cobbler-3.2.2-11.fc34
FEDORA-2022-ad2b0ad61b Packages in this update: cobbler-3.2.2-11.fc34 Update description: Fix for CVE-2022-0860 Read More
cobbler-3.3.2-1.fc36
FEDORA-2022-224e71968f Packages in this update: cobbler-3.3.2-1.fc36 Update description: Fix for CVE-2022-0860 Read More
cobbler-3.2.2-9.fc35
FEDORA-2022-445ec90e7c Packages in this update: cobbler-3.2.2-9.fc35 Update description: Fix for CVE-2022-0860 Read More
CVE-2021-25220
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier...
java-latest-openjdk-17.0.2.0.8-1.rolling.el8
FEDORA-EPEL-2022-b042a4581a Packages in this update: java-latest-openjdk-17.0.2.0.8-1.rolling.el8 Update description: New in release OpenJDK 17.0.2 (2022-01-18): Live versions of these release notes can be found at: -...
LSN-0085-1: Kernel Live Patch Security Notice
Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature....
GIMMICK Implant Used by StormCloud APT Targeting Users in Asia
FortiGuard Labs is aware of a new variant of the GIMMICK malware that is targeting Asian users. Discovered by researchers at Volexity, the GIMMICK implant...
Joint CyberSecurity Advisory Alert on AvosLocker Ransomware
FortiGuard Labs is aware that a joint advisory on AvosLocker malware was recently issued by the Federal Bureau of Investigation (FBI) and the US Department...
ZDI-22-530: (Pwn2Own) Netatalk ad_addcomment Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. Read More
ZDI-22-529: (Pwn2Own) Netatalk setfilparams Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. Read More