CUPS vulnerabilities
Multiple vulnerabilities have been found in CUPS, CVE-2024-47176, CVE-2024-47076, CVE-2024-47175. These are HIGH risk vulnerabilities which may lead to remote code execution. CUPS is used for printing management, but in case any sites have this software installed,...
voms-proxy-init susceptible to proxy theft
HIGH risk vulnerability has been found concerning the Java version of voms-proxy-init. During the proxy generation process it is possible for unauthorized users on the same machine to gain read access to the proxy. This allows the user to then perform any action that...
EGI Conference 2024 in Lecce
The 2024 edition of the EGI Conference was held in Lecce from 30 September to 4 October. The program addressed several key issues, including data management, integrating diverse technologies, like high-throughput computing, cloud and high-performance computing...
SLUBStick attacks
SLUBStick is a kernel exploit technique that elevates a heap vulnerability to an arbitrary memory read/write primitive. It works in several steps: first, it exploits a timing side channel of the allocator to reliably perform a cross-cache attack on commonly used...
CVE-2024-41110 – Critical Docker Authorization vulnerability
A critical vulnerability CVE-2024-41110 has been found in Docker Authorization that could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. See our SVG Advisory for further details.
HIGH risk vulnerability in libndp – CVE-2024-5564
There is a HIGH-risk vulnerability CVE-2024-5564 in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. Further information on this vulnerability can be found...