• [gentoo-announce] [ GLSA 202411-03 ] Ubiquiti UniFi: Privilege Escalati

    From glsamaker@gentoo.org@21:1/5 to All on Wed Nov 6 14:00:02 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202411-03
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: Ubiquiti UniFi: Privilege Escalation
    Date: November 06, 2024
    Bugs: #941922
    ID: 202411-03

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in Ubiquiti UniFi, which can lead to
    local privilege escalation.

    Background
    ==========

    Ubiquiti UniFi is a Management Controller for Ubiquiti Networks UniFi
    APs.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ------------------ ------------ ------------
    net-wireless/unifi < 8.5.6 >= 8.5.6

    Description
    ===========

    A vulnerability has been discovered in Ubiquiti UniFi. Please review the
    CVE identifier referenced below for details.

    Impact
    ======

    The vulnerability allows a malicious actor with a local operational
    system user to execute high privilege actions on UniFi Network Server.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Ubiquiti UniFi users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-wireless/unifi-8.5.6"

    References
    ==========

    [ 1 ] CVE-2024-42028
    https://nvd.nist.gov/vuln/detail/CVE-2024-42028

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202411-03

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmcraAEACgkQFMQkOaVy +9mttg/8CRRkDQ1or7NLUUt5ejZFj+98o4FLfKoFK7K/zsfgvD4cdJSHAMNoYQZK ChYzkn8ZEhPaNHHZC28phEtoVC8w8jbxdHVmvGJPJAZhUfXailU3PdDmxgWBFPQ9 TJBv1gYpjda/lCnxYvSMsQfBEn0iwYMV/T0fXMiQ68ZnaYsIzMKSEIod/GU76Avu Ceho1yz7pYTQnJgv2GcOejfyXD87gDnhO/YDt7gSK3WYw758BefTfZVijJZIkQzQ TGXgdv5BOkGSPjU1dMuuUczE5v7QwWKl+lJPnpQIawLIFvCJgPw5c+q7BsioALm4 mRvCVWCGJrQJYpUDvByu05N7q/RbtBB3imHxxm6hP0h8vGI7Du3dLDLDd6/1vjOo UqOgTXLfWt5duxJ3+dSLiprwpEFOCDfaCIPZKinhtgzpdTr/dCkv2VfiXB0nPyzC O2/glYqDEezFHyTa1I/ltm2c4JPwqhFTkLWxcrS5N8ol4NosZ71RstjkEASVSc4m oRzGbX8Sc10mKDTzTF3WFwL38Jg2Bvmy6E4c8hHoFk8nkJN0gLUBWrllvXDFl6N3 FUM9aoJTDLoxen2KpNK9NLuL7xlM6qP+TN0a6iiGyBzYWnYfk/r95kPJtWjUT5Rs 2lA/8IXGhLOIu9dhJZiRxloUU8Gu6czzSPDEuvfGEeyvEfPF6pk=
    =bcMF
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)