What are the Vulnerabilities?Ivanti disclosed two vulnerabilities, CVE-2025-0282 and CVE-2025-0283, impacting Ivanti Connect Secure (“ICS”) VPN appliances. CVE-2025-0282 is an unauthenticated stack-based buffer overflow affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. Successful exploitation could result in unauthenticated remote code execution and CVE-2025-0283 is a stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 that allows a local authenticated attacker to escalate their privileges.According to a blog released by Mandiant, it has identified zero-day exploitation of CVE-2025-0282 in the wild beginning mid-December 2024. Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation | Google Cloud BlogIn light of active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-0282 to the Known Exploited Vulnerabilities (KEV) catalog on January 8, 2025.What is the recommended Mitigation?A patch is available; please refer to the Security Advisory Ivanti Connect Secure, Policy Secure & ZTA Gateways (CVE-2025-0282, CVE-2025-0283) The Integrity Checker Tool (ICT) provided by Ivanti to ensure the integrity and security of the entire network infrastructure can identify exploitation of CVE-2025-0282.CISA has also provided Mitigation Instructions for CVE-2025-0282: https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-0282What FortiGuard Coverage is available?FortiGuard Labs recommends users to apply the fix provided by the vendor and follow instructions as mentioned on the vendor’s advisory.FortiGuard Labs has blocked all the known malware and related Indicators of Compromise (IOCs) noted on the campaign targeting the Ivanti vulnerability.The FortiGuard Incident Response team can be engaged to help with any suspected compromise.
Category Archives: Advisories
USN-7198-1: rlottie vulnerabilities
Paolo Giai discovered a series of stack-based overflow vulnerabilities in
the blit and gray_render_cubic functions of a custom fork of the rlottie
library. An attacker could possibly use this issue to leak sensitive
information. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04
LTS. (CVE-2021-31315, CVE-2021-31321)
Paolo Giai discovered a series of type confusion vulnerabilities in the
VDasher constructor and the LOTCompLayerItem::LOTCompLayerItem function
of a custom fork of the rlottie library. An attacker could possibly use
this issue to leak sensitive information. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-31317, CVE-2021-31318)
Paolo Giai discovered an integer overflow vulnerability in the
LOTGradient::populate function of a custom fork of the rlottie library.
An attacker could possibly use this issue to leak sensitive information.
This issue only affected Ubuntu 20.04 LTS. (CVE-2021-31319)
Paolo Giai discovered a series of heap buffer overflow vulnerabilities
in the VGradientCache::generateGradientColorTable and
LOTGradient::populate functions of a custom fork of the rlottie library.
An attacker could possibly use this issue to achieve remote code execution.
This issue only affected Ubuntu 20.04 LTS. (CVE-2021-31320, CVE-2021-31322)
stb-0^20241002git31707d1-5.fc41
FEDORA-2025-6a64d3b2fc
Packages in this update:
stb-0^20241002git31707d1-5.fc41
Update description:
Add another patch for the root cause of CVE-2021-45340. We already have a patch for CVE-2021-45340, but adding this new patch may prevent a related, unproven exploit as described in https://github.com/nothings/stb/pull/1454#issuecomment-2581308033.
Multiple vulnerabilities in SonicWall SonicOS could allow a remote attacker to bypass authentication.
Multiple vulnerabilities have been discovered in SonicWall SonicOS that could allow for authentication bypass. SonicOS is SonicWall’s operating system designed for their firewalls and other security devices. Successful exploitation of the most severe of these vulnerabilities could allow for authentication bypass on the affected system. Depending on the privileges associated with the system, an attacker could then; view, change, or delete data.
xen-4.19.1-3.fc41
FEDORA-2025-933a9a977e
Packages in this update:
xen-4.19.1-3.fc41
Update description:
work around debugedit bug to fix aarch64 builds
xen-hypervisor %post doesn’t load all needed grub2 modules
update to xen-4.19.1 which includes
Deadlock in x86 HVM standard VGA handling [XSA-463, CVE-2024-45818]
libxl leaks data to PVH guests via ACPI tables [XSA-464, CVE-2024-45819]
thunderbird-128.6.0-1.fc40
FEDORA-2025-91031f9df9
Packages in this update:
thunderbird-128.6.0-1.fc40
Update description:
Update to 128.6.0
https://www.thunderbird.net/en-US/thunderbird/128.6.0esr/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-04/
thunderbird-128.6.0-1.fc41
FEDORA-2025-2f5b9ab47b
Packages in this update:
thunderbird-128.6.0-1.fc41
Update description:
Update to 128.6.0
https://www.thunderbird.net/en-US/thunderbird/128.6.0esr/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-04/
USN-7197-1: Go Networking vulnerability
Guido Vranken discovered that Go Networking handled input to the Parse
functions inefficiently. An attacker could possibly use this issue to
cause denial of service. This update addresses the issue in the
golang-golang-x-net and golang-golang-x-net-dev packages, as well as the
library vendored within adsys and juju-core.
USN-7185-2: Linux kernel (Azure) vulnerabilities
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an integer overflow vulnerability. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36402)
Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– GPU drivers;
– I2C subsystem;
– InfiniBand drivers;
– IRQ chip drivers;
– Network drivers;
– Pin controllers subsystem;
– S/390 drivers;
– TTY drivers;
– USB Host Controller drivers;
– USB Mass Storage drivers;
– Framebuffer layer;
– Ext4 file system;
– File systems infrastructure;
– Bluetooth subsystem;
– DMA mapping infrastructure;
– Memory management;
– 9P file system network protocol;
– IPv4 networking;
– IPv6 networking;
– Logical Link layer;
– MAC80211 subsystem;
– Netfilter;
– NFC subsystem;
– Phonet protocol;
– Network traffic control;
– VMware vSockets driver;
– Wireless networking;
(CVE-2024-42090, CVE-2024-42156, CVE-2021-47082, CVE-2024-26921,
CVE-2023-52594, CVE-2024-36968, CVE-2024-38633, CVE-2024-42077,
CVE-2021-47076, CVE-2021-47501, CVE-2023-52507, CVE-2024-42153,
CVE-2024-39301, CVE-2024-36946, CVE-2024-43884, CVE-2023-52509,
CVE-2024-36004, CVE-2023-52486, CVE-2024-50264, CVE-2024-45006,
CVE-2024-36941, CVE-2024-43856, CVE-2024-40912, CVE-2024-49967,
CVE-2024-53057, CVE-2024-26777, CVE-2024-36270, CVE-2024-26625,
CVE-2024-45021, CVE-2024-35886, CVE-2024-44947, CVE-2024-44944,
CVE-2024-35847, CVE-2024-40959, CVE-2024-42101, CVE-2024-38619)
USN-7169-4: Linux kernel (Azure) vulnerabilities
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– Ext4 file system;
– Network traffic control;
– VMware vSockets driver;
(CVE-2024-49967, CVE-2024-53057, CVE-2024-50264)