XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub £¬£¬£¬£¬£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼

Ðû²¼Ê±¼ä 2025-08-14

1. XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub £¬£¬£¬£¬£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼


8ÔÂ12ÈÕ £¬£¬£¬£¬£¬2024Äê3ÔÂÆØ¹âµÄXZ-UtilsºóÃÅÊÂÎñ£¨CVE-2024-3094£©ÈÔÔÚÒ»Á¬·¢½Í £¬£¬£¬£¬£¬BinarlyÑо¿ÍŶӷ¢Ã÷Docker Hub¹Ù·½ÈÝÆ÷¾µÏñ×¢²áÖÐÐÄÉÏÖÁÉÙ±£´æ35¸öÊÜѬȾµÄLinux¾µÏñ £¬£¬£¬£¬£¬ÕâЩ¾µÏñ¿ÉÄÜͨ¹ýת´ïÐÔѬȾÍþвÓû§¼°×éÖ¯Êý¾ÝÇå¾²¡£¡£¡£¡£¡£¡£¸ÃºóÃÅÓɺã¾ÃÏîĿТ˳Õß"Jia Tan"ÉñÃØ×¢Èëxz-utils 5.6.0/5.6.1°æ±¾µÄliblzma.so¿âÖÐ £¬£¬£¬£¬£¬Í¨¹ýglibcµÄIFUNC»úÖÆÐ®ÖÆOpenSSHµÄRSA_public_decryptº¯Êý £¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßʹÓÃÌØÊâË½Ô¿ÈÆ¹ýSSHÉí·ÝÑéÖ¤²¢Ô¶³ÌÖ´ÐÐrootÏÂÁî¡£¡£¡£¡£¡£¡£Ö»¹ÜÎó²î·¢Ã÷½ÏÔçÇÒ¹Ù·½ÒÑÐû²¼5.6.2¼°ÒÔÉÏÐÞ¸´°æ±¾ £¬£¬£¬£¬£¬µ«Æä²ÐÁôÓ°ÏìÈÔ²¨¼°Debian¡¢FedoraµÈÖ÷Á÷Linux¿¯ÐÐ°æ £¬£¬£¬£¬£¬³ÉΪȥÄê×îÑÏÖØµÄÈí¼þ¹©Ó¦Á´Çå¾²ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£¡£Docker Hub×÷ΪȫÇò¿ª·¢Õ߯ձéʹÓõÄÈÝÆ÷¾µÏñƽ̨ £¬£¬£¬£¬£¬ÆäÎÊÌâ¾µÏñµÄÒ»Á¬±£´æÒý·¢µ£ÐÄ¡£¡£¡£¡£¡£¡£BinarlyɨÃè·¢Ã÷ £¬£¬£¬£¬£¬²¿·ÖÊÜѬȾ¾µÏñÈÔ¹ûÕæÐû²¼ £¬£¬£¬£¬£¬ÇÒ±£´æ»ùÓÚÕâЩ»ù´¡¾µÏñ¹¹½¨µÄ"¶þ½×¾µÏñ" £¬£¬£¬£¬£¬ÐγÉת´ïÐÔΣº¦¡£¡£¡£¡£¡£¡£Ðí¶àCI/CD¹ÜµÀ¼°Éú²úϵͳֱ½ÓÒýÓÃDocker Hub¾µÏñ×÷Ϊ»ù´¡²ã £¬£¬£¬£¬£¬Èôδʵʱ¸üР£¬£¬£¬£¬£¬Ð¹¹½¨ÈÝÆ÷½«×Ô¶¯¼ÌÐø¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£Ö»¹ÜBinarlyÒÑÏòDebianµÈά»¤Õßת´ïÇéÐÎ £¬£¬£¬£¬£¬µ«DebianÑ¡Ôñ±£´æÕâЩºóÞµÏñ £¬£¬£¬£¬£¬ÀíÓÉÊÇ"ʹÓÃÌõ¼þ¿Á¿Ì"ÇÒÐèά³Ö´æµµÒ»Á¬ÐÔ £¬£¬£¬£¬£¬½ö½¨ÒéÓû§Ê¹ÓÃ×îа汾¶ø·ÇϼܾɾµÏñ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/


2. Ò½ÁÆÖÎÀí¾ÞÍ·Pacific HealthWorksÔâEverestÀÕË÷Èí¼þ¹¥»÷


8ÔÂ12ÈÕ £¬£¬£¬£¬£¬ÃÀ¹úÄϼÓÖÝÒ½ÁÆÖÎÀíЧÀ;ÞÍ·Pacific HealthWorks£¨PHW£©¿ËÈÕÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷ £¬£¬£¬£¬£¬µ¼ÖÂÆäЧÀ͵ÄÖÁÉÙ50¼ÒÒ½ÁƼ¯ÍÅÊý°Ù·ÝÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£×÷Ϊ×ܲ¿Î»ÓÚ°£¶ûÈû¹±¶àµÄÒ½ÁÆÐ§ÀÍ»ú¹¹£¨MSO£© £¬£¬£¬£¬£¬PHWΪȫÃÀ1200Óà¼ÒÒ½Ôº¡¢Ò½ÉúÕûÌå¼°ÕïËùÌṩ¼±Õï¡¢ÖØÖ¢¼à»¤¡¢Âé×íµÈÁìÓòµÄÐÐÕþÖÎÀíÖ§³Ö £¬£¬£¬£¬£¬ÄêЧÀÍ»¼Õß³¬140ÍòÈ˴Ρ£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖÐ £¬£¬£¬£¬£¬»¼Õß¼°Ô±¹¤µÄÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁƼͼ¡¢°ü¹ÜÐÅÏ¢µÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©Ôâй¶ £¬£¬£¬£¬£¬²¿·ÖÊý¾ÝÑù±¾ÒÑÔÚÀÕË÷ÍÅ»ïµÄ°µÍø²©¿Í¹ûÕæ¡£¡£¡£¡£¡£¡£EverestÍÅ»ïÓÚÉÏÖÜÄ©ÔÚÆä"ÆáºÚÊܺ¦Õß"ÍøÕ¾Ðû²¼PHW¼°Æäæ¢Ãù«Ë¾La PerouseµÄÀÕË÷ÉùÃ÷ £¬£¬£¬£¬£¬ÍþвÈôδÔÚָ׼ʱ¼äÄÚÁªÏµÌ¸ÅÐ £¬£¬£¬£¬£¬½«Ðû²¼°üÀ¨Õ˵¥Êý¾ÝÔÚÄÚµÄ50Óà¼Ò×éÖ¯Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£CybernewsºË²é·¢Ã÷ £¬£¬£¬£¬£¬Ð¹Â¶Îļþº­¸ÇEmergent Medical Associates¡¢Benchmark HospitalistsµÈ¹ØÁª»ú¹¹ £¬£¬£¬£¬£¬Éæ¼°Õï¶Ï´úÂë¡¢°ü¹ÜË÷ÅâµÈ½¹µãÒ½ÁÆÊý¾Ý¡£¡£¡£¡£¡£¡£


https://cybernews.com/news/pacific-healthworks-everest-ransomware-attack-la-perouse-data-leak-physician-groups/


3. º«¹úƱÎñ¾ÞÍ·Yes24Á½ÔÂÄÚ¶þ¶ÈÔâÀÕË÷¹¥»÷ £¬£¬£¬£¬£¬Ð§ÀÍÖÐÖ¹Òý·ÛË¿¿Ö»Å


8ÔÂ12ÈÕ £¬£¬£¬£¬£¬º«¹ú×î´óƱÎñ¼°ÔÚÏßͼÊéÁãÊÛÉÌYes24ÓÚ¿ËÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬µ¼ÖÂÆäÍøÕ¾¼°Òƶ¯Ó¦ÓÃÖÐÖ¹ÊýСʱ £¬£¬£¬£¬£¬ÕâÊǸù«Ë¾²»µ½Á½¸öÔÂÄÚµÚ¶þ´ÎÏÝÈëÍøÂçÇ徲Σ»£» £» £»£»£»ú¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñʼÓÚÍâµØÊ±¼äÆÆÏþ4µã30·Ö £¬£¬£¬£¬£¬Óû§ÎÞ·¨Ô¤¶©Ñݳª»áÃÅÆ±¡¢»á¼ûµç×ÓÊ鼰ʹÓÃÉçÇøÂÛ̳¡£¡£¡£¡£¡£¡£Yes24ѸËÙ½«ÏµÍ³ÀëÏßÒÔ×èÖ¹¹¥»÷ £¬£¬£¬£¬£¬²¢ÒÀÍб¸·ÝÊý¾ÝÔÚ7СʱÄÚ»Ö¸´ÔËÓª £¬£¬£¬£¬£¬µ«Î´Í¸Â¶¹¥»÷ÕßÉí·Ý»òÊÇ·ñÊÕµ½Êê½ðÒªÇ󡣡£¡£¡£¡£¡£ÖÐÖ¹¶Ôº«¹úÊ¢ÐÐÀÖ¶ÓDAY6µÄ·ÛË¿Ôì³ÉÖ±½ÓÓ°Ïì £¬£¬£¬£¬£¬Ô­¶¨ÓÚµ±Íí8µã×îÏȵÄ"The Decade"ѲÑÝÃÅÆ±Ô¤ÊÛ±»ÆÈÔÝÍ£ £¬£¬£¬£¬£¬Ð§Àͻָ´ºó¸Õ¸ÕÖØÆô¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¾à6ÔÂÀÕË÷¹¥»÷½ö¸ôȱ·¦Á½Ô£ºÆäʱ¹¥»÷µ¼ÖÂYes24̱»¾Ô¼ÎåÌì £¬£¬£¬£¬£¬Ó°ÏìÆÓ±¦½£¡¢ENHYPENµÈÒÕÈËÑݳöƱÎñ £¬£¬£¬£¬£¬²¢Ì»Â¶Æäȱ·¦ÒìµØ±¸·ÝϵͳµÄÇå¾²¶Ì°å¡£¡£¡£¡£¡£¡£Ö»¹Ü¸Ã¹«Ë¾ÊºóÔÊÐí"³¹²éÇ徲ϵͳ"¡¢Ô¼ÇëÍⲿÍŶӲ¢Éý¼¶ÏµÍ³ £¬£¬£¬£¬£¬µ«¶þ´ÎÓöÏ®Òý·¢º«¹úýÌåºÍÓû§Ç¿ÁÒÆ·ÆÀ £¬£¬£¬£¬£¬Ö¸ÔðÆäÕû¸Ä²½·¥²»µ½Î»ÇÒÐÅϢ͸Ã÷¶Èȱ·¦¡£¡£¡£¡£¡£¡£


https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected


4. FortinetÖÒÑÔFortiSIEMÔ¤ÊÚȨRCEÎó²î¿ÉÄܱ»Ê¹ÓÃ


8ÔÂ13ÈÕ £¬£¬£¬£¬£¬ÍøÂçÇå¾²³§ÉÌFortinet¿ËÈÕÐû²¼½ôÆÈÇ徲ͨ¸æ £¬£¬£¬£¬£¬Åû¶Æä½¹µãÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©²úÆ·FortiSIEM±£´æÒ»¸öÑÏÖØÆ·¼¶£¨CVSS 9.8£©µÄÔ¶³ÌÏÂÁî×¢ÈëÎó²î£¨CVE-2025-25256£©¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°Ïì°æ±¾¹æÄ£ÆÕ±é £¬£¬£¬£¬£¬º­¸Ç5.4ÖÁ7.3¶à¸ö·ÖÖ§ £¬£¬£¬£¬£¬ÆäÖÐ5.4ÖÁ6.6µÄ¾É°æÏµÍ³ÒÑÖÕÖ¹ÊÖÒÕÖ§³Ö £¬£¬£¬£¬£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ7.3.2¡¢7.2.6µÈ×îÐÂÊÜÖ§³Ö°æ±¾¡£¡£¡£¡£¡£¡£Îó²î³ÉÒòÔ´ÓÚ²úƷδ¶ÔÌØÊâÔªËØ¾ÙÐгä·Ö¹ýÂË £¬£¬£¬£¬£¬µ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâCLIÇëÇó £¬£¬£¬£¬£¬ÔÚÄ¿µÄϵͳִÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£FortinetÈ·ÈϸÃÎó²î±£´æ¿É¹ûÕæ»ñÈ¡µÄʹÓôúÂë £¬£¬£¬£¬£¬ÇÒ¹¥»÷ÐÐΪ²»»á±¬·¢ÆæÒìIOCÌØÕ÷ £¬£¬£¬£¬£¬Ê¹µÃÈëÇÖ¼ì²âÄѶÈÏÔÖøÌáÉý¡£¡£¡£¡£¡£¡£Ö»¹ÜδÃ÷È·ÈÏ¿ÉÁãÈÕʹÓà £¬£¬£¬£¬£¬µ«GreyNoiseÍþвÇ鱨¹«Ë¾Ö¸³ö £¬£¬£¬£¬£¬±¾ÔÂÕë¶ÔFortinet SSL VPNºÍFortiManagerµÄ±©Á¦ÆÆ½â¹¥»÷¼¤Ôö £¬£¬£¬£¬£¬´ËÀàÒì³£Á÷Á¿²¨¶¯ÍùÍùԤʾÐÂÎó²îÅû¶ £¬£¬£¬£¬£¬Á½Õß¿ÉÄܱ£´æ¹ØÁªÐÔ¡£¡£¡£¡£¡£¡£´Ë´ÎÎó²î̻¶ºó £¬£¬£¬£¬£¬Fortinet½¨ÒéÓû§ÓÅÏÈͨ¹ý°æ±¾Éý¼¶ÊµÏÖ¸ùÌìÐÔÐÞ¸´ £¬£¬£¬£¬£¬Í¬Ê±ÌṩÔÝʱ»º½â¼Æ»®¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/


5. ±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒÔâÍøÂç¹¥»÷ÖÂϵͳ̱»¾


8ÔÂ13ÈÕ £¬£¬£¬£¬£¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒ¿ËÈÕÔâÓöÑÏÖØÍøÂç¹¥»÷ £¬£¬£¬£¬£¬µ¼ÖÂÆä½¹µãÐÅϢϵͳÖÜȫ̱»¾ £¬£¬£¬£¬£¬°üÀ¨¹Ù·½ÍøÕ¾¡¢µç×ÓÓʼþÕË»§¼°Àο¿µç»°Ïß·¾ù´¦ÓÚÀëÏß״̬¡£¡£¡£¡£¡£¡£Ë¾·¨²¿³¤´÷·ò¡¤É£µÏ£¨Dave Sunday£©Í¨¹ýÉ罻ýÌå֤ʵ £¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒÑ´¥·¢¿ç²¿·ÖЭ×÷ÏìÓ¦ £¬£¬£¬£¬£¬ÊÖÒÕÖ°Ô±ÔÚÖ´·¨»ú¹¹Ö§³ÖÏÂÕýÈ«Á¦»Ö¸´Ð§ÀͲ¢ÊӲ칥»÷Ô´Í·¡£¡£¡£¡£¡£¡£Ö»¹ÜÄ¿½ñ¹¥»÷ǰÑÔÉÐδÃ÷È· £¬£¬£¬£¬£¬ÇÒÎÞÀÕË÷Èí¼þ×éÖ¯¹ûÕæÈÏÁìÔðÈÎ £¬£¬£¬£¬£¬µ«ÊÂÎñµÄÆÕ±éÓ°Ï켰ϵͳ̱»¾ÌØÕ÷Óëµä·¶ÀÕË÷¹¥»÷¸ß¶ÈÎÇºÏ £¬£¬£¬£¬£¬Òý·¢¶ÔDZÔÚ¹©Ó¦Á´Î£º¦µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼Ò¿­ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©µÄ·¢Ã÷ΪÊÂÎñÊÓ²ìÌṩÁËÒªº¦ÏßË÷£º¸Ã°ì¹«ÊÒÃæÏò¹«ÖÚµÄCitrix NetScaler×°±¸ÒòδÐÞ²¹CVE-2025-5777Îó²î¶øºã¾Ã̻¶ÓÚ¹¥»÷Σº¦ÖС£¡£¡£¡£¡£¡£ShodanɨÃèÊý¾ÝÏÔʾ £¬£¬£¬£¬£¬Á½Ì¨Ïà¹Ø×°±¸»®·ÖÓÚ7ÔÂ29ÈÕºÍ8ÔÂ7ÈÕÀëÏß £¬£¬£¬£¬£¬Ê±¼äÏßÓë¹¥»÷±¬·¢¸ß¶ÈÖØºÏ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÁÐÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡± £¬£¬£¬£¬£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ24СʱÄÚÍê³ÉÐÞ²¹¡£¡£¡£¡£¡£¡£×èÖ¹±¨µÀÐû²¼ £¬£¬£¬£¬£¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤ÍøÕ¾ÈÔδ»Ö¸´ £¬£¬£¬£¬£¬ÏµÍ³ÐÞ¸´ÊÂÇéÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/


6. AIÉî¶ÈαÔìÊÖÒÕ´ßÉú¿ç¹úͶ×ÊȦÌ× £¬£¬£¬£¬£¬È«Çò¶à¹úÓû§Ô⾫׼ΧÁÔ


8ÔÂ13ÈÕ £¬£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹Group-IB¿ËÈÕÅû¶ £¬£¬£¬£¬£¬Õ©Æ­·Ö×ÓÕýʹÓÃÌìÉúʽAIÊÖÒÕ¹¹½¨¸ß¶È±ÆÕæµÄÚ²Æ­ÍøÂç £¬£¬£¬£¬£¬Í¨¹ýÉî¶ÈαÔìÊÓÆµ¡¢Î±ÔìÐÂÎÅÄÚÈݼ°¶¨Ïò¹ã¸æÍ¶·Å £¬£¬£¬£¬£¬ÓÕÆ­È«Çò¶à¹úͶ×ÊÕß¼ÓÈëÐéαÉúÒâÆ½Ì¨¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ £¬£¬£¬£¬£¬´ËÀàȦÌ×ÒÑÐΪϰ컣» £» £»£»£»¯¹¤ÒµÁ´ £¬£¬£¬£¬£¬ÆäÊÖÒÕÖØÆ¯ºóÓëÐÄÀí²Ù¿ØÊֶξù´ïи߶È¡£¡£¡£¡£¡£¡£½¹µãڲƭÊÖ·¨ÒÔAIÌìÉúµÄÉî¶ÈαÔìÊÓÆµÎªÍ»ÆÆ¿Ú¡£¡£¡£¡£¡£¡£Õ©Æ­Õ߿ˡºÉÀ¼¼«ÓÒÒíÕþ¿Íº£¶ûÌØ¡¤Î¬¶ûµÂ˹µÈ¹«ÖÚÈËÎïµÄÓ°ÏñÓëÉùÒô £¬£¬£¬£¬£¬ÖÆ×÷¿´ËÆÕæÊµµÄÐÂÎÅ·Ã̸Ƭ¶Ï £¬£¬£¬£¬£¬Á¬Ïµ¸Ä¶¯µÄÉúÒâÊý¾Ýͼ±íÓëÐéαר¼Ò±³Êé £¬£¬£¬£¬£¬ÓªÔì³ö"¶À¼ÒͶ×Êʱ»ú"µÄ½ôÆÈ¸Ð¡£¡£¡£¡£¡£¡£Êܺ¦Õß±»Ö¸µ¼ÖÁαÔìµÄÐÂÎÅÍøÕ¾ £¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾Í¨¹ýÍâµØ»¯ÄÚÈÝÊÊÅäÓû§ËùÔÚ¹ú¼ÒÓïÑÔ £¬£¬£¬£¬£¬²¢Ç¶ÈëÉ罻ýÌåÕ˺𢲩¿ÍÎÄÕ¼°YouTubeƵµÀ¾ÙÐжàÇþµÀÍÆ¹ã £¬£¬£¬£¬£¬ÐγÉÐéαÐÅÏ¢Éú̬¡£¡£¡£¡£¡£¡£×¢²á½×¶Î £¬£¬£¬£¬£¬Æ½Ì¨ÒÔ"С¶î°ü¹Ü½ð"£¨100-250ÃÀÔª£©½µµÍÓû§Ð¡ÐÄÐÔ £¬£¬£¬£¬£¬ËæºóÒªÇóÌá½»Éí·ÝÖ¤¡¢×¡Ö·Ö¤ÊµÉõÖÁÐÅÓÿ¨ÕÕÆ¬µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÖµµÃСÐĵÄÊÇ £¬£¬£¬£¬£¬´ËÀàÍøÕ¾Í¨¹ýIPµØµãÓëÓïÑÔ¼ì²âʵÏÖ¾«×¼ÆÁÕÏ £¬£¬£¬£¬£¬ÃÀ¹úºÍÒÔÉ«ÁÐÓû§ÎÞ·¨»á¼û £¬£¬£¬£¬£¬¶øÓ¡¶È¡¢Ó¢¹ú¡¢µÂ¹ú¡¢ÈÕ±¾µÈ13¸ö¹ú¼Ò³ÉΪÖ÷ҪĿµÄ¡£¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/deepfake-ai-trading-scams-target/