USN-7003-5: Linux kernel vulnerabilities

Read Time:2 Minute, 7 Second

It was discovered that the JFS file system contained an out-of-bounds read
vulnerability when printing xattr debug information. A local attacker could
use this to cause a denial of service (system crash). (CVE-2024-40902)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– MIPS architecture;
– PowerPC architecture;
– x86 architecture;
– ACPI drivers;
– Serial ATA and Parallel ATA drivers;
– Drivers core;
– GPIO subsystem;
– GPU drivers;
– Greybus drivers;
– HID subsystem;
– I2C subsystem;
– IIO subsystem;
– InfiniBand drivers;
– Media drivers;
– VMware VMCI Driver;
– Network drivers;
– Pin controllers subsystem;
– S/390 drivers;
– SCSI drivers;
– USB subsystem;
– JFFS2 file system;
– JFS file system;
– File systems infrastructure;
– NILFS2 file system;
– IOMMU subsystem;
– Sun RPC protocol;
– Netfilter;
– Memory management;
– B.A.T.M.A.N. meshing protocol;
– CAN network layer;
– Ceph Core library;
– Networking core;
– IPv4 networking;
– IPv6 networking;
– IUCV driver;
– MAC80211 subsystem;
– NET/ROM layer;
– Network traffic control;
– SoC Audio for Freescale CPUs drivers;
(CVE-2024-40916, CVE-2024-41035, CVE-2024-39469, CVE-2024-39499,
CVE-2024-36978, CVE-2024-42092, CVE-2024-42087, CVE-2024-42102,
CVE-2024-40978, CVE-2024-40902, CVE-2024-36974, CVE-2024-42096,
CVE-2024-40974, CVE-2024-40904, CVE-2024-40905, CVE-2024-42153,
CVE-2024-42106, CVE-2024-42070, CVE-2024-41097, CVE-2024-42090,
CVE-2024-42105, CVE-2024-42104, CVE-2024-39502, CVE-2024-41089,
CVE-2024-40945, CVE-2024-38619, CVE-2024-40961, CVE-2024-42127,
CVE-2024-39487, CVE-2024-40988, CVE-2024-41044, CVE-2024-42236,
CVE-2024-40942, CVE-2024-39506, CVE-2024-39509, CVE-2024-39503,
CVE-2024-40934, CVE-2024-40959, CVE-2024-42101, CVE-2024-40960,
CVE-2024-40968, CVE-2024-41087, CVE-2023-52803, CVE-2024-40987,
CVE-2024-40943, CVE-2024-42089, CVE-2023-52887, CVE-2024-37078,
CVE-2024-42148, CVE-2024-36894, CVE-2024-42097, CVE-2024-41006,
CVE-2024-40984, CVE-2024-40963, CVE-2024-42223, CVE-2024-40912,
CVE-2024-42086, CVE-2024-41049, CVE-2024-42157, CVE-2024-41034,
CVE-2024-42145, CVE-2024-42124, CVE-2024-40995, CVE-2024-42224,
CVE-2024-40981, CVE-2024-41095, CVE-2024-40901, CVE-2024-42115,
CVE-2024-41041, CVE-2024-41007, CVE-2024-39505, CVE-2024-40932,
CVE-2024-39495, CVE-2024-40980, CVE-2024-42084, CVE-2024-41046,
CVE-2024-42119, CVE-2024-42076, CVE-2024-42232, CVE-2024-39501,
CVE-2024-40958, CVE-2024-40941, CVE-2024-42093, CVE-2024-42094,
CVE-2024-42154)

Read More

webkitgtk-2.46.1-1.fc39

Read Time:36 Second

FEDORA-2024-e1357fc22f

Packages in this update:

webkitgtk-2.46.1-1.fc39

Update description:

Fix login QR code not shown in WhatsApp web.
Disable PSON by default again in GTK 3 API versions.
Disable DMABuf video sink by default to prevent file descriptor leaks.
Fix several crashes and rendering issues.

Use Skia instead of cairo for 2D rendering and enable GPU rendering by default.
Enable offscreen canvas by default.
Add support for system tracing with Sysprof.
Implement printing using the Print portal.
Add new API to load settings from a config file.
Add a new setting to enable or disable the 2D canvas acceleration (enabled by default).
Undeprecate console messages API and make it available in 6.0 API.

Read More

webkitgtk-2.46.1-1.fc41

Read Time:36 Second

FEDORA-2024-b142cc07d0

Packages in this update:

webkitgtk-2.46.1-1.fc41

Update description:

Fix login QR code not shown in WhatsApp web.
Disable PSON by default again in GTK 3 API versions.
Disable DMABuf video sink by default to prevent file descriptor leaks.
Fix several crashes and rendering issues.

Use Skia instead of cairo for 2D rendering and enable GPU rendering by default.
Enable offscreen canvas by default.
Add support for system tracing with Sysprof.
Implement printing using the Print portal.
Add new API to load settings from a config file.
Add a new setting to enable or disable the 2D canvas acceleration (enabled by default).
Undeprecate console messages API and make it available in 6.0 API.

Read More

webkitgtk-2.46.1-1.fc40

Read Time:36 Second

FEDORA-2024-4c6304b6fa

Packages in this update:

webkitgtk-2.46.1-1.fc40

Update description:

Fix login QR code not shown in WhatsApp web.
Disable PSON by default again in GTK 3 API versions.
Disable DMABuf video sink by default to prevent file descriptor leaks.
Fix several crashes and rendering issues.

Use Skia instead of cairo for 2D rendering and enable GPU rendering by default.
Enable offscreen canvas by default.
Add support for system tracing with Sysprof.
Implement printing using the Print portal.
Add new API to load settings from a config file.
Add a new setting to enable or disable the 2D canvas acceleration (enabled by default).
Undeprecate console messages API and make it available in 6.0 API.

Read More

USN-7041-2: CUPS vulnerability

Read Time:17 Second

USN-7041-1 fixed a vulnerability in CUPS. This update provides
the corresponding update for Ubuntu 18.04 LTS.

Original advisory details:

Simone Margaritelli discovered that CUPS incorrectly sanitized IPP
data when creating PPD files. A remote attacker could possibly use this
issue to manipulate PPD files and execute arbitrary code when a printer is
used.

Read More

USN-6964-2: ORC vulnerability

Read Time:15 Second

USN-6964-1 fixed a vulnerability in ORC. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Noriko Totsuka discovered that ORC incorrectly handled certain
specially crafted files. An attacker could possibly use this issue
to execute arbitrary code.

Read More

Hacking ChatGPT by Planting False Memories into Its Data

Read Time:39 Second

This vulnerability hacks a feature that allows ChatGPT to have long-term memory, where it uses information from past conversations to inform future conversations with that same user. A researcher found that he could use that feature to plant “false memories” into that context window that could subvert the model.

A month later, the researcher submitted a new disclosure statement. This time, he included a PoC that caused the ChatGPT app for macOS to send a verbatim copy of all user input and ChatGPT output to a server of his choice. All a target needed to do was instruct the LLM to view a web link that hosted a malicious image. From then on, all input and output to and from ChatGPT was sent to the attacker’s website.

Read More

People Know Their Data Rights, and They’re Here to Play Ball

Read Time:4 Minute, 53 Second

The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. 

After being the subject of big-box data pillaging for so long, consumers finally demand control over their own natural resources – and they’ll take their business elsewhere if they don’t get it.

As individuals see global corporate powers haggle over their personal information, they start to sense just how much their data is worth. And they’re not giving it out for free anymore; in a recent Thales report, 87% of consumers expect “some level of privacy rights” from the companies accessing their data. This seems to be a theme; as companies ask for customers’ information, customers are making demands in return. The question is, can companies keep the balance?

People don’t trust you with their data. Period.

When you trust someone with your finances, you give them control over them. This could be an executor, an investment adviser, your spouse – anyone you feel would do as good a job as you or, better, someone with your best interests at heart. When you don’t trust someone, the opposite is true.

Judging by the amount of control consumers now demand over their data, it’s clear that trust is a commodity yet to be earned by corporate entities. Or if once given by default, it is now hastily being snatched back. A report by professional services firm KPMG revealed that 56% want more control over their personal data, and 87% characterize it as a human right. Indeed, digital rights are human rights!

A recent study by the Annenberg School for Communication summed it up: “Eighty percent of Americans believe that what companies know about them can cause them harm.”

“I have data rights and am not afraid to use them!”

More and more, people are recognizing the high value that businesses place on their data – indeed, that it is the source of many businesses – and they want control over who has it, what they do with it, and when it can be obtained.

It also leaves a really, really bad taste in their mouths when organizations try to hide their data collection, “con them out of it,” or refuse to protect it (and them in the process). The Digital Trust Index report highlights what users now expect from the companies sourcing their information. The list amounts to a very short leash, indicative of very minimal trust. It includes:

72% | Online brand interactions that fit around their workday.

22% | Over one in five will give up after a fruitless online customer service interaction.

46% | A clear view of the data they’ve consented to share.

Additionally, the report reveals that these requirements come with a great deal of mistrust surrounding the entities that handle their information. Trust around the globe in social media companies ranges

from a high of 10% in the US and South Africa, to a low of 2% in Japan. When it comes to organizations using Generative AI, nearly half of all respondents were wary (47%), while those in France and the UAE showed above-average concern (54%).

These stats highlight the challenging position this puts many businesses in, although the terrain is to be expected.

How Do I Protect Them? Let Me Count the Ways

Following significant breaches of trust, there has been a decline in consumer trust towards corporations, governments, small businesses, and non-profits when it comes to safeguarding their information. Consumers are increasingly vigilant and assertive in ensuring the security and privacy of their personal data. Clear-cut and aggressive legislation protecting every ounce of data and consumer autonomy over it has been what’s followed, and that ball is still rolling.

It’s worth compiling a list of all, or at least many, of the notable data privacy and protection laws to date. These are the fruits of our misgivings around for-profit companies harvesting our stats without (and even with) our consent. It can only be approximate, as this legislative snowball is picking up steam, and many are in the works as we speak.

Quick spoiler: Of 194 countries represented in the United Nations (technically 193 plus two non-member observer states), 137 have enacted data privacy and protection laws to date. Here are some you might recognize.

GDPR | General Data Protection Regulation (GDPR)

CCPA | California Rights Privacy Act (CRPA)

APRA | American Privacy Rights Act (APRA)

HIPAA | Health Insurance Portability and Accountability Act (HIPAA)

PCI DSS | Payment Card Industry Data Security Standard

GLBA | Gramm-Leach-Bliley Act

In the US, fifteen states have enacted comprehensive data privacy laws, seven more have put more narrow ones in place, and fifteen total have introduced privacy laws in 2023-2024, according to Bloomberg Law. 

The Consequence of Breaking [Data] Trust

While the effort required to implement data protection policies around the globe is monumental, it is simply “the cost of doing business” in the modern world. Don’t do it and see what happens. Security Magazine figures indicate that 66% of US consumers would send a clear message to ham-handlers of sensitive data, refusing to trust their information to a company that suffered a breach.

Consultants at Wavestone report over 91% of businesses now derive significant value from customer data, that’s a message for companies worth listening to and acting upon. Investing in a Customer IAM solution that keeps customer privacy front and center of the authentication journey becomes an enabler for compliance, enhanced trust, and improved bottom line.

An ardent believer in personal data privacy and the technology behind it, Katrina Thompson is a freelance writer leaning into encryption, data privacy legislation, and the intersection of information technology and human rights. She has written for Bora, Venafi, Tripwire, and many other sites.

Read More