This week we look at a Wifi lookalike attack dubbed “SSID stripping” plus updates for ca-certificates, EDK II, Apache, the Linux kernel and even vim!
28 unique CVEs addressed
mod_proxy
- so could lead to request splitting / cache
poisingmod_proxy_uwsgi
- crash / info leakap_escape_quotes()
if given malicious input - modules in
apache itself don’t pass untrusted input to this but other 3rd party
modules mightmod_proxy
- forward the request to an origin server as
specified in the request - SSRF
SetHandler
config option for mod_proxy
that broke various configurations using
unix sockets - these got interpreted more like URIs and so would be
seen as invalid - broke Plesk and others - upstream then issued further
fixes which we released in a follow-upio_uring
(5.1) - unprivileged user - trigger free of other kernel
memory - code executionwpa_supplicant
,
NetworkManager
, gnome-shell
etc)