Hello Linux users,

A severe remote code execution (RCE) vulnerability was recently identified in the popular Ghostscript document conversion toolkit - the engine behind many of the Linux apps you and I use daily. Attackers are exploiting this bug in the wild to gain shell access, expose sensitive files, and subsequently compromise entire systems.

Even if you aren't familiar with Ghostscript, are you certain you aren't using apps that depend on it and are putting you at risk?

To help you determine if you are in danger and take proactive measures to secure your systems, I'll explain:

  • The vulnerability discovered and its impact.
  • How to check if your systems are vulnerable.
  • Practical advice on how to mitigate your risk.

Read on to learn about another severe flaw recently identified in the Linux kernel and gain critical insights that will keep you a step ahead of cyber thieves!

If you found value in today’s newsletter, please share it with your friends! Do you have a Linux security-related topic you'd like to cover for our audience? We welcome contributions from passionate, insightful community members who share our love for Linux and security!

Stay safe out there,

Brittany Signature 150 Esm W150

Ghostscript

The Discovery 

A critical remote code execution (RCE) vulnerability was discovered in the Ghostscript document conversion toolkit (CVE-2024729510). Attackers are exploiting this bug in the wild by masking malicious Postscript files as harmless-appearing JPGs and passing them along to be processed by Ghostscript's vulnerable component. 

Ghostscript Esm W224

The Impact

This severe bug allows malicious actors to gain shell access, expose sensitive files, and subsequently compromise your entire system.

The Fix

Ghostscript has released an update, version 10.03.1, that resolves CVE-2024-29510 and should be applied as soon as possible to mitigate risk. Debian, Fedora, and Ubuntu have released security patch updates to fix this issue. 

Your Related Advisories:

Register to Customize Your Advisories

Linux Kernel

The Discovery 

A severe Linux vulnerability, oddly named "SLUBStick," has been identified in the kernel. This stealthy flaw turns heap vulnerabilities into read/write access points with total power over read/write operations. 

LinuxKernel Esm W206

The Impact

SLUBStick can grant attackers full system control, enabling them to elevate privileges, potentially leading to data breaches and service outages.

The Fix

Critical Linux kernel patch updates have been released to mitigate this impactful bug. We strongly recommend you apply the updates released by your distros as soon as possible to secure your systems and sensitive data against SLUBStick attacks.

Your Related Advisories:

Register to Customize Your Advisories