sysstat-12.7.4-1.fc38

Read Time:7 Second

FEDORA-2023-ac947ec260

Packages in this update:

sysstat-12.7.4-1.fc38

Update description:

Update to v12.7.4 (CVE-2023-33204)

Read More

bind-9.18.16-1.fc37 bind-dyndb-ldap-11.10-15.fc37

Read Time:1 Minute, 5 Second

FEDORA-2023-1d526d551c

Packages in this update:

bind-9.18.16-1.fc37
bind-dyndb-ldap-11.10-15.fc37

Update description:

Update to BIND 9.18.16

Selected parts from upstream release notes. Visit that for details of bug fixes.

Security Fixes

The overmem cleaning process has been improved, to prevent the cache from significantly exceeding the configured max-cache-size limit. (CVE-2023-2828)

ISC would like to thank Shoham Danino from Reichman University, Anat Bremler-Barr from Tel-Aviv University, Yehuda Afek from Tel-Aviv University, and Yuval Shavitt from Tel-Aviv University for bringing this vulnerability to our attention. [GL #4055]

A query that prioritizes stale data over lookup triggers a fetch to refresh the stale data in cache. If the fetch is aborted for exceeding the recursion quota, it was possible for named to enter an infinite callback loop and crash due to stack overflow. This has been fixed. (CVE-2023-2911) [GL #4089]

New Features

The system test suite can now be executed with pytest (along with pytest-xdist for parallel execution). [GL #3978]

Removed Features

TKEY mode 2 (Diffie-Hellman Exchanged Keying) is now deprecated, and will be removed in a future release. A warning will be logged when the tkey-dhkey option is used in named.conf. [GL #3905]

Read More

bind-9.18.16-1.fc38 bind-dyndb-ldap-11.10-17.fc38

Read Time:1 Minute, 5 Second

FEDORA-2023-8e1ddb1fa2

Packages in this update:

bind-9.18.16-1.fc38
bind-dyndb-ldap-11.10-17.fc38

Update description:

Update to BIND 9.18.16

Selected parts from upstream release notes. Visit that for details of bug fixes.

Security Fixes

The overmem cleaning process has been improved, to prevent the cache from significantly exceeding the configured max-cache-size limit. (CVE-2023-2828)

ISC would like to thank Shoham Danino from Reichman University, Anat Bremler-Barr from Tel-Aviv University, Yehuda Afek from Tel-Aviv University, and Yuval Shavitt from Tel-Aviv University for bringing this vulnerability to our attention. [GL #4055]

A query that prioritizes stale data over lookup triggers a fetch to refresh the stale data in cache. If the fetch is aborted for exceeding the recursion quota, it was possible for named to enter an infinite callback loop and crash due to stack overflow. This has been fixed. (CVE-2023-2911) [GL #4089]

New Features

The system test suite can now be executed with pytest (along with pytest-xdist for parallel execution). [GL #3978]

Removed Features

TKEY mode 2 (Diffie-Hellman Exchanged Keying) is now deprecated, and will be removed in a future release. A warning will be logged when the tkey-dhkey option is used in named.conf. [GL #3905]

Read More

bind-9.18.16-1.fc39 bind-dyndb-ldap-11.10-17.fc39

Read Time:1 Minute, 5 Second

FEDORA-2023-c0ff5a2f68

Packages in this update:

bind-9.18.16-1.fc39
bind-dyndb-ldap-11.10-17.fc39

Update description:

Update to BIND 9.18.16

Selected parts from upstream release notes. Visit that for details of bug fixes.

Security Fixes

The overmem cleaning process has been improved, to prevent the cache from significantly exceeding the configured max-cache-size limit. (CVE-2023-2828)

ISC would like to thank Shoham Danino from Reichman University, Anat Bremler-Barr from Tel-Aviv University, Yehuda Afek from Tel-Aviv University, and Yuval Shavitt from Tel-Aviv University for bringing this vulnerability to our attention. [GL #4055]

A query that prioritizes stale data over lookup triggers a fetch to refresh the stale data in cache. If the fetch is aborted for exceeding the recursion quota, it was possible for named to enter an infinite callback loop and crash due to stack overflow. This has been fixed. (CVE-2023-2911) [GL #4089]

New Features

The system test suite can now be executed with pytest (along with pytest-xdist for parallel execution). [GL #3978]

Removed Features

TKEY mode 2 (Diffie-Hellman Exchanged Keying) is now deprecated, and will be removed in a future release. A warning will be logged when the tkey-dhkey option is used in named.conf. [GL #3905]

Read More

vim-9.0.1649-1.fc37

Read Time:10 Second

FEDORA-2023-15c591bd6e

Packages in this update:

vim-9.0.1649-1.fc37

Update description:

The newest upstream commit

2215591 – TRIAGE vim: Divide By Zero vulnerability in scroll_cursor_bot() in move.c

Read More

vim-9.0.1649-1.fc38

Read Time:10 Second

FEDORA-2023-6ad6467a06

Packages in this update:

vim-9.0.1649-1.fc38

Update description:

The newest upstream commit

2215591 – TRIAGE vim: Divide By Zero vulnerability in scroll_cursor_bot() in move.c

Read More

A Vulnerability in VMware Aria Operations for Networks Could Allow for Remote Code Execution

Read Time:25 Second

A vulnerability has been discovered VMware Aria Operations for Networks which could allow for remote code execution. VMware Aria Operations for Networks is a network monitoring tool that collects and analyzes metrics, APIs, configurations, metadata, integrations, telemetry netflow, sFlow, and IPFIX flow traffic, which traverses the infrastructure. Successful exploitation of this vulnerability could allow for remote code execution in the context of the administrator account. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Read More

Active Exploitation of Apache RocketMQ updateConfig Command Execution Vulnerability (CVE-2023-33246)

Read Time:51 Second

What is VMware Apache RocketMQ?

Apache RocketMQ is an open-source distributed messaging middleware developed by the Alibaba. It was later donated to Apache.

What is the Attack?

CVE-2023-33246 is a command injection vulnerability that affects Apache RocketMQ versions 5.1 and lower. Successful exploitation of the vulnerability allows a remote attacker to execute commands as the system user under which RocketMQ is running by using the update configuration function.

Why is this Significant?

This is significant because CVE-2023-33246 is reportedly being exploited in the wild. Additionally, proof-of-concept (PoC) code is publicly available. As such, attacks that leverage the vulnerability are expected to increase.

FortiGuard Labs advises that the patch should be applied as soon as possible.

What is the Vendor Solution?

Apache released RocketMQ version 5.1.1 on May 19th, 2023 to address the issue.

What FortiGuard Coverage is available?

FortiGuard Labs is currently investigating protection for CVE-2023-33246. We’ll update this Threat Signal when new information becomes available.

Read More