Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-0288

Опубликовано: 13 янв. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-0288: Bug fix of NetworkManager (MODERATE)

[1:1.40.16-18.0.1]

  • disable MPTCP handling by default [Orabug: 35081472]
  • Fix ignore-carrier logic [Orabug: 34956744]
  • Disable regeneration of the documentation [Orabug: 34712048]
  • add connectivity check via Oracle servers [Orabug: 32051972]
  • Disable the build of NetworkManager-config-connectivity-* subpackage for 8.3
  • Revert 'infiniband: avoid normalizing the p-key when reading from ifcfg'

[1:1.40.16-18]

  • vpn: fix routing rules support in vpn conenctions (RHEL-73052)
  • vpn: Place gateway route to table defined in ipvx.route-table (RHEL-73051)

[1:1.40.16-17]

  • Rebuild to use the right tag

[1:1.40.16-16]

  • Use /etc/hosts for hostname resolution (RHEL-53200)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

NetworkManager

1.40.16-18.0.1.el8_10

NetworkManager-adsl

1.40.16-18.0.1.el8_10

NetworkManager-bluetooth

1.40.16-18.0.1.el8_10

NetworkManager-cloud-setup

1.40.16-18.0.1.el8_10

NetworkManager-config-connectivity-oracle

1.40.16-18.0.1.el8_10

NetworkManager-config-server

1.40.16-18.0.1.el8_10

NetworkManager-dispatcher-routing-rules

1.40.16-18.0.1.el8_10

NetworkManager-initscripts-updown

1.40.16-18.0.1.el8_10

NetworkManager-libnm

1.40.16-18.0.1.el8_10

NetworkManager-libnm-devel

1.40.16-18.0.1.el8_10

NetworkManager-ovs

1.40.16-18.0.1.el8_10

NetworkManager-ppp

1.40.16-18.0.1.el8_10

NetworkManager-team

1.40.16-18.0.1.el8_10

NetworkManager-tui

1.40.16-18.0.1.el8_10

NetworkManager-wifi

1.40.16-18.0.1.el8_10

NetworkManager-wwan

1.40.16-18.0.1.el8_10

Oracle Linux x86_64

NetworkManager

1.40.16-18.0.1.el8_10

NetworkManager-adsl

1.40.16-18.0.1.el8_10

NetworkManager-bluetooth

1.40.16-18.0.1.el8_10

NetworkManager-cloud-setup

1.40.16-18.0.1.el8_10

NetworkManager-config-connectivity-oracle

1.40.16-18.0.1.el8_10

NetworkManager-config-server

1.40.16-18.0.1.el8_10

NetworkManager-dispatcher-routing-rules

1.40.16-18.0.1.el8_10

NetworkManager-initscripts-updown

1.40.16-18.0.1.el8_10

NetworkManager-libnm

1.40.16-18.0.1.el8_10

NetworkManager-libnm-devel

1.40.16-18.0.1.el8_10

NetworkManager-ovs

1.40.16-18.0.1.el8_10

NetworkManager-ppp

1.40.16-18.0.1.el8_10

NetworkManager-team

1.40.16-18.0.1.el8_10

NetworkManager-tui

1.40.16-18.0.1.el8_10

NetworkManager-wifi

1.40.16-18.0.1.el8_10

NetworkManager-wwan

1.40.16-18.0.1.el8_10

Связанные CVE

Связанные уязвимости

CVSS3: 7.6
ubuntu
около 1 года назад

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

CVSS3: 7.6
redhat
около 1 года назад

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

CVSS3: 7.6
nvd
около 1 года назад

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

rocky
около 1 месяца назад

Moderate: Bug fix of NetworkManager

CVSS3: 8.8
github
около 1 года назад

By design, the DHCP protocol does not authenticate messages, including for example the classless static route option (121). An attacker with the ability to send DHCP messages can manipulate routes to redirect VPN traffic, allowing the attacker to read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN. Many, if not most VPN systems based on IP routing are susceptible to such attacks.