Both ZPHP and DarkGate made their first appearance in the Top 10 Malware list for Q2 2024. Here’s what else the CIS Cyber Threat Intelligence team observed.
Monthly Archives: August 2024
#BHUSA: CoSAI, Combating AI Risks Through Industry Collaboration
Leading AI companies have formed the Coalition for Secure AI (CoSAI) to address the growing cybersecurity risks posed by artificial intelligence
firefox-129.0-1.fc39 nss-3.103.0-1.fc39
FEDORA-2024-4fcf85b0ff
Packages in this update:
firefox-129.0-1.fc39
nss-3.103.0-1.fc39
Update description:
Update NSS to 3.103.0
Update to Firefox 129.0
OpenAI Leadership Split Over In-House AI Watermarking Technology
One primary concern is that the tool might turn ChatGPT users away from the product
Threat Actors Favor Rclone, WinSCP and cURL as Data Exfiltration Tools
ReliaQuest found that Rclone, WinSCP and cURL were the top three data exfiltration tools utilized by threat actors over the past year
python3-docs-3.12.5-1.fc39 python3.12-3.12.5-1.fc39
FEDORA-2024-ce1992d46f
Packages in this update:
python3.12-3.12.5-1.fc39
python3-docs-3.12.5-1.fc39
Update description:
Update to 3.12.5
Fixes CVE-2024-6923 (email header injection)
python3-docs-3.12.5-1.fc40 python3.12-3.12.5-1.fc40
FEDORA-2024-80d1fe51d0
Packages in this update:
python3.12-3.12.5-1.fc40
python3-docs-3.12.5-1.fc40
Update description:
Update to 3.12.5
Fixes CVE-2024-6923 (email header injection)
firefox-129.0-1.fc40 nss-3.103.0-1.fc40
FEDORA-2024-7f0a88301b
Packages in this update:
firefox-129.0-1.fc40
nss-3.103.0-1.fc40
Update description:
Update NSS to 3.103.0
Update to Firefox 129.0
yyjson-0.10.0-2.el10_0
FEDORA-EPEL-2024-19e0ba9d5a
Packages in this update:
yyjson-0.10.0-2.el10_0
Update description:
Automatic update for yyjson-0.10.0-2.el10_0.
Changelog
* Sat Jul 20 2024 Fedora Release Engineering <releng@fedoraproject.org> – 0.10.0-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_41_Mass_Rebuild
* Mon Jul 15 2024 Packit <hello@packit.dev> – 0.10.0-1
– Update to 0.10.0 upstream release
– Resolves: rhbz#2297812
* Tue Apr 9 2024 topazus <topazus@outlook.com> – 0.9.0-1
– Update to 0.9.0; fix rhbz#2274045 and rhbz#2266791
* Tue Jan 30 2024 topazus <topazus@outlook.com> – 0.8.0-3
– Fix error of -Wno-implicit-int and -Wno-implicit-function-declaration
* Sat Jan 27 2024 Fedora Release Engineering <releng@fedoraproject.org> – 0.8.0-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Tue Dec 12 2023 topazus <topazus@outlook.com> – 0.8.0-1
– initial import; rhbz#2254133
USN-6953-1: Linux kernel (Oracle) vulnerabilities
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– M68K architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Accessibility subsystem;
– Character device driver;
– Clock framework and drivers;
– CPU frequency scaling framework;
– Hardware crypto device drivers;
– Buffer Sharing and Synchronization framework;
– FireWire subsystem;
– ARM SCMI message protocol;
– GPU drivers;
– HW tracing;
– InfiniBand drivers;
– Macintosh device drivers;
– Multiple devices driver;
– Media drivers;
– Network drivers;
– Pin controllers subsystem;
– S/390 drivers;
– SCSI drivers;
– SoundWire subsystem;
– Greybus lights staging drivers;
– TTY drivers;
– Framebuffer layer;
– Virtio drivers;
– 9P distributed file system;
– eCrypt file system;
– EROFS file system;
– Ext4 file system;
– F2FS file system;
– JFFS2 file system;
– Network file system client;
– NILFS2 file system;
– SMB network file system;
– Mellanox drivers;
– Kernel debugger infrastructure;
– IRQ subsystem;
– Tracing infrastructure;
– Dynamic debug library;
– 9P file system network protocol;
– Bluetooth subsystem;
– Networking core;
– IPv4 networking;
– IPv6 networking;
– Netfilter;
– NET/ROM layer;
– NFC subsystem;
– NSH protocol;
– Open vSwitch;
– Phonet protocol;
– TIPC protocol;
– TLS protocol;
– Unix domain sockets;
– Wireless networking;
– eXpress Data Path;
– XFRM subsystem;
– ALSA framework;
(CVE-2024-26584, CVE-2023-52434, CVE-2024-36933, CVE-2024-36286,
CVE-2024-36886, CVE-2024-38579, CVE-2022-48772, CVE-2024-39493,
CVE-2024-38637, CVE-2024-36016, CVE-2023-52752, CVE-2024-38558,
CVE-2024-39488, CVE-2024-38559, CVE-2024-36919, CVE-2024-36905,
CVE-2024-39489, CVE-2024-39475, CVE-2021-47131, CVE-2024-26585,
CVE-2024-38578, CVE-2024-38567, CVE-2024-38596, CVE-2024-38598,
CVE-2024-36940, CVE-2024-38552, CVE-2024-37356, CVE-2024-38780,
CVE-2024-38589, CVE-2024-36959, CVE-2024-27399, CVE-2024-36017,
CVE-2024-38661, CVE-2024-36939, CVE-2024-36904, CVE-2024-36902,
CVE-2024-38381, CVE-2024-36883, CVE-2024-37353, CVE-2024-38560,
CVE-2024-39292, CVE-2024-36934, CVE-2024-38621, CVE-2024-38599,
CVE-2024-36941, CVE-2022-48655, CVE-2024-26886, CVE-2024-36014,
CVE-2024-38613, CVE-2024-27398, CVE-2024-27019, CVE-2024-36954,
CVE-2024-39471, CVE-2024-26583, CVE-2024-35947, CVE-2024-31076,
CVE-2024-38659, CVE-2024-38549, CVE-2024-38618, CVE-2024-38565,
CVE-2024-27401, CVE-2022-48674, CVE-2024-38582, CVE-2024-38634,
CVE-2024-38627, CVE-2024-39480, CVE-2024-36015, CVE-2023-52585,
CVE-2024-36270, CVE-2024-26907, CVE-2024-38615, CVE-2024-38600,
CVE-2024-38612, CVE-2024-36946, CVE-2024-39301, CVE-2024-38601,
CVE-2024-38635, CVE-2024-33621, CVE-2024-36964, CVE-2024-38633,
CVE-2024-39467, CVE-2024-38607, CVE-2024-36971, CVE-2024-35976,
CVE-2024-38587, CVE-2023-52882, CVE-2024-36950, CVE-2024-39276,
CVE-2024-36960, CVE-2024-38583)