This week we look at a Wifi lookalike attack dubbed “SSID stripping” plus updates for ca-certificates, EDK II, Apache, the Linux kernel and even vim!
28 unique CVEs addressed
mod_proxy - so could lead to request splitting / cache
poisingmod_proxy_uwsgi - crash / info leakap_escape_quotes() if given malicious input - modules in
apache itself don’t pass untrusted input to this but other 3rd party
modules mightmod_proxy - forward the request to an origin server as
specified in the request - SSRF
SetHandler
config option for mod_proxy that broke various configurations using
unix sockets - these got interpreted more like URIs and so would be
seen as invalid - broke Plesk and others - upstream then issued further
fixes which we released in a follow-upio_uring (5.1) - unprivileged user - trigger free of other kernel
memory - code executionwpa_supplicant,
NetworkManager, gnome-shell etc)