This vulnerability allows remote attackers to escalate privileges on affected installations of QNAP TS-464 NAS devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2024-32766.
Category Archives: Advisories
ZDI-24-473: (Pwn2Own) QNAP TS-464 Authentication Service Improper Certificate Validation Vulnerability
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of QNAP TS-464 NAS devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2024-27124.
ZDI-24-472: (Pwn2Own) QNAP TS-464 Netmgr Endpoint CRLF Injection Arbitrary Configuration Update Vulnerability
This vulnerability allows remote attackers to create arbitrary configurations on affected installations of QNAP TS-464 NAS devices. An attacker must first obtain the ability to access the device’s localhost interface, which can be accomplished using a malicious TURN server. The ZDI has assigned a CVSS rating of 7.4. The following CVEs are assigned: CVE-2024-32764.
ZDI-24-471: (Pwn2Own) QNAP TS-464 authLogin SQL Injection Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of QNAP TS-464 NAS devices. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-21901.
ZDI-24-470: (Pwn2Own) QNAP TS-464 QR Code Device CRLF Injection Arbitrary Configuration Change Vulnerability
This vulnerability allows remote attackers to make arbitrary changes to configuration on affected installations of QNAP TS-464 NAS devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.1. The following CVEs are assigned: CVE-2024-21899.
kernel-6.8.10-100.fc38
FEDORA-2024-88abd103c8
Packages in this update:
kernel-6.8.10-100.fc38
Update description:
The 6.8.10 stable kernel update contains a number of important fixes across the tree
kernel-6.8.10-200.fc39
FEDORA-2024-49fcf86f58
Packages in this update:
kernel-6.8.10-200.fc39
Update description:
The 6.8.10 stable kernel update contains a number of important fixes across the tree
kernel-6.8.10-300.fc40
FEDORA-2024-92664ae6fe
Packages in this update:
kernel-6.8.10-300.fc40
Update description:
The 6.8.10 stable kernel update contains a number of important fixes across the tree
dotnet8.0-8.0.105-1.fc40
FEDORA-2024-56fb9c0762
Packages in this update:
dotnet8.0-8.0.105-1.fc40
Update description:
This is the May 2024 release for .NET 8.
This is a security update for .NET 8.
Release notes: https://github.com/dotnet/core/blob/main/release-notes/8.0/8.0.5/8.0.5.md
webkitgtk-2.44.2-1.fc40
FEDORA-2024-1f37da80ec
Packages in this update:
webkitgtk-2.44.2-1.fc40
Update description:
Make gamepads visible on axis movements, and not only on button presses.
Disable the gst-libav AAC decoder.
Make user scripts and style sheets visible in the Web Inspector.
Use the geolocation portal where available, with the existing geoclue as fallback if the portal is not usable.
Use the printing portal when running sandboxed.
Use the file transfer portal for drag and drop when running sandboxed.
Avoid notifying an empty cursor rectangle to input methods.
Remove empty bar shown in detached inspector windows.
Consider keycode when activating application accelerators.
Fix several crashes and rendering issues.
Fix CVE-2024-27834