XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub£¬£¬£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼

Ðû²¼Ê±¼ä 2025-08-14

1. XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub£¬£¬£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼


8ÔÂ12ÈÕ£¬£¬£¬2024Äê3ÔÂÆØ¹âµÄXZ-UtilsºóÃÅÊÂÎñ£¨CVE-2024-3094£©ÈÔÔÚÒ»Á¬·¢½Í£¬£¬£¬BinarlyÑо¿ÍŶӷ¢Ã÷Docker Hub¹Ù·½ÈÝÆ÷¾µÏñ×¢²áÖÐÐÄÉÏÖÁÉÙ±£´æ35¸öÊÜѬȾµÄLinux¾µÏñ£¬£¬£¬ÕâЩ¾µÏñ¿ÉÄÜͨ¹ýת´ïÐÔѬȾÍþвÓû§¼°×éÖ¯Êý¾ÝÇå¾²¡£¡£¡£¡£¡£¸ÃºóÃÅÓɺã¾ÃÏîĿТ˳Õß"Jia Tan"ÉñÃØ×¢Èëxz-utils 5.6.0/5.6.1°æ±¾µÄliblzma.so¿âÖУ¬£¬£¬Í¨¹ýglibcµÄIFUNC»úÖÆÐ®ÖÆOpenSSHµÄRSA_public_decryptº¯Êý£¬£¬£¬ÔÊÐí¹¥»÷ÕßʹÓÃÌØÊâË½Ô¿ÈÆ¹ýSSHÉí·ÝÑéÖ¤²¢Ô¶³ÌÖ´ÐÐrootÏÂÁî¡£¡£¡£¡£¡£Ö»¹ÜÎó²î·¢Ã÷½ÏÔçÇÒ¹Ù·½ÒÑÐû²¼5.6.2¼°ÒÔÉÏÐÞ¸´°æ±¾£¬£¬£¬µ«Æä²ÐÁôÓ°ÏìÈÔ²¨¼°Debian¡¢FedoraµÈÖ÷Á÷Linux¿¯Ðаæ£¬£¬£¬³ÉΪȥÄê×îÑÏÖØµÄÈí¼þ¹©Ó¦Á´Çå¾²ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£Docker Hub×÷ΪȫÇò¿ª·¢Õ߯ձéʹÓõÄÈÝÆ÷¾µÏñƽ̨£¬£¬£¬ÆäÎÊÌâ¾µÏñµÄÒ»Á¬±£´æÒý·¢µ£ÐÄ¡£¡£¡£¡£¡£BinarlyɨÃè·¢Ã÷£¬£¬£¬²¿·ÖÊÜѬȾ¾µÏñÈÔ¹ûÕæÐû²¼£¬£¬£¬ÇÒ±£´æ»ùÓÚÕâЩ»ù´¡¾µÏñ¹¹½¨µÄ"¶þ½×¾µÏñ"£¬£¬£¬ÐγÉת´ïÐÔΣº¦¡£¡£¡£¡£¡£Ðí¶àCI/CD¹ÜµÀ¼°Éú²úϵͳֱ½ÓÒýÓÃDocker Hub¾µÏñ×÷Ϊ»ù´¡²ã£¬£¬£¬Èôδʵʱ¸üУ¬£¬£¬Ð¹¹½¨ÈÝÆ÷½«×Ô¶¯¼ÌÐø¶ñÒâ´úÂë¡£¡£¡£¡£¡£Ö»¹ÜBinarlyÒÑÏòDebianµÈά»¤Õßת´ïÇéÐΣ¬£¬£¬µ«DebianÑ¡Ôñ±£´æÕâЩºóÞµÏñ£¬£¬£¬ÀíÓÉÊÇ"ʹÓÃÌõ¼þ¿Á¿Ì"ÇÒÐèά³Ö´æµµÒ»Á¬ÐÔ£¬£¬£¬½ö½¨ÒéÓû§Ê¹ÓÃ×îа汾¶ø·ÇϼܾɾµÏñ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/


2. Ò½ÁÆÖÎÀí¾ÞÍ·Pacific HealthWorksÔâEverestÀÕË÷Èí¼þ¹¥»÷


8ÔÂ12ÈÕ£¬£¬£¬ÃÀ¹úÄϼÓÖÝÒ½ÁÆÖÎÀíЧÀ;ÞÍ·Pacific HealthWorks£¨PHW£©¿ËÈÕÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬µ¼ÖÂÆäЧÀ͵ÄÖÁÉÙ50¼ÒÒ½ÁƼ¯ÍÅÊý°Ù·ÝÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£×÷Ϊ×ܲ¿Î»ÓÚ°£¶ûÈû¹±¶àµÄÒ½ÁÆÐ§ÀÍ»ú¹¹£¨MSO£©£¬£¬£¬PHWΪȫÃÀ1200Óà¼ÒÒ½Ôº¡¢Ò½ÉúÕûÌå¼°ÕïËùÌṩ¼±Õï¡¢ÖØÖ¢¼à»¤¡¢Âé×íµÈÁìÓòµÄÐÐÕþÖÎÀíÖ§³Ö£¬£¬£¬ÄêЧÀÍ»¼Õß³¬140ÍòÈ˴Ρ£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬»¼Õß¼°Ô±¹¤µÄÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁƼͼ¡¢°ü¹ÜÐÅÏ¢µÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©Ôâй¶£¬£¬£¬²¿·ÖÊý¾ÝÑù±¾ÒÑÔÚÀÕË÷ÍÅ»ïµÄ°µÍø²©¿Í¹ûÕæ¡£¡£¡£¡£¡£EverestÍÅ»ïÓÚÉÏÖÜÄ©ÔÚÆä"ÆáºÚÊܺ¦Õß"ÍøÕ¾Ðû²¼PHW¼°Æäæ¢Ãù«Ë¾La PerouseµÄÀÕË÷ÉùÃ÷£¬£¬£¬ÍþвÈôδÔÚָ׼ʱ¼äÄÚÁªÏµÌ¸ÅУ¬£¬£¬½«Ðû²¼°üÀ¨Õ˵¥Êý¾ÝÔÚÄÚµÄ50Óà¼Ò×éÖ¯Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£CybernewsºË²é·¢Ã÷£¬£¬£¬Ð¹Â¶Îļþº­¸ÇEmergent Medical Associates¡¢Benchmark HospitalistsµÈ¹ØÁª»ú¹¹£¬£¬£¬Éæ¼°Õï¶Ï´úÂë¡¢°ü¹ÜË÷ÅâµÈ½¹µãÒ½ÁÆÊý¾Ý¡£¡£¡£¡£¡£


https://cybernews.com/news/pacific-healthworks-everest-ransomware-attack-la-perouse-data-leak-physician-groups/


3. º«¹úƱÎñ¾ÞÍ·Yes24Á½ÔÂÄÚ¶þ¶ÈÔâÀÕË÷¹¥»÷£¬£¬£¬Ð§ÀÍÖÐÖ¹Òý·ÛË¿¿Ö»Å


8ÔÂ12ÈÕ£¬£¬£¬º«¹ú×î´óƱÎñ¼°ÔÚÏßͼÊéÁãÊÛÉÌYes24ÓÚ¿ËÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬µ¼ÖÂÆäÍøÕ¾¼°Òƶ¯Ó¦ÓÃÖÐÖ¹ÊýСʱ£¬£¬£¬ÕâÊǸù«Ë¾²»µ½Á½¸öÔÂÄÚµÚ¶þ´ÎÏÝÈëÍøÂçÇ徲Σ»£»£»£»ú¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñʼÓÚÍâµØÊ±¼äÆÆÏþ4µã30·Ö£¬£¬£¬Óû§ÎÞ·¨Ô¤¶©Ñݳª»áÃÅÆ±¡¢»á¼ûµç×ÓÊ鼰ʹÓÃÉçÇøÂÛ̳¡£¡£¡£¡£¡£Yes24ѸËÙ½«ÏµÍ³ÀëÏßÒÔ×èÖ¹¹¥»÷£¬£¬£¬²¢ÒÀÍб¸·ÝÊý¾ÝÔÚ7СʱÄÚ»Ö¸´ÔËÓª£¬£¬£¬µ«Î´Í¸Â¶¹¥»÷ÕßÉí·Ý»òÊÇ·ñÊÕµ½Êê½ðÒªÇ󡣡£¡£¡£¡£ÖÐÖ¹¶Ôº«¹úÊ¢ÐÐÀÖ¶ÓDAY6µÄ·ÛË¿Ôì³ÉÖ±½ÓÓ°Ï죬£¬£¬Ô­¶¨ÓÚµ±Íí8µã×îÏȵÄ"The Decade"ѲÑÝÃÅÆ±Ô¤ÊÛ±»ÆÈÔÝÍ££¬£¬£¬Ð§Àͻָ´ºó¸Õ¸ÕÖØÆô¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¾à6ÔÂÀÕË÷¹¥»÷½ö¸ôȱ·¦Á½Ô£ºÆäʱ¹¥»÷µ¼ÖÂYes24̱»¾Ô¼ÎåÌ죬£¬£¬Ó°ÏìÆÓ±¦½£¡¢ENHYPENµÈÒÕÈËÑݳöƱÎñ£¬£¬£¬²¢Ì»Â¶Æäȱ·¦ÒìµØ±¸·ÝϵͳµÄÇå¾²¶Ì°å¡£¡£¡£¡£¡£Ö»¹Ü¸Ã¹«Ë¾ÊºóÔÊÐí"³¹²éÇ徲ϵͳ"¡¢Ô¼ÇëÍⲿÍŶӲ¢Éý¼¶ÏµÍ³£¬£¬£¬µ«¶þ´ÎÓöÏ®Òý·¢º«¹úýÌåºÍÓû§Ç¿ÁÒÆ·ÆÀ£¬£¬£¬Ö¸ÔðÆäÕû¸Ä²½·¥²»µ½Î»ÇÒÐÅϢ͸Ã÷¶Èȱ·¦¡£¡£¡£¡£¡£


https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected


4. FortinetÖÒÑÔFortiSIEMÔ¤ÊÚȨRCEÎó²î¿ÉÄܱ»Ê¹ÓÃ


8ÔÂ13ÈÕ£¬£¬£¬ÍøÂçÇå¾²³§ÉÌFortinet¿ËÈÕÐû²¼½ôÆÈÇ徲ͨ¸æ£¬£¬£¬Åû¶Æä½¹µãÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©²úÆ·FortiSIEM±£´æÒ»¸öÑÏÖØÆ·¼¶£¨CVSS 9.8£©µÄÔ¶³ÌÏÂÁî×¢ÈëÎó²î£¨CVE-2025-25256£©¡£¡£¡£¡£¡£¸ÃÎó²îÓ°Ïì°æ±¾¹æÄ£ÆÕ±é£¬£¬£¬º­¸Ç5.4ÖÁ7.3¶à¸ö·ÖÖ§£¬£¬£¬ÆäÖÐ5.4ÖÁ6.6µÄ¾É°æÏµÍ³ÒÑÖÕÖ¹ÊÖÒÕÖ§³Ö£¬£¬£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ7.3.2¡¢7.2.6µÈ×îÐÂÊÜÖ§³Ö°æ±¾¡£¡£¡£¡£¡£Îó²î³ÉÒòÔ´ÓÚ²úƷδ¶ÔÌØÊâÔªËØ¾ÙÐгä·Ö¹ýÂË£¬£¬£¬µ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâCLIÇëÇ󣬣¬£¬ÔÚÄ¿µÄϵͳִÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£FortinetÈ·ÈϸÃÎó²î±£´æ¿É¹ûÕæ»ñÈ¡µÄʹÓôúÂ룬£¬£¬ÇÒ¹¥»÷ÐÐΪ²»»á±¬·¢ÆæÒìIOCÌØÕ÷£¬£¬£¬Ê¹µÃÈëÇÖ¼ì²âÄѶÈÏÔÖøÌáÉý¡£¡£¡£¡£¡£Ö»¹ÜδÃ÷È·ÈÏ¿ÉÁãÈÕʹÓ㬣¬£¬µ«GreyNoiseÍþвÇ鱨¹«Ë¾Ö¸³ö£¬£¬£¬±¾ÔÂÕë¶ÔFortinet SSL VPNºÍFortiManagerµÄ±©Á¦ÆÆ½â¹¥»÷¼¤Ôö£¬£¬£¬´ËÀàÒì³£Á÷Á¿²¨¶¯ÍùÍùԤʾÐÂÎó²îÅû¶£¬£¬£¬Á½Õß¿ÉÄܱ£´æ¹ØÁªÐÔ¡£¡£¡£¡£¡£´Ë´ÎÎó²î̻¶ºó£¬£¬£¬Fortinet½¨ÒéÓû§ÓÅÏÈͨ¹ý°æ±¾Éý¼¶ÊµÏÖ¸ùÌìÐÔÐÞ¸´£¬£¬£¬Í¬Ê±ÌṩÔÝʱ»º½â¼Æ»®¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/


5. ±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒÔâÍøÂç¹¥»÷ÖÂϵͳ̱»¾


8ÔÂ13ÈÕ£¬£¬£¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒ¿ËÈÕÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬£¬µ¼ÖÂÆä½¹µãÐÅϢϵͳÖÜȫ̱»¾£¬£¬£¬°üÀ¨¹Ù·½ÍøÕ¾¡¢µç×ÓÓʼþÕË»§¼°Àο¿µç»°Ïß·¾ù´¦ÓÚÀëÏß״̬¡£¡£¡£¡£¡£Ë¾·¨²¿³¤´÷·ò¡¤É£µÏ£¨Dave Sunday£©Í¨¹ýÉ罻ýÌå֤ʵ£¬£¬£¬´Ë´ÎÊÂÎñÒÑ´¥·¢¿ç²¿·ÖЭ×÷ÏìÓ¦£¬£¬£¬ÊÖÒÕÖ°Ô±ÔÚÖ´·¨»ú¹¹Ö§³ÖÏÂÕýÈ«Á¦»Ö¸´Ð§ÀͲ¢ÊӲ칥»÷Ô´Í·¡£¡£¡£¡£¡£Ö»¹ÜÄ¿½ñ¹¥»÷ǰÑÔÉÐδÃ÷È·£¬£¬£¬ÇÒÎÞÀÕË÷Èí¼þ×éÖ¯¹ûÕæÈÏÁìÔðÈΣ¬£¬£¬µ«ÊÂÎñµÄÆÕ±éÓ°Ï켰ϵͳ̱»¾ÌØÕ÷Óëµä·¶ÀÕË÷¹¥»÷¸ß¶ÈÎǺÏ£¬£¬£¬Òý·¢¶ÔDZÔÚ¹©Ó¦Á´Î£º¦µÄµ£ÐÄ¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼Ò¿­ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©µÄ·¢Ã÷ΪÊÂÎñÊÓ²ìÌṩÁËÒªº¦ÏßË÷£º¸Ã°ì¹«ÊÒÃæÏò¹«ÖÚµÄCitrix NetScaler×°±¸ÒòδÐÞ²¹CVE-2025-5777Îó²î¶øºã¾Ã̻¶ÓÚ¹¥»÷Σº¦ÖС£¡£¡£¡£¡£ShodanɨÃèÊý¾ÝÏÔʾ£¬£¬£¬Á½Ì¨Ïà¹Ø×°±¸»®·ÖÓÚ7ÔÂ29ÈÕºÍ8ÔÂ7ÈÕÀëÏߣ¬£¬£¬Ê±¼äÏßÓë¹¥»÷±¬·¢¸ß¶ÈÖØºÏ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¸ÃÎó²îÒѱ»ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÁÐÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±£¬£¬£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ24СʱÄÚÍê³ÉÐÞ²¹¡£¡£¡£¡£¡£×èÖ¹±¨µÀÐû²¼£¬£¬£¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤ÍøÕ¾ÈÔδ»Ö¸´£¬£¬£¬ÏµÍ³ÐÞ¸´ÊÂÇéÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/


6. AIÉî¶ÈαÔìÊÖÒÕ´ßÉú¿ç¹úͶ×ÊȦÌ×£¬£¬£¬È«Çò¶à¹úÓû§Ô⾫׼ΧÁÔ


8ÔÂ13ÈÕ£¬£¬£¬ÍøÂçÇå¾²»ú¹¹Group-IB¿ËÈÕÅû¶£¬£¬£¬Õ©Æ­·Ö×ÓÕýʹÓÃÌìÉúʽAIÊÖÒÕ¹¹½¨¸ß¶È±ÆÕæµÄÚ²Æ­ÍøÂ磬£¬£¬Í¨¹ýÉî¶ÈαÔìÊÓÆµ¡¢Î±ÔìÐÂÎÅÄÚÈݼ°¶¨Ïò¹ã¸æÍ¶·Å£¬£¬£¬ÓÕÆ­È«Çò¶à¹úͶ×ÊÕß¼ÓÈëÐéαÉúÒâÆ½Ì¨¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬´ËÀàȦÌ×ÒÑÐΪϰ컣»£»£»¯¹¤ÒµÁ´£¬£¬£¬ÆäÊÖÒÕÖØÆ¯ºóÓëÐÄÀí²Ù¿ØÊֶξù´ïи߶ȡ£¡£¡£¡£¡£½¹µãڲƭÊÖ·¨ÒÔAIÌìÉúµÄÉî¶ÈαÔìÊÓÆµÎªÍ»ÆÆ¿Ú¡£¡£¡£¡£¡£Õ©Æ­Õ߿ˡºÉÀ¼¼«ÓÒÒíÕþ¿Íº£¶ûÌØ¡¤Î¬¶ûµÂ˹µÈ¹«ÖÚÈËÎïµÄÓ°ÏñÓëÉùÒô£¬£¬£¬ÖÆ×÷¿´ËÆÕæÊµµÄÐÂÎÅ·Ã̸Ƭ¶Ï£¬£¬£¬Á¬Ïµ¸Ä¶¯µÄÉúÒâÊý¾Ýͼ±íÓëÐéαר¼Ò±³Ê飬£¬£¬ÓªÔì³ö"¶À¼ÒͶ×Êʱ»ú"µÄ½ôÆÈ¸Ð¡£¡£¡£¡£¡£Êܺ¦Õß±»Ö¸µ¼ÖÁαÔìµÄÐÂÎÅÍøÕ¾£¬£¬£¬ÕâÐ©ÍøÕ¾Í¨¹ýÍâµØ»¯ÄÚÈÝÊÊÅäÓû§ËùÔÚ¹ú¼ÒÓïÑÔ£¬£¬£¬²¢Ç¶ÈëÉ罻ýÌåÕ˺𢲩¿ÍÎÄÕ¼°YouTubeƵµÀ¾ÙÐжàÇþµÀÍÆ¹ã£¬£¬£¬ÐγÉÐéαÐÅÏ¢Éú̬¡£¡£¡£¡£¡£×¢²á½×¶Î£¬£¬£¬Æ½Ì¨ÒÔ"С¶î°ü¹Ü½ð"£¨100-250ÃÀÔª£©½µµÍÓû§Ð¡ÐÄÐÔ£¬£¬£¬ËæºóÒªÇóÌá½»Éí·ÝÖ¤¡¢×¡Ö·Ö¤ÊµÉõÖÁÐÅÓÿ¨ÕÕÆ¬µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÖµµÃСÐĵÄÊÇ£¬£¬£¬´ËÀàÍøÕ¾Í¨¹ýIPµØµãÓëÓïÑÔ¼ì²âʵÏÖ¾«×¼ÆÁÕÏ£¬£¬£¬ÃÀ¹úºÍÒÔÉ«ÁÐÓû§ÎÞ·¨»á¼û£¬£¬£¬¶øÓ¡¶È¡¢Ó¢¹ú¡¢µÂ¹ú¡¢ÈÕ±¾µÈ13¸ö¹ú¼Ò³ÉΪÖ÷ҪĿµÄ¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/deepfake-ai-trading-scams-target/