The banking giant is trialling the QKD-secured network as it seeks to future-proof its global operations against quantum-enabled cyber-threats
Monthly Archives: July 2023
yt-dlp-2023.07.06-1.el9
FEDORA-EPEL-2023-6398dade97
Packages in this update:
yt-dlp-2023.07.06-1.el9
Update description:
Update to 2023.07.06.
Mitigates CVE-2023-35934 / GHSA-v8mc-9377-rwjj
Update to 2023.06.22. Fixes rhbz#2216612.
Update to 2023.06.21. Fixes rhbz#2216612.
yt-dlp-2023.07.06-1.fc38
FEDORA-2023-9f3938e10d
Packages in this update:
yt-dlp-2023.07.06-1.fc38
Update description:
Update to 2023.07.06.
Mitigates CVE-2023-35934 / GHSA-v8mc-9377-rwjj
yt-dlp-2023.07.06-1.fc37
FEDORA-2023-79e2b35ba6
Packages in this update:
yt-dlp-2023.07.06-1.fc37
Update description:
Update to 2023.07.06.
Mitigates CVE-2023-35934 / GHSA-v8mc-9377-rwjj.
Update to 2023.06.22. Fixes rhbz#2216612.
Update to 2023.06.21. Fixes rhbz#2216612.
DSA-5450 firefox-esr – security update
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code or spoofing.
DSA-5449 webkit2gtk – security update
The following vulnerabilities have been discovered in the WebKitGTK
web engine:
Active Exploitation of SolarView Compact Command Injection Vulnerabilities (CVE-2022-40881, CVE-2022-29303)
What is SolarView Compact?
SolarView Compact is a photovoltaic (PV) power generation measurement and monitoring device developed by Contec.
What is the Attack?
CVE-2022-29303 is a command injection vulnerability in SolarView Compact that allows attackers to steal or modify information, destroy the system, or execute malicious programs by entering commands from the test email transmission screen.
CVE-2022-40881 is a command injection vulnerability in SolarView Compat that allows attackers to steal or modify information, destroy the system, or execute malicious programs by entering commands from the network continuity check screen.
Why is this Significant?
This is significant because CVE-2022-40881 and CVE-2022-29303 are reportedly being exploited in the wild.
FortiGuard Labs advises that the patch should be applied as soon as possible
What is the Vendor Solution?
Contec released a fix for both CVE-2022-40881 and CVE-2022-29303 in version 7.21 and beyond.
What FortiGuard Coverage is available?
FortiGuard Labs has a IPS signature ” SolarView.Compact.Command.Injection” in place for CVE-2022-40881 and CVE-2022-29303.
iPhone Update — Apply It Now If You Haven’t Already
Apple recently issued an urgent iPhone update, iOS version 16.5.1. If you haven’t updated yet, you should.
Owners of iPads should update to iOS 16.5.1 as well.
The update contains two critical security fixes that prevent bad actors from executing malicious code on iPhones and iPads.
One of the fixes addresses an issue with the kernel of the device—the core code that runs iPhones and iPads. Apple reported that the issue could allow an app to execute arbitrary code with kernel privileges. With those privileges, a malicious appp could attack the device at the root level. The other addresses an issue with the operating system’s WebKit, which, if uncorrected, could process maliciously crafted web content.
You can update to iOS 16.5.1 now by going to Settings > General > Software Update.
The update is available for:
iPhone 8 and later.
iPad Pro (all models).
iPad Air 3rd generation and later.
iPad 5th generation and later.
iPad mini 5th generation and later.
Protecting your iPhone
Keeping your operating system current on your iPhone, and all your devices, provides a strong foundation for protection. In addition to adding new features, updates often include fixes focused on security. In this case, a couple of critical security fixes.
You have a few options for keeping on top of security updates:
Turn on automatic updates. This will ensure that your device is running the latest and greatest version of the operating system. Additionally, you can turn on automatic updates for all your apps as well. Together, they will take the work out of keeping things current.
Check for updates yourself. Even with automatic updates turned on, you might experience slightly delayed access to the latest update. In some cases, updates get rolled out to batches of users at a time to prevent download servers from getting overwhelmed. However, manually checking for updates will provide access to the latest version regardless of where you stand in the rollout queue. This way, if you see a news story about a critical update, you can still download it right away.
Use online protection software for your phone. Protection like our McAfee+ plans include a Wi-Fi & System Scan feature that notifies you when you need to update iOS. It can also take the guesswork out of whether you are current or not—and keep you in the loop if you miss the news of an important update. McAfee+ offers far more protection from there. It now includes our WebAdvisor extension, which warns you of sketchy phishing links and unsafe downloads. Privacy protection and identity protection come included as well, along with a VPN for a more secure connection.
Keep safe. Keep your iOS (and your apps) current.
Aside from using online protection software, keeping your device current offers a strong defense from hacks and attacks. Updates to your operating system and apps will fix security issues and loopholes—the very sorts of things that bad actors are quick to exploit.
You can keep current quite easily, thanks to automatic updates. Yet keeping an eye on the news remains important as well. If you catch word of an important update, grab it right away. No need to wait.
The post iPhone Update — Apply It Now If You Haven’t Already appeared first on McAfee Blog.
USN-6208-1: Gorilla WebSocket vulnerability
It was discovered that Gorilla WebSocket incorrectly handled decoding WebSocket
frames. An attacker could possibly use this issue to cause a crash, resulting
in a denial of service.
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.
Mozilla Firefox is a web browser used to access the Internet.
Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations.
Mozilla Thunderbird is an email client.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.