Six-year campaign targeted thousands of machines in global energy sector
Daily Archives: March 25, 2022
CVE-2018-25032
zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
UK Teen Arrested in Lapsus Crackdown
VMware’s Karen Worstell: This isn’t a black swan world anymore
Karen F. Worstell offers a grim assessment: Security teams, and by extension the organizations they serve, are now “living in a zero-day world.”
“That’s our new reality, and we have to operate on the assumption of breach,” she says.
[ Learn 7 tips for better CISO-CFO relationships and 5 key qualities of successful CISOs. | Sign up for CSO newsletters. ]
At the same time, she sees CISOs dealing with technical debt and limited budgets as well as the expectation that their security initiatives won’t slow the pace of business.
ghc-cmark-gfm-0.2.3-1.fc34 ghc-hakyll-4.13.4.0-5.1.fc34 gitit-0.13.0.0-5.1.fc34 pandoc-2.9.2.1-10.fc34 pandoc-citeproc-0.17.0.1-5.fc34 patat-0.8.6.1-1.1.fc34
FEDORA-2022-1f981071eb
Packages in this update:
ghc-cmark-gfm-0.2.3-1.fc34
ghc-hakyll-4.13.4.0-5.1.fc34
gitit-0.13.0.0-5.1.fc34
pandoc-2.9.2.1-10.fc34
pandoc-citeproc-0.17.0.1-5.fc34
patat-0.8.6.1-1.1.fc34
Update description:
Security fix for CVE-2022-24724
https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x
fixed upstream in Haskell cmark-gfm-0.2.3 in bundled cmark-gfm-0.29.0.gfm.3 C library
pandoc-citeproc: update HsYAML-aeson to 0.2.0.1
ZDI-22-541: (0Day) Array Networks MotionPro Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Array Networks MotionPro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-22-539: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-22-540: Adobe Acrobat Reader DC JP2 File Parsing Use-After-Free Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.