πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-1043 β€Ό

A flaw was found in the Linux kernelÒ€ℒs io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2961 β€Ό

A use-after-free flaw was found in the Linux kernelÒ€ℒs PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31677 β€Ό

An Insufficient Session Expiration issue was discovered in the Pinniped Supervisor (before v0.19.0). A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0852 β€Ό

There is a flaw in convert2rhel. convert2rhel passes the Red Hat account password to subscription-manager via the command line, which could allow unauthorized users locally on the machine to view the password via the process command line via e.g. htop or ps. The specific impact varies upon the privileges of the Red Hat account in question, but it could affect the integrity, availability, and/or data confidentiality of other systems that are administered by that account. This occurs regardless of how the password is supplied to convert2rhel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0358 β€Ό

A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35020 β€Ό

Advancecomp v2.3 was discovered to contain a heap buffer overflow via the component __interceptor_memcpy at /sanitizer_common/sanitizer_common_interceptors.inc.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36686 β€Ό

Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the month parameter at /admin/?page=reports/stockin&month=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36690 β€Ό

Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user&id=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36688 β€Ό

Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the month parameter at /admin/?page=reports/stockout&month=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36689 β€Ό

Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the month parameter at /admin/?page=reports/waste&month=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35018 β€Ό

Advancecomp v2.3 was discovered to contain a segmentation fault.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35017 β€Ό

Advancecomp v2.3 was discovered to contain a heap buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1199 β€Ό

A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0400 β€Ό

An out-of-bounds read vulnerability was discovered in linux kernel in the smc protocol stack, causing remote dos.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0367 β€Ό

A heap-based buffer overflow flaw was found in libmodbus in function modbus_reply() in src/modbus.c.

πŸ“– Read

via "National Vulnerability Database".
⚠ Firefox 104 is out – no critical bugs, but update anyway ⚠

Two trust-spoofing bugs were the main culprits this month - but neither one was a zero-day.

πŸ“– Read

via "Naked Security".
⚠ LastPass source code breach – do we still recommend password managers? ⚠

What does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?

πŸ“– Read

via "Naked Security".
πŸ•΄ 3 Ways No-Code Developers Can Shoot Themselves in the Foot πŸ•΄

Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the technology can make it easy to make security mistakes.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-27547 β€Ό

HCL iNotes is susceptible to a link to non-existent domain vulnerability. An attacker could use this vulnerability to trick a user into supplying sensitive information such as username, password, credit card number, etc.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36034 β€Ό

nitrado.js is a type safe wrapper for the Nitrado API. Possible ReDoS with lib input of `{{` and with many repetitions of `{{|`. This issue has been patched in all versions above `0.2.5`. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36033 β€Ό

jsoup is a Java HTML parser, built for HTML editing, cleaning, scraping, and cross-site scripting (XSS) safety. jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control characters will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is then possible. This issue is patched in jsoup 1.15.3. Users should upgrade to this version. Additionally, as the unsanitized input may have been persisted, old content should be cleaned again using the updated version. To remediate this issue without immediately upgrading: - disable `SafeList.preserveRelativeLinks`, which will rewrite input URLs as absolute URLs - ensure an appropriate [Content Security Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) is defined. (This should be used regardless of upgrading, as a defence-in-depth best practice.)

πŸ“– Read

via "National Vulnerability Database".