Hello Linux users,

The kernel is the heartbeat of every Linux system, so when something goes wrong with it, it affects everyone using it and the data it can access. SLUBStick, the kernel vulnerability with the odd name, is one of the more severe exploits that grants the attacker complete control over your system. This could lead to data breaches, service outages, and other damaging repercussions.

To help you take proactive measures to secure your systems, I'll explain: 

  • The vulnerability discovered and its impact.
  • How the SLUBStick attack works.
  • Practical advice on how to mitigate your risk.

Read on to learn about another critical vulnerability recently discovered in the Ghostscript document conversion toolkit that many of the apps you and I use daily depend on. This vulnerability could expose sensitive files and compromise entire systems.

If you found value in today’s newsletter, please share it with your friends! Do you have a Linux security-related topic you'd like to cover for our audience? We welcome contributions from passionate, insightful community members who share our love for Linux and security!

Stay safe out there,

Brittany Signature 150 Esm W150

Linux Kernel

The Discovery 

A severe Linux vulnerability, oddly named "SLUBStick," has been identified in the kernel. This stealthy flaw turns heap vulnerabilities into read/write access points with total power over read/write operations. 

LinuxKernel Esm W206

The Impact

SLUBStick can grant attackers full system control, enabling them to elevate privileges, potentially leading to data breaches and service outages.

The Fix

Critical Linux kernel patch updates have been released to mitigate this impactful bug. We strongly recommend you apply the updates released by your distros as soon as possible to secure your systems and sensitive data against SLUBStick attacks.

Your Related Advisories:

Register to Customize Your Advisories

Ghostscript

The Discovery 

A critical remote code execution (RCE) vulnerability was discovered in the Ghostscript document conversion toolkit (CVE-2024729510). Attackers are exploiting this bug in the wild by masking malicious Postscript files as harmless-appearing JPGs and passing them along to be processed by Ghostscript's vulnerable component. 

Ghostscript Esm W224

The Impact

This severe bug allows malicious actors to gain shell access, expose sensitive files, and subsequently compromise your entire system.

The Fix

Ghostscript has released an update, version 10.03.1, that resolves CVE-2024-29510 and should be applied as soon as possible to mitigate risk. Debian, Fedora, and Ubuntu have released security patch updates to fix this issue. 

Your Related Advisories:

Register to Customize Your Advisories