denial of service

  1. CVE-2025-59529 Avahi mDNS DoS via UNIX socket (local attack)

    A newly disclosed vulnerability in the Avahi mDNS/DNS‑SD implementation — tracked as CVE-2025-59529 — allows unprivileged local users to easily cause a denial-of-service (DoS) against name resolution on affected systems by abusing the simple protocol server’s UNIX domain socket. The bug stems...
  2. CVE-2025-67897 Sequoia OpenPGP DoS Fix 2.1.0

    Sequoia’s OpenPGP library contains a denial-of-service bug tracked as CVE-2025-67897: the library’s aes_key_unwrap routine panics when it’s fed an abnormally short ciphertext, allowing a remote attacker to crash any application that attempts to decrypt a specially crafted OpenPGP message...
  3. CVE-2025-6858: HDF5 Null Pointer Crash in H5C__flush_single_entry

    A null-pointer dereference in the HDF5 C library — specifically in the cache flush routine H5C__flush_single_entry inside src/H5Centry.c — has been cataloged as CVE-2025-6858 and confirmed against HDF5 release 1.14.6, creating a reproducible crash primitive that can be triggered locally and has...
  4. HDF5 CVE-2025-2926 Patch Guide: Null Pointer DoS Remediation

    A null-pointer dereference in HDF5’s metadata cache code — tracked as CVE‑2025‑2926 — can cause application crashes when processing specially crafted HDF5 files and has been confirmed and patched upstream; operators and developers who build, ship, or accept HDF5 content must treat this as a...
  5. CVE-2025-49178: X11 Denial of Service Flaw in Xorg Xwayland TigerVNC Patch Guide

    A newly disclosed vulnerability, tracked as CVE-2025-49178, allows malformed X11 protocol requests to disrupt X server request processing — a flaw that can be weaponized to produce a complete denial of service against affected X server implementations (notably xorg-x11-server, Xwayland and...
  6. wolfSSL Patch Fixes TLS 1.3 Duplicate KeyShare DoS CVE-2025-11933

    wolfSSL has published a patch and coordinated disclosures after researchers reported a denial‑of‑service weakness in its TLS 1.3 ClientHello parsing: specially crafted ClientHello messages that include duplicate key_share (CKS) entries can force excessive resource consumption in wolfSSL 5.8.2...
  7. CVE-2025-62567: Hyper-V Integer Underflow DoS and Patch Guidance

    CVE-2025-62567 is a newly recorded vulnerability in Microsoft’s Hyper‑V virtualization stack that has been flagged as a Denial of Service (DoS) condition caused by an integer underflow (wrap/wraparound); the entry is listed in public trackers and in Microsoft’s Security Update Guide, but...
  8. Linux exFAT CVE-2025-40287 Patch Stops Kernel Hang

    A new Linux kernel vulnerability tracked as CVE-2025-40287 has been disclosed and fixed: an exFAT driver bug where the code failed to validate a dentry's stream size properly, allowing a crafted filesystem entry to trigger an infinite loop and hang the kernel. The flaw arises because the exFAT...
  9. Logrus DoS Patch: Fix for 64 KB Line Token Break in Go Logging

    A denial-of-service flaw in the widely used Go logging library logrus can render Entry.Writer unusable when it receives a single-line log payload larger than 64 KB with no newline characters, creating the potential for sustained or persistent application unavailability until the library is...
  10. CVE-2023-52485 Explained: AMD DMCUB DMUB DoS in Linux Kernel

    The Linux kernel vulnerability tracked as CVE-2023-52485 exposes a deterministic denial‑of‑service condition in the AMD display driver: under certain power‑management races the driver can attempt to send commands to the DMCUB microcontroller while it is powered down, causing the command path to...
  11. CVE-2024-1151 Open vSwitch Kernel DoS: Patch and Protect

    The Linux kernel vulnerability CVE-2024-1151 is a stack‑overflow defect in the Open vSwitch (OVS) kernel module that can be triggered by recursive action operations and yields a reliable denial‑of‑service (DoS) — an attacker who can reach the OVS control path can cause the kernel to crash or the...
  12. Linux Kernel CVE-2024-53050: i915 HDCP Fix Shields Against NULL Pointer Oops

    A null-pointer defensive check added to the Intel i915 HDCP code (hdcp2_get_capability) closes a local denial‑of‑service vector tracked as CVE‑2024‑53050 by ensuring the encoder pointer is validated before use, turning an uncontrolled kernel oops into a deterministic error path and removing a...
  13. Linux perf Hang Fix CVE-2025-37747 Restores Safe Teardown

    Linux kernel maintainers closed a subtle but impactful race in the perf subsystem that could cause hosts to hang while freeing a sigtrap event, a denial‑of‑service condition tracked as CVE‑2025‑37747 and now fixed upstream and in many vendor kernels. Background The Linux perf subsystem is the...
  14. CVE-2024-8354: USB Assertion Crashes QEMU—Urgent Availability Patch

    A reachable assertion in QEMU’s USB handling (usb_ep_get in hw/net/core.c) can be triggered from an unprivileged guest and crash the host-side QEMU process, producing a host-level denial-of-service that administrators must treat as a high-availability risk and remediate immediately. Background /...
  15. HAProxy CVE-2025-11230 DoS: Mitigate mjson Numeric Parsing

    HAProxy Technologies has published an advisory for CVE‑2025‑11230, a high‑severity denial‑of‑service flaw rooted in an Inefficient Algorithm Complexity (CWE‑407) in the embedded mjson JSON parser; specially crafted JSON payloads that include extremely large numeric values can trigger...
  16. Ceph RGW DoS via Empty Copy Source in CopyObject (CVE-2024-47866)

    A newly disclosed high-severity vulnerability in Ceph’s RADOS Gateway (RGW) lets an unauthenticated attacker crash the RGW daemon by issuing an S3 object-copy operation that includes an empty x-amz-copy-source value, producing a reliable denial‑of‑service (DoS) that can render S3-compatible...
  17. CVE-2025-7424 Type Confusion in libxslt Triggers DoS via Untrusted Stylesheets

    A type‑confusion bug in libxslt’s internal node representation — where the same psvi memory field is reused for stylesheet and input nodes — can be forced to misinterpret an XML document and produce out‑of‑bounds accesses, crashes, and memory corruption that result in reliable denial‑of‑service...
  18. CVE-2025-8114: libssh KEX NULL pointer crash DoS and patch guide

    A null-pointer dereference in libssh’s key-exchange (KEX) session‑ID calculation has been publicly disclosed as CVE-2025-8114, and upstream maintainers, distribution security teams, and third‑party trackers classify the flaw as an availability vulnerability that can crash SSH clients or servers...
  19. CVE-2025-29478: Fluent Bit DoS via cfl_list_size size_t conversion in v3.7.2

    A newly cataloged vulnerability, CVE-2025-29478, in Fluent Bit v3.7.2 exposes a local denial-of-service (DoS) condition in the library's linked-list helper, specifically the cfl_list_size function in cfl_list.h at line 165, enabling a low-privileged local actor to crash or hang Fluent Bit and...
  20. Go net textproto ReadResponse CVE-2025-61724: Fix for Quadratic CPU Attack

    A newly published vulnerability in the Go standard library — tracked as CVE-2025-61724 — exposes a classic performance pitfall: the Reader.ReadResponse function in net/textproto could be coaxed into excessive CPU consumption when it constructs response messages composed of a large number of...