No Image

USN-6059-1: Erlang vulnerability

2023-05-08 KENNETH 0

USN-6059-1: Erlang vulnerability It was discovered that Erlang did not properly implement TLS client certificate validation during the TLS handshake. A remote attacker could use this issue to bypass client authentication. Source: USN-6059-1: Erlang vulnerability

No Image

USN-6055-2: Ruby regression

2023-05-05 KENNETH 0

USN-6055-2: Ruby regression USN-6055-1 fixed a vulnerability in Ruby. Unfortunately it introduced a regression. This update reverts the patches applied to CVE-2023-28755 in order to fix the regression pending further investigation. We apologize for the inconvenience. Original advisory details: It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-28755) Source: USN-6055-2: Ruby regression

No Image

USN-6058-1: Linux kernel vulnerability

2023-05-05 KENNETH 0

USN-6058-1: Linux kernel vulnerability It was discovered that the Traffic-Control Index (TCINDEX) implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. Source: USN-6058-1: Linux kernel vulnerability

No Image

USN-6057-1: Linux kernel (Intel IoTG) vulnerabilities

2023-05-05 KENNETH 0

USN-6057-1: Linux kernel (Intel IoTG) vulnerabilities It was discovered that the Traffic-Control Index (TCINDEX) implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-1281) It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges. (CVE-2023-0386) Haowei Yan discovered that a race condition existed in the Layer 2 Tunneling Protocol (L2TP) implementation in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-4129) It was discovered that the network queuing discipline implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to [ more… ]

No Image

USN-6056-1: Linux kernel (OEM) vulnerability

2023-05-05 KENNETH 0

USN-6056-1: Linux kernel (OEM) vulnerability It was discovered that a race condition existed in the Xen transport layer implementation for the 9P file system protocol in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (guest crash) or expose sensitive information (guest kernel memory). Source: USN-6056-1: Linux kernel (OEM) vulnerability