Bugzilla – Bug 1227693
VUL-0: CVE-2024-38526: netpbm: Polyfill Supplay Chain Attack
Last modified: 2024-07-12 10:48:44 UTC
+++ This bug was initially created as a clone of Bug #1227687 +++ The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. References: https://sansec.io/research/polyfill-supply-chain-attack https://nvd.nist.gov/vuln/detail/CVE-2024-38526
The following packages loads data from polyfill.io in doc/pamhomography.html - SUSE:ALP:Source:Standard:1.0/netpbm - openSUSE:Factory/netpbm - SUSE:SLFO:Main/netpbm I'm not sure how/if the upstream fixed it, but you can simply replace the malicious domain with https://cdnjs.cloudflare.com. The following packages are not affected - SUSE:SLE-12:Update/netpbm - SUSE:SLE-15:Update/netpbm
I have notified upstream author Bryan Henderson (bryanh@giraffe-data.com).
Factory: https://build.opensuse.org/request/show/1187057 ALP: https://build.suse.de/request/show/338781 SLFO: https://build.suse.de/request/show/338780 I believe all fixed.