ZDI-23-898: (Pwn2Own) Canonical Ubuntu tcindex Double-Free Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Canonical Ubuntu. An attacker must first obtain the ability to execute low-privileged code...
ZDI-23-899: (Pwn2Own) Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code...
ZDI-23-900: (Pwn2Own) Linux Kernel nftables Incorrect Pointer Scaling Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code...
ZDI-23-901: GStreamer PGS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but...
ZDI-23-902: GStreamer SRT File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but...
ZDI-23-903: GStreamer FLAC File Parsing Integer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but...
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system...
Smashing Security podcast #329: Pornhub, Barbie dolls, and can you trust a free TV?
Just how much do porn websites know about your sexual peccadillos? How are Barbie dolls involved in identity scams? And would you trust a completely...
yt-dlp-2023.06.22-1.fc38
FEDORA-2023-6b68ed8725 Packages in this update: yt-dlp-2023.06.22-1.fc38 Update description: Update to 2023.06.22. Fixes rhbz#2216612. Update to 2023.06.21. Fixes rhbz#2216612. Read More
Phony Valentines: Online Dating Scams and How to Spot Them
Sarah didn’t see it coming. A single mom in her late 40s, “Sarah” was especially lonely after her divorce (name changed to protect her identity)....