CUPS vulnerabilities

Multiple vulnerabilities have been found in CUPS, CVE-2024-47176, CVE-2024-47076, CVE-2024-47175. These are HIGH risk vulnerabilities which may lead to remote code execution. CUPS is used for printing management, but in case any sites have this software installed,...

read more

voms-proxy-init susceptible to proxy theft

HIGH risk vulnerability has been found concerning the Java version of voms-proxy-init. During the proxy generation process it is possible for unauthorized users on the same machine to gain read access to the proxy. This allows the user to then perform any action that...

read more

EGI Conference 2024 in Lecce

The 2024 edition of the EGI Conference was held in Lecce from 30 September to 4 October. The program addressed several key issues, including data management, integrating diverse technologies, like high-throughput computing, cloud and high-performance computing...

read more

SLUBStick attacks

SLUBStick is a kernel exploit technique that elevates a heap vulnerability to an arbitrary memory read/write primitive. It works in several steps: first, it exploits a timing side channel of the allocator to reliably perform a cross-cache attack on commonly used...

read more

HIGH risk vulnerability in libndp – CVE-2024-5564

There is a HIGH-risk vulnerability CVE-2024-5564 in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. Further information on this vulnerability can be found...

read more
Trusted Introducer