Toshifumi Sakaguchi discovered that Unbound incorrectly handled name
compression for large RRsets, which could lead to excessive CPU usage.
An attacker could potentially use this issue to cause a denial of service
by sending specially crafted DNS responses.
Category Archives: Advisories
NetworkManager-libreswan-1.2.24-1.fc39
FEDORA-2024-d20b38c63f
Packages in this update:
NetworkManager-libreswan-1.2.24-1.fc39
Update description:
This is an update to 1.2.24 release of NetworkManager-libreswan, the IPSec VPN plugin for NetworkManager. It fixes a local privilege escalation bug due to improper escaping of Libreswan configuration. (CVE-2024-9050)
NetworkManager-libreswan-1.2.24-1.fc40
FEDORA-2024-e88cc97dba
Packages in this update:
NetworkManager-libreswan-1.2.24-1.fc40
Update description:
This is an update to 1.2.24 release of NetworkManager-libreswan, the IPSec VPN plugin for NetworkManager. It fixes a local privilege escalation bug due to improper escaping of Libreswan configuration. (CVE-2024-9050)
NetworkManager-libreswan-1.2.24-1.fc41
FEDORA-2024-2e8944621e
Packages in this update:
NetworkManager-libreswan-1.2.24-1.fc41
Update description:
This is an update to 1.2.24 release of NetworkManager-libreswan, the IPSec VPN plugin for NetworkManager.
It fixes a local privilege escalation bug due to improper escaping of Libreswan configuration. (CVE-2024-9050)
USN-7079-1: WebKitGTK vulnerabilities
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
USN-7078-1: Firefox vulnerability
Atte Kettunen discovered that Firefox did not properly validate before
inserting ranges into the selection node cache. An attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
Metabase Information Disclosure Vulnerability (CVE-2021-41277)
What is the attack?FortiGuard Labs observes widespread attack attempts targeting a three-year-old Metabase vulnerability (CVE-2021-41277) detected by more than 30,000 sensors. Successful exploitation could lead to information disclosure including expose server files and environment variables to unauthorized users. The vulnerability occurs due to the use of user-supplied input without proper validation.Metabase is an open-source data analytics platform. According to their website it is used by over 60,000 companies including, Capital One, OpenAI, and more. FortiGuard Recon Threat Intelligence team tracked this vulnerability being targeted by a hacktivist group called GhostSec back in May 2024.What is the recommended Mitigation?This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that (including x.41+). GitHubWhat FortiGuard Coverage is available?FortiGuard recommends users to apply the patch and follow any mitigation steps provided by the vendor if not done already.FortiGuard IPS protection is available to detect and block any attack attempts.The FortiGuard Incident Response team can be engaged to help with any suspected compromise.
USN-7072-2: Linux kernel (GKE) vulnerabilities
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– Watchdog drivers;
– Netfilter;
– Network traffic control;
(CVE-2024-38630, CVE-2024-27397, CVE-2024-45016)
USN-7062-2: libgsf vulnerabilities
USN-7062-1 fixed vulnerabilities in libgsf. This update provides the
corresponding updates for Ubuntu 24.10.
Original advisory details:
It was discovered that libgsf incorrectly handled certain Compound
Document Binary files. If a user or automated system were tricked into
opening a specially crafted file, a remote attacker could possibly use
this issue to execute arbitrary code.
USN-7042-3: cups-browsed vulnerability
USN-7042-2 released an improved fix for cups-browsed. This update provides
the corresponding update for Ubuntu 24.10.
Original advisory details:
Simone Margaritelli discovered that cups-browsed could be used to create
arbitrary printers from outside the local network. In combination with
issues in other printing components, a remote attacker could possibly use
this issue to connect to a system, created manipulated PPD files, and
execute arbitrary code when a printer is used. This update disables
support for the legacy CUPS printer discovery protocol.