
{
"cve": "CVE-2025-5601",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-5601"
},
{
"cve": "CVE-2025-6424",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6424"
},
{
"cve": "CVE-2025-6425",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6425"
},
{
"cve": "CVE-2025-6426",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6426"
},
{
"cve": "CVE-2025-6427",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6427"
},
{
"cve": "CVE-2025-6428",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6428"
},
{
"cve": "CVE-2025-6429",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6429"
},
{
"cve": "CVE-2025-6430",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6430"
},
{
"cve": "CVE-2025-6431",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6431"
},
{
"cve": "CVE-2025-6432",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6432"
},
{
"cve": "CVE-2025-6433",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6433"
},
{
"cve": "CVE-2025-6434",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6434"
},
{
"cve": "CVE-2025-6435",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6435"
},
{
"cve": "CVE-2025-6436",
"product_status": {
"known_affected": [
"T035098",
"T002977",
"T046288",
"T046289"
]
},
"release_date": "2025-08-14T22:00:00.000+00:00",
"title": "CVE-2025-6436"
}
]
}
FKIE_CVE-2025-46805
Vulnerability from fkie_nvd - Published: 2025-05-26 14:15 - Updated: 2025-05-28 15:01
Severity ?
Summary
Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root."
},
{
"lang": "es",
"value": "La versi\u00f3n de Screen 5.0.0 y las versiones anteriores 4 tienen una ejecuci\u00f3n TOCTOU que potencialmente permite enviar SIGHUP, SIGCONT a procesos privilegiados cuando se instala setuid-root."
}
],
"id": "CVE-2025-46805",
"lastModified": "2025-05-28T15:01:30.720",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "meissner@suse.de",
"type": "Secondary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "meissner@suse.de",
"type": "Secondary"
}
]
},
"published": "2025-05-26T14:15:20.037",
"references": [
{
"source": "meissner@suse.de",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46805"
},
{
"source": "meissner@suse.de",
"url": "https://www.openwall.com/lists/oss-security/2025/05/12/1"
}
],
"sourceIdentifier": "meissner@suse.de",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-367"
}
],
"source": "meissner@suse.de",
"type": "Secondary"
}
]
}
BDU:2025-11400
Vulnerability from fstec - Published: 12.05.2025
VLAI Severity ?
Title
Уязвимость терминального мультиплексора GNU screen, связанная с ошибками синхронизации при использовании общего ресурса («Ситуация гонки»), позволяющая нарушителю повысить привилегии
Description
Уязвимость терминального мультиплексора GNU screen связана с ошибками синхронизации при использовании общего ресурса («Ситуация гонки»). Эксплуатация уязвимости может позволить нарушителю повысить привилегии
Severity ?
Vendor
Сообщество свободного программного обеспечения, ООО «Ред Софт», АО «ИВК»
Software Name
Debian GNU/Linux, РЕД ОС (запись в едином реестре российских программ №3751), Альт 8 СП (запись в едином реестре российских программ №4305), Screen
Software Version
11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (РЕД ОС), - (Альт 8 СП), 13 (Debian GNU/Linux), до 5.0.0 (Screen)
Possible Mitigations
В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для GNU screen:
https://www.openwall.com/lists/oss-security/2025/05/12/1
Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2025-46805
Для ОС Альт 8 СП: установка обновления из публичного репозитория программного средства: https://altsp.su/obnovleniya-bezopasnosti/
Reference
https://redos.red-soft.ru/support/secure/
https://www.openwall.com/lists/oss-security/2025/05/12/1
https://security-tracker.debian.org/tracker/CVE-2025-46805
https://altsp.su/obnovleniya-bezopasnosti/
CWE
CWE-367
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": "AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), 13 (Debian GNU/Linux), \u0434\u043e 5.0.0 (Screen)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f GNU screen:\nhttps://www.openwall.com/lists/oss-security/2025/05/12/1\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2025-46805\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430: https://altsp.su/obnovleniya-bezopasnosti/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.05.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "02.10.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "22.09.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-11400",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-46805",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), Screen",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 13 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043c\u0443\u043b\u044c\u0442\u0438\u043f\u043b\u0435\u043a\u0441\u043e\u0440\u0430 GNU screen, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438 Time-of-check Time-of-use (TOCTOU) (CWE-367)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043c\u0443\u043b\u044c\u0442\u0438\u043f\u043b\u0435\u043a\u0441\u043e\u0440\u0430 GNU screen \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://redos.red-soft.ru/support/secure/\nhttps://www.openwall.com/lists/oss-security/2025/05/12/1\nhttps://security-tracker.debian.org/tracker/CVE-2025-46805\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-367",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 4.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,7)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…