After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free).
Yearly Archives: 2022
Ransomware Groups to Increase Zero-Day Exploit-Based Access Methods in the Future
Trend Micro’s latest research paper analyzed ways in which ransomware groups could evolve to stay on top of strengthened cyber-protection measures
libtar-1.2.20-26.fc37
FEDORA-2022-88772d0a2d
Packages in this update:
libtar-1.2.20-26.fc37
Update description:
fix use-after-free bugs introduced by incorrect memleak fixes (CVE-2021-33640)
libtar-1.2.20-26.fc36
FEDORA-2022-ccc68b06cc
Packages in this update:
libtar-1.2.20-26.fc36
Update description:
fix use-after-free bugs introduced by incorrect memleak fixes (CVE-2021-33640)
Meta Takes Down Over 200 Covert Influence Operations Since 2017
The most common location for influence operations was Russia, according to Meta
xorg-x11-server-Xwayland-22.1.7-1.fc36
FEDORA-2022-3f40d00dd9
Packages in this update:
xorg-x11-server-Xwayland-22.1.7-1.fc36
Update description:
xwayland 22.1.7
CVE-2020-36619
A vulnerability was found in multimon-ng. It has been rated as critical. This issue affects the function add_ch of the file demod_flex.c. The manipulation of the argument ch leads to format string. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is e5a51c508ef952e81a6da25b43034dd1ed023c07. It is recommended to upgrade the affected component. The identifier VDB-216269 was assigned to this vulnerability.
CVE-2020-36618
A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). It is possible to launch the attack remotely. The name of the patch is 46ccc2aee8d063c7b6b4dee2c2834113b7286076. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216252.
How to Surrender to a Drone
The Ukrainian army has released an instructional video explaining how Russian soldiers should surrender to a drone:
“Seeing the drone in the field of view, make eye contact with it,” the video instructs. Soldiers should then raise their arms and signal they’re ready to follow.
After that the drone will move up and down a few meters, before heading off at walking pace in the direction of the nearest representatives of Ukraine’s army, it says.
The video also warns that the drone’s battery may run low, in which case it will head back to base and the soldiers should stay put and await a fresh one.
That one, too, should be met with eye contact and arms raised, it says.
Incredible.
Mobile App Users at Risk as API Keys of Email Marketing Services Exposed
Leaked API keys allow threat actors to perform a variety of unauthorized actions