lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

63
active users

#cve

4 posts4 participants0 posts today

EU Vulnerability Database (#EUVD) launches this week. And not a moment too soon.

The EU Agency for Cybersecurity (#ENISA) has brought EUVD out of beta. Born from a 2022 EU law, EUVD will work alongside MITRE’s Common Vulnerabilities and Exposures database (#CVE)—the future of which is still hazy after last month’s last-minute funding reprieve.

ENISA executive director Juhan Lepassaar (pictured) is keen to get on with the job. In #SBBlogwatch, we take this kiss throughout the world.

@TheFuturumGroup @TechstrongGroup @SecurityBlvd: securityboulevard.com/2025/05/

Security Boulevard · As US CVE Database Fumbles, EU ‘Replacement’ Goes LiveDiesen Kuß der ganzen Welt! European Union Vulnerability Database (EUVD) launches this week. And not a moment too soon.

glibc (2.41-7) unstable; urgency=medium

Starting with glibc 2.41, shared libraries requiring an executable stack
cannot be dynamically loaded through the #dlopen mechanism from a binary that
does not require an executable stack. This change aims to improve security,
as the previous behavior was used as a vector for RCE (#CVE-2023-38408).
Attempting to do so will result in the following error:

cannot enable executable stack as shared object requires: Invalid argument

While most libraries generated in the past 20 years do not require an
executable stack, some third-party software still need this capability. Many
vendors have already updated their binaries to address this.

If you need to run a program that requires an executable stack through
dynamic loaded shared libraries, you can use the glibc.rtld.execstack
tunable:

Glibc6_TUNABLES=glibc.rtld.execstack=2 ./program

-- Aurelien Jarno <aurel32@debian.org> Sun, 13 Apr 2025 14:41:11 +0200

🛡️ The OVR Foundation website is live!
We were founded after the U.S. government’s 2025 threat to cut funding for the CVE program — a crucial piece of the cybersecurity landscape. Now, we’re working to create a decentralized, resilient standard for global vulnerability coordination.

🔧 Small updates will follow in the next few days.
🌍 Visit us: ovr-foundation.org
🔗 #CyberSecurity #OVR #Infosec #Decentralization #OpenStandard #CVE

CVE-FoundationHome - OVR FoundationThe OVR Foundation is developing a decentralized standard for global vulnerability coordination — transparent, resilient, and independent.

I wrote a Discord bot to monitor for CVEs being mentioned in chat, and then it will fetch the details and post it back to chat.

It also has a feature to monitor for new KEV notifications and send them to a dedicated channel

Collab with me. Use it. Abuse it. What ever ya want!

github.com/mauvehed/kevvy

A Discord bot for searching the Common Vulnerabilities and Exposures (CVE) list and providing KEV updates. - mauvehed/kevvy
GitHubGitHub - mauvehed/kevvy: A Discord bot for searching the Common Vulnerabilities and Exposures (CVE) list and providing KEV updates.A Discord bot for searching the Common Vulnerabilities and Exposures (CVE) list and providing KEV updates. - mauvehed/kevvy
#CVSS#CVE#KEV

#CVE fallout: The splintering of the standard #vulnerability tracking system has begun
Earlier this week, CVE program faced doom as the #US #government discontinued funding for #MITRE, the non-profit that operates the program. Uncle Sam U-turned at the very last minute.
Meanwhile, the #EU is rolling its own. #EuropeanUnion Agency for #Cybersecurity (#ENISA) developed and maintains this alternative, which is known as the #EUVD, or the European Union Vulnerability Database.
theregister.com/2025/04/18/spl

The Register · CVE fallout: The splintering of the standard vulnerability tracking system has begunBy Jessica Lyons

😅 CISA extends funding to ensure 'no lapse in critical CVE services' | @BleepingComputer

"The CVE Program is invaluable to cyber community and a priority of CISA," the U.S. cybersecurity agency told BleepingComputer. "Last night, CISA executed the option period on the contract to ensure there will be no lapse in critical CVE services. We appreciate our partners' and stakeholders' patience."

bleepingcomputer.com/news/secu

#cve#cisa#uspol
Replied in thread

I frequently grump about what the #CVE system has become in practice. Folks may think that I’m not a proponent of the program. That’s not true at all. I’m an advocate for it, and for all those who pour their time and talent into it (often voluntarily).

But, IMO it is an overstatement to say that a CVE is a critical element in coordinating response to emerging vulnerabilities like heartbleed or log4shell. Embargoed critical vulns are rarely identified with CVEs among defenders.