Benjamin Koltermann discovered that containerd incorrectly handled large
user id values. This could result in containers possibly being run as root,
contrary to expectations.
Daily Archives: March 26, 2025
SecurityScorecard Observes Surge in Third-Party Breaches
In its 2025 Global Third-Party Breach Report, SecurityScorecard has found that 35.5% of all cyber breaches in 2024 were third-party related, up from 29% in 2023
exim-4.98.2-1.el8
FEDORA-EPEL-2025-9b4f4b88ff
Packages in this update:
exim-4.98.2-1.el8
Update description:
This is update fixing CVE 2025-30232.
exim-4.98.2-1.el9
FEDORA-EPEL-2025-ff88bfea14
Packages in this update:
exim-4.98.2-1.el9
Update description:
This is an update fixing CVE 2025-30232.
exim-4.98.2-1.fc40
FEDORA-2025-3a56fe6159
Packages in this update:
exim-4.98.2-1.fc40
Update description:
This is an update fixing CVE 2025-30232.
exim-4.98.2-1.fc41
FEDORA-2025-ab7148736c
Packages in this update:
exim-4.98.2-1.fc41
Update description:
This is an update fixing CVE 2025-30232.
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
exim-4.98.2-1.fc42
FEDORA-2025-d7548ec9e2
Packages in this update:
exim-4.98.2-1.fc42
Update description:
This is an update fixing CVE 2025-30232.
This is new version fixing possible remote SQL injection and FTBFS with gcc-15.
USN-7373-1: Exim vulnerability
It was discovered that Exim incorrectly handled certain memory operations.
A remote attacker could use this issue to cause Exim to crash, resulting in
a denial of service, or possibly execute arbitrary code.
Threat Actors Abuse Trust in Cloud Collaboration Platforms
Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials