FEDORA-FLATPAK-2024-95e1b2c636
Packages in this update:
firefox-flatpak-122.0-1
Update description:
Firefox 122.0 release.
firefox-flatpak-122.0-1
Firefox 122.0 release.
ReversingLabs noted a 1300% surge in harmful open-source packages between 2020 and 2023
Shadowserver reported over 39,000 exploitation attempts from 600 unique IP addresses, mainly Russian
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.
Mozilla Firefox is a web browser used to access the Internet.
Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations.
Mozilla Thunderbird is an email client.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
It was discovered that PyCryptodome had a timing side-channel when
performing OAEP decryption. A remote attacker could possibly use this issue
to recover sensitive information.
The UK government has published a draft code that aims to establish cybersecurity as a key focus for business leaders, on par with financial and legal risks
The French CNIL has fined Amazon France Logistique $35m for an “excessively intrusive” surveillance system set up to monitor the performance of its staff
Really interesting research: “Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.”
Abstract:
We show that built-in sensors in commodity PCs, such as microphones, inadvertently capture electromagnetic side-channel leakage from ongoing computation. Moreover, this information is often conveyed by supposedly-benign channels such as audio recordings and common Voice-over-IP applications, even after lossy compression.
Thus, we show, it is possible to conduct physical side-channel attacks on computation by remote and purely passive analysis of commonly-shared channels. These attacks require neither physical proximity (which could be mitigated by distance and shielding), nor the ability to run code on the target or configure its hardware. Consequently, we argue, physical side channels on PCs can no longer be excluded from remote-attack threat models.
We analyze the computation-dependent leakage captured by internal microphones, and empirically demonstrate its efficacy for attacks. In one scenario, an attacker steals the secret ECDSA signing keys of the counterparty in a voice call. In another, the attacker detects what web page their counterparty is loading. In the third scenario, a player in the Counter-Strike online multiplayer game can detect a hidden opponent waiting in ambush, by analyzing how the 3D rendering done by the opponent’s computer induces faint but detectable signals into the opponent’s audio feed.
The Australian government has sanctioned Russian national Aleksandr Ermakov for his role in the Medibank data breach