Post Content
Yearly Archives: 2022
GLSA 202209-15: Oracle JDK/JRE: Multiple vulnerabilities
efl-1.26.3-1.fc37 enlightenment-0.25.4-1.fc37
FEDORA-2022-7090749bf4
Packages in this update:
efl-1.26.3-1.fc37
enlightenment-0.25.4-1.fc37
Update description:
Update efl to 1.26.3, enlightenment to 0.25.4. Fixes CVE-2022-37706
efl-1.26.3-1.fc35 enlightenment-0.25.4-1.fc35
FEDORA-2022-bafb72fdc0
Packages in this update:
efl-1.26.3-1.fc35
enlightenment-0.25.4-1.fc35
Update description:
Update efl to 1.26.3, enlightenment to 0.25.4. Fixes CVE-2022-37706
efl-1.26.3-1.fc36 enlightenment-0.25.4-1.fc36
FEDORA-2022-0cc77b384a
Packages in this update:
efl-1.26.3-1.fc36
enlightenment-0.25.4-1.fc36
Update description:
Update efl to 1.26.3, enlightenment to 0.25.4. Fixes CVE-2022-37706
unbound-1.16.3-1.fc35
FEDORA-2022-204ee3da84
Packages in this update:
unbound-1.16.3-1.fc35
Update description:
Fix CVE-2022-3204
unbound-1.16.3-1.fc36
FEDORA-2022-164cf7837e
Packages in this update:
unbound-1.16.3-1.fc36
Update description:
Fix CVE-2022-3204
unbound-1.16.3-1.fc37
FEDORA-2022-1326d2815c
Packages in this update:
unbound-1.16.3-1.fc37
Update description:
Fix CVE-2022-3204
Friday Squid Blogging: Another Giant Squid Washes Up on New Zealand Beach
This one has chewed-up tentacles.
(Note that this is a different squid than the one that recently washed up on a South African beach.)
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines here.
SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware
Researchers have discovered a high-effort search engine optimization (SEO) poisoning campaign that seems to be targeting employees from multiple industries and government sectors when they search for specific terms that are relevant to their work. Clicking on the malicious search results, which are artificially pushed higher in ranking, lead visitors to a known JavaScript malware downloader.
“Our findings suggest the campaign may have foreign intelligence service influence through analysis of the blog post subjects,” researchers from security firm Deepwatch said in a new report. “The threat actors used blog post titles that an individual would search for whose organization may be of interest to a foreign intelligence service e.g., ‘Confidentiality Agreement for Interpreters.’ The Threat Intel Team discovered the threat actors highly likely created 192 blog posts on one site.”