Описание
ELSA-2025-0377: Security and bug fixes for NetworkManager (MODERATE)
[1.48.10-5.0.1]
- disable MPTCP handling by default [Orabug: 34801142]
- add connectivity check via Oracle servers [Orabug: 32051972]
[1:1.48.10-5]
- vpn: Support routing rules in vpn conenctions (RHEL-73167)
- vpn: Place gateway route to table defined in ipvx.route-table (RHEL-73166)
[1:1.48.10-4]
- Remove routes added by NetworkManager when doing reapply, also those not in main table (RHEL-73013)
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
NetworkManager-libnm-devel
1.48.10-5.0.1.el9_5
NetworkManager
1.48.10-5.0.1.el9_5
NetworkManager-adsl
1.48.10-5.0.1.el9_5
NetworkManager-bluetooth
1.48.10-5.0.1.el9_5
NetworkManager-config-connectivity-oracle
1.48.10-5.0.1.el9_5
NetworkManager-config-server
1.48.10-5.0.1.el9_5
NetworkManager-initscripts-updown
1.48.10-5.0.1.el9_5
NetworkManager-libnm
1.48.10-5.0.1.el9_5
NetworkManager-team
1.48.10-5.0.1.el9_5
NetworkManager-tui
1.48.10-5.0.1.el9_5
NetworkManager-wifi
1.48.10-5.0.1.el9_5
NetworkManager-wwan
1.48.10-5.0.1.el9_5
NetworkManager-cloud-setup
1.48.10-5.0.1.el9_5
NetworkManager-dispatcher-routing-rules
1.48.10-5.0.1.el9_5
NetworkManager-ovs
1.48.10-5.0.1.el9_5
NetworkManager-ppp
1.48.10-5.0.1.el9_5
Oracle Linux x86_64
NetworkManager
1.48.10-5.0.1.el9_5
NetworkManager-adsl
1.48.10-5.0.1.el9_5
NetworkManager-bluetooth
1.48.10-5.0.1.el9_5
NetworkManager-config-connectivity-oracle
1.48.10-5.0.1.el9_5
NetworkManager-config-server
1.48.10-5.0.1.el9_5
NetworkManager-initscripts-updown
1.48.10-5.0.1.el9_5
NetworkManager-libnm
1.48.10-5.0.1.el9_5
NetworkManager-team
1.48.10-5.0.1.el9_5
NetworkManager-tui
1.48.10-5.0.1.el9_5
NetworkManager-wifi
1.48.10-5.0.1.el9_5
NetworkManager-wwan
1.48.10-5.0.1.el9_5
NetworkManager-cloud-setup
1.48.10-5.0.1.el9_5
NetworkManager-dispatcher-routing-rules
1.48.10-5.0.1.el9_5
NetworkManager-ovs
1.48.10-5.0.1.el9_5
NetworkManager-ppp
1.48.10-5.0.1.el9_5
NetworkManager-libnm-devel
1.48.10-5.0.1.el9_5
Связанные CVE
Связанные уязвимости
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
By design, the DHCP protocol does not authenticate messages, including for example the classless static route option (121). An attacker with the ability to send DHCP messages can manipulate routes to redirect VPN traffic, allowing the attacker to read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN. Many, if not most VPN systems based on IP routing are susceptible to such attacks.