Aggregator
CVE-2025-38288 | Linux Kernel up to 6.12.33/6.15.2 scsi smp_processor_id privilege escalation (Nessus ID 265934 / WID-SEC-2025-1522)
CVE-2025-38287 | Linux Kernel up to 6.15.2 cm_free_priv_msg assertion (Nessus ID 246953 / WID-SEC-2025-1522)
Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar ChatGPT Agent
This week’s cybersecurity roundup highlights escalating threats from misconfigurations, software flaws, and advanced malware. Key incidents demand immediate attention from IT teams and executives. ISC patched CVE-2025-5470 in BIND 9 (versions 9.16.0–9.18.26), a DoS vulnerability (CVSS 8.6) allowing server crashes through malformed DNS queries. It risks amplification attacks on global infrastructure—update DNS servers urgently. Google […]
The post Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar ChatGPT Agent appeared first on Cyber Security News.
V1t CTF 2025
Date: Oct. 31, 2025, 1 p.m. — 02 Nov. 2025, 13:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctf.v1t.site/
Rating weight: 0
Event organizers: R4wr
N1CTF 2025
Date: Nov. 1, 2025, noon — 02 Nov. 2025, 12:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctf2025.nu1l.com/
Rating weight: 94.50
Event organizers: Nu1L
NDSS 2025 – BULKHEAD: Secure, Scalable, And Efficient Kernel Compartmentalization With PKS
SESSION Session 1D: System-Level Security
Authors, Creators & Presenters: Yinggang Guo (State Key Laboratory for Novel Software Technology, Nanjing University; University of Minnesota), Zicheng Wang (State Key Laboratory for Novel Software Technology, Nanjing University), Weiheng Bai (University of Minnesota), Qingkai Zeng (State Key Laboratory for Novel Software Technology, Nanjing University), Kangjie Lu (University of Minnesota)
PAPER
BULKHEAD: Secure, Scalable, And Efficient Kernel Compartmentalization With PKS
The endless stream of vulnerabilities urgently calls for principled mitigation to confine the effect of exploitation. However, the monolithic architecture of commodity OS kernels, like the Linux kernel, allows an attacker to compromise the entire system by exploiting a vulnerability in any kernel component. Kernel compartmentalization is a promising approach that follows the least-privilege principle. However, existing mechanisms struggle with the trade-off on security, scalability, and performance, given the challenges stemming from mutual untrustworthiness among numerous and complex components. In this paper, we present BULKHEAD, a secure, scalable, and efficient kernel compartmentalization technique that offers bi-directional isolation for unlimited compartments. It leverages Intel's new hardware feature PKS to isolate data and code into mutually untrusted compartments and benefits from its fast compartment switching. With untrust in mind, BULKHEAD introduces a lightweight in-kernel monitor that enforces multiple important security invariants, including data integrity, execute-only memory, and compartment interface integrity. In addition, it provides a locality-aware two-level scheme that scales to unlimited compartments. We implement a prototype system on Linux v6.1 to compartmentalize loadable kernel modules (LKMs). Extensive evaluation confirms the effectiveness of our approach. As the system-wide impacts, BULKHEAD incurs an average performance overhead of 2.44% for real-world applications with 160 compartmentalized LKMs. While focusing on a specific compartment, ApacheBench tests on ipv6 show an overhead of less than 2%. Moreover, the performance is almost unaffected by the number of compartments, which makes it highly scalable.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel.
The post NDSS 2025 – BULKHEAD: Secure, Scalable, And Efficient Kernel Compartmentalization With PKS appeared first on Security Boulevard.
CVE-2023-25868 | Adobe Substance 3D Stager up to 2.0.0 heap-based overflow (apsb23-22 / EUVD-2023-29756)
CVE-2023-25870 | Adobe Substance 3D Stager up to 2.0.0 out-of-bounds write (apsb23-22 / EUVD-2023-29758)
CVE-2023-25871 | Adobe Substance 3D Stager up to 2.0.0 use after free (apsb23-22 / EUVD-2023-29759)
CVE-2023-25869 | Adobe Substance 3D Stager up to 2.0.0 File out-of-bounds (apsb23-22 / EUVD-2023-29757)
CVE-2023-40815 | OpenCRX 5.2.0 Category Creation Name cross site scripting (EUVD-2023-2975)
CVE-2023-25864 | Adobe Substance 3D Stager up to 2.0.0 heap-based overflow (apsb23-22 / EUVD-2023-29752)
CVE-2023-25865 | Adobe Substance 3D Stager up to 2.0.0 input validation (apsb23-22 / EUVD-2023-29753)
CVE-2023-25866 | Adobe Substance 3D Stager up to 2.0.0 out-of-bounds write (apsb23-22 / EUVD-2023-29754)
CVE-2023-25867 | Adobe Substance 3D Stager up to 2.0.0 input validation (apsb23-22 / EUVD-2023-29755)
RALord
You must login to view this content