java-1.8.0-openjdk-1.8.0.332.b09-1.fc36 java-11-openjdk-11.0.15.0.10-1.fc36 java-17-openjdk-17.0.3.0.7-1.fc36 java-latest-openjdk-18.0.1.0.10-1.rolling.fc36

Read Time:30 Second

FEDORA-2022-42c08d8bd8

Packages in this update:

java-11-openjdk-11.0.15.0.10-1.fc36
java-17-openjdk-17.0.3.0.7-1.fc36
java-1.8.0-openjdk-1.8.0.332.b09-1.fc36
java-latest-openjdk-18.0.1.0.10-1.rolling.fc36

Update description:

Oracle 04/2022 critical path update

https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA
Cross fingers I had not messed up system JDK.
java-maint have to run several tests to ensure viablity, thus auto karma will be turned off.
Still karma is highly appreciated

Read More

java-1.8.0-openjdk-1.8.0.332.b09-1.fc34 java-11-openjdk-11.0.15.0.10-1.fc34 java-17-openjdk-17.0.3.0.7-1.fc34 java-latest-openjdk-18.0.1.0.10-1.rolling.fc34

Read Time:30 Second

FEDORA-2022-9cc421562b

Packages in this update:

java-11-openjdk-11.0.15.0.10-1.fc34
java-17-openjdk-17.0.3.0.7-1.fc34
java-1.8.0-openjdk-1.8.0.332.b09-1.fc34
java-latest-openjdk-18.0.1.0.10-1.rolling.fc34

Update description:

Oracle 04/2022 critical path update

https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA
Cross fingers I had not messed up system JDK.
java-maint have to run several tests to ensure viablity, thus auto karma will be turned off.
Still karma is highly appreciated

Read More

Computer viruses explained: Definition, types, and examples

Read Time:42 Second

Computer virus definition

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

Like other types of malware, a virus is deployed by attackers to damage or take control of a computer. Its name comes from the method by which it infects its targets. A biological virus like HIV or the flu cannot reproduce on its own; it needs to hijack a cell to do that work for it, wreaking havoc on the infected organism in the process. Similarly, a computer virus isn’t itself a standalone program. It’s a code snippet that inserts itself into some other application. When that application runs, it executes the virus code, with results that range from the irritating to the disastrous.

To read this article in full, please click here

Read More

Russian cyberattacks against Ukraine, other targets expected to rise

Read Time:39 Second

Hacking groups closely linked to the Russian government have made nearly 40 destructive attacks against hundreds of Ukrainian targets since the start of the invasion, according to a report issued by Microsoft.

The attacks have been largely, but not exclusively, targeted at Ukrainian government institutions, and Microsoft’s report noted that these attacks have had damaging effects on the country’s economy and civilian population, in addition to Ukraine’s government and military.

Operating under the apparent direction of three main groups — the GRU military intelligence service, SVR interior ministry and FSB security service — Russian-backed hackers undertook a huge range of offensive cyberoperations against Ukraine, ranging from phishing campaigns and misinformation to data theft and the destruction of critical systems, Microsoft said.

To read this article in full, please click here

Read More

USN-5397-1: curl vulnerabilities

Read Time:16 Second

Patrick Monnerat discovered that curl incorrectly handled certain OAUTH2.
An attacker could possibly use this issue to access sensitive information.
(CVE-2022-22576)

Harry Sintonen discovered that curl incorrectly handled certain requests.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2022-27774, CVE-2022-27775, CVE-2022-27776)

Read More