libsoup3-3.4.4-3.fc39

Read Time:15 Second

FEDORA-2024-a059ea1dfc

Packages in this update:

libsoup3-3.4.4-3.fc39

Update description:

Add patches to fix:

CVE-2024-52530 libsoup3: HTTP request smuggling via stripping null bytes from the ends of header names (bug #2325358)
CVE-2024-52532 libsoup3: infinite loop while reading websocket data (bug #2325356)

Read More

libsoup3-3.4.4-5.fc40

Read Time:15 Second

FEDORA-2024-bd09057dd2

Packages in this update:

libsoup3-3.4.4-5.fc40

Update description:

Add patches to fix:

CVE-2024-52530 libsoup3: HTTP request smuggling via stripping null bytes from the ends of header names (bug #2325358)
CVE-2024-52532 libsoup3: infinite loop while reading websocket data (bug #2325356)

Read More

USN-7102-1: MySQL vulnerabilities

Read Time:27 Second

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.40 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
Ubuntu 24.04 LTS, and Ubuntu 24.10.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-40.html
https://www.oracle.com/security-alerts/cpuoct2024.html

Read More

Criminals Exploiting FBI Emergency Data Requests

Read Time:43 Second

I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too.

Turns out the same thing is true for non-technical backdoors:

The advisory said that the cybercriminals were successful in masquerading as law enforcement by using compromised police accounts to send emails to companies requesting user data. In some cases, the requests cited false threats, like claims of human trafficking and, in one case, that an individual would “suffer greatly or die” unless the company in question returns the requested information.

The FBI said the compromised access to law enforcement accounts allowed the hackers to generate legitimate-looking subpoenas that resulted in companies turning over usernames, emails, phone numbers, and other private information about their users.

Read More