Category Archives: Advisories

wordpress-6.4.3-1.fc39

Read Time:20 Second

FEDORA-2024-2b30739a76

Packages in this update:

wordpress-6.4.3-1.fc39

Update description:

WordPress 6.4.3 – Maintenance and Security release

See upstream announcement

Security updates included in this release

m4tuto for finding a PHP File Upload bypass via Plugin Installer (requiring admin privileges).
@_s_n_t of @pentestltd working with Trend Micro Zero Day Initiative for finding an RCE POP Chains vulnerability.

Read More

wordpress-6.4.3-1.el9

Read Time:20 Second

FEDORA-EPEL-2024-7190fecd91

Packages in this update:

wordpress-6.4.3-1.el9

Update description:

WordPress 6.4.3 – Maintenance and Security release

See upstream announcement

Security updates included in this release

m4tuto for finding a PHP File Upload bypass via Plugin Installer (requiring admin privileges).
@_s_n_t of @pentestltd working with Trend Micro Zero Day Initiative for finding an RCE POP Chains vulnerability.

Read More

chromium-121.0.6167.139-1.fc38

Read Time:15 Second

FEDORA-2024-ca36dcc1d3

Packages in this update:

chromium-121.0.6167.139-1.fc38

Update description:

update to 121.0.6167.139

High CVE-2024-1060: Use after free in Canvas
High CVE-2024-1059: Use after free in WebRTC
High CVE-2024-1077: Use after free in Network

Read More

chromium-121.0.6167.139-1.fc39

Read Time:15 Second

FEDORA-2024-87e0baecb6

Packages in this update:

chromium-121.0.6167.139-1.fc39

Update description:

update to 121.0.6167.139

High CVE-2024-1060: Use after free in Canvas
High CVE-2024-1059: Use after free in WebRTC
High CVE-2024-1077: Use after free in Network

Read More

Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution

Read Time:42 Second

Multiple Vulnerabilities have been discovered in Ivanti Products, the most severe of which could allow for remote code execution.

Ivanti Connect Secure is a SSL VPN solution for remote and mobile users.
Ivanti Policy Secure (IPS) is a network access control (NAC) solution which provides network access only to authorized and secured users and devices.
Ivanti Neurons for Zero Trust Access (nZTA) creates a secure connection from a device to web-based applications on-premises and in the cloud
Successful exploitation could allow for remote code execution in the context of the system. Depending on the privileges associated with the logged on user, an attacker could then install programs; view, change, or delete data. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Read More

USN-6591-2: Postfix update

Read Time:33 Second

USN-6591-1 fixed vulnerabilities in Postfix. A fix with less risk of
regression has been made available since the last update. This update
updates the fix and aligns with the latest configuration guidelines
regarding this vulnerability.

We apologize for the inconvenience.

Original advisory details:

Timo Longin discovered that Postfix incorrectly handled certain email line
endings. A remote attacker could possibly use this issue to bypass an email
authentication mechanism, allowing domain spoofing and potential spamming.

Please note that certain configuration changes are required to address
this issue. They are not enabled by default for backward compatibility.
Information can be found at https://www.postfix.org/smtp-smuggling.html.

Read More