πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-2601 β€Ό

A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46343 β€Ό

A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47411 β€Ό

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. Data about subscribers may be obtained via unsubscribeAction operations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47408 β€Ό

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. There is a CAPTCHA bypass that can lead to subscribing many people.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47406 β€Ό

An issue was discovered in the fe_change_pwd (aka Change password for frontend users) extension before 2.0.5, and 3.x before 3.0.3, for TYPO3. The extension fails to revoke existing sessions for the current user when the password has been changed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3106 β€Ό

An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3107 β€Ό

An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4283 β€Ό

A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46342 β€Ό

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46340 β€Ό

A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3108 β€Ό

An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3917 β€Ό

Improper access control of bootloader function was discovered in Motorola Mobility Motorola e20 prior to version RONS31.267-38-8 allows attacker with local access to read partition or RAM data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47410 β€Ό

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. Data about subscribers may be obtained via createAction operations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3115 β€Ό

An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46341 β€Ό

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ WithSecure Elements Endpoint Protection review: Holistic protection at a great price πŸ“’

Smart cloud-hosted security offering affordable endpoint protection for a wide range of devices at a good price

πŸ“– Read

via "ITPro".
πŸ“’ Apple issues fix for β€˜actively exploited’ WebKit zero-day vulnerability πŸ“’

The update marks the 10th fix for zero-day vulnerabilities this year

πŸ“– Read

via "ITPro".
πŸ“’ Beyond Identity strikes up strategic partnership with World Wide Technology πŸ“’

WWT will implement Beyond Identity’s authentication platform internally while also acting as a global channel partner

πŸ“– Read

via "ITPro".
πŸ“’ Uber says compromised third-party to blame for data breach πŸ“’

Vulnerable third-party vendor Teqtivity sparks second major incident for Uber in the space of three months

πŸ“– Read

via "ITPro".
πŸ“’ How to implement strong authentication πŸ“’

Strong authentication is hugely important, but implementing any regime at scale is not without its challenges

πŸ“– Read

via "ITPro".
πŸ“’ Cyber attack on Australia’s TPG Telecom affects 15,000 customers πŸ“’

It is the third cyber attack on a major Australian telco since October

πŸ“– Read

via "ITPro".