Fascinating story of a covert wiretap that was discovered because of an expired TLS certificate:
The suspected man-in-the-middle attack was identified when the administrator of jabber.ru, the largest Russian XMPP service, received a notification that one of the servers’ certificates had expired.
However, jabber.ru found no expired certificates on the server, as explained in a blog post by ValdikSS, a pseudonymous anti-censorship researcher based in Russia who collaborated on the investigation.
The expired certificate was instead discovered on a single port being used by the service to establish an encrypted Transport Layer Security (TLS) connection with users. Before it had expired, it would have allowed someone to decrypt the traffic being exchanged over the service.
update to 118.0.5993.117. Security release for CVE-2023-5472
Update to 118.0.5993.88
Update to 118.0.5993.70. Include following security fixes:
– CVE-2023-5218: Use after free in Site Isolation.
– CVE-2023-5487: Inappropriate implementation in Fullscreen.
– CVE-2023-5484: Inappropriate implementation in Navigation.
– CVE-2023-5475: Inappropriate implementation in DevTools.
– CVE-2023-5483: Inappropriate implementation in Intents.
– CVE-2023-5481: Inappropriate implementation in Downloads.
– CVE-2023-5476: Use after free in Blink History.
– CVE-2023-5474: Heap buffer overflow in PDF.
– CVE-2023-5479: Inappropriate implementation in Extensions API.
– CVE-2023-5485: Inappropriate implementation in Autofill.
– CVE-2023-5478: Inappropriate implementation in Autofill.
– CVE-2023-5477: Inappropriate implementation in Installer.
– CVE-2023-5486: Inappropriate implementation in Input.
– CVE-2023-5473: Use after free in Cast.