No Image

USN-6128-2: CUPS vulnerability

2023-06-02 KENNETH 0

USN-6128-2: CUPS vulnerability USN-6128-1 fixed a vulnerability in CUPS. This update provides the corresponding update for Ubuntu 16.04 ESM. Original advisory details: It was discovered that CUPS incorrectly handled logging. A remote attacker could use this issue to cause CUPS to crash, resulting in a denial of service, or possibly execute arbitrary code. Source: USN-6128-2: CUPS vulnerability

How to Scan Your Environment for NGINX Instances

2023-06-02 KENNETH 0

How to Scan Your Environment for NGINX Instances As the core module of F5 NGINX Management Suite, Instance Manager is an invaluable resource that enables you to locate, manage, and monitor all your NGINX Open Source and NGINX Plus instances easily and efficiently. Keeping track of NGINX instances is now simple with Instance Manager – the easy-to-use interface allows organizations to conveniently monitor all instances from a single pane of glass. Instance Manager can also identify instances affected by Common Vulnerabilities and Exposures (CVEs) and instances with potentially expired SSL certificates. This wide scanning capability is crucial to ensure the security and safety of your Information Technology (IT) assets. The module also notifies when a new version exists to help resolve these vulnerabilities, making it essential for anyone who wants to proactively manage and secure NGINX instances. With Instance Manager, [ more… ]

No Image

USN-6129-1: Avahi vulnerability

2023-06-01 KENNETH 0

USN-6129-1: Avahi vulnerability It was discovered that Avahi incorrectly handled certain DBus messages. A local attacker could possibly use this issue to cause Avahi to crash, resulting in a denial of service. Source: USN-6129-1: Avahi vulnerability

No Image

USN-6128-1: CUPS vulnerability

2023-06-01 KENNETH 0

USN-6128-1: CUPS vulnerability It was discovered that CUPS incorrectly handled logging. A remote attacker could use this issue to cause CUPS to crash, resulting in a denial of service, or possibly execute arbitrary code. Source: USN-6128-1: CUPS vulnerability

No Image

USN-6127-1: Linux kernel vulnerabilities

2023-06-01 KENNETH 0

USN-6127-1: Linux kernel vulnerabilities Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32233) Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31436) Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). (CVE-2023-30456) It was discovered that the Broadcom [ more… ]