LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Thursday, June 5th, 2014

    Time Event
    12:52a
    [$] LWN.net Weekly Edition for June 5, 2014
    The LWN.net Weekly Edition for June 5, 2014 is available.
    2:16p
    Another set of OpenSSL vulnerabilities
    The OpenSSL project has disclosed another set of
    vulnerabilities
    , including one that could enable man-in-the-middle
    attacks and one that could maybe lead to code execution. Expect updates
    from distributors soon. For the curious, Masashi Kikuchi, the discoverer
    of the MITM vulnerability, has posted the
    story of how it was found
    .
    3:16p
    Security advisories for Thursday

    CentOS has updated openssl (C6: multiple vulnerabilities including one from 2010) and openssl097a and openssl098e (C6; C5: man-in-the-middle attack).

    Debian has updated kernel (three vulnerabilities), libav (multiple unspecified vulnerabilities), openssl (multiple vulnerabilities), python-bottle (security mechanism bypass), and python-gnupg (shell command injection).

    Gentoo has updated mutt (code execution) and systemtap (denial of service from 2012).

    Mageia has updated chkrootkit (privilege escalation).

    Red Hat has updated kernel (RHEL6: three vulnerabilities), openssl (Extended lifecycle support products; RHEL5: man-in-the-middle attack; RHEL6: multiple vulnerabilities including one from 2010), and openssl097a and openssl098e (man-in-the-middle attack).

    SUSE has updated gnutls (SLE11SP3: multiple vulnerabilities).

    Ubuntu has updated openssl (multiple vulnerabilities).

    5:16p
    Day: Notify me
    On his blog, GNOME contributor Allan Day writes about a redesign of the GNOME 3 notification mechanisms. It includes a new Message Tray design as well as reworking the lock-screen notifications and the notification banners themselves. "The final goal is one that was at the core of the original design, and which is central to the design of GNOME 3 as a whole: that is, to be noticable and useful without being distracting. Wherever possible with GNOME 3, we have tried to produce a distraction-free experience which helps you concentrate on the task in hand. This requires a fine balancing act, which can be tricky to get right. With the new designs, we want to change that balance slightly, by making notifications a bit more noticable and by providing more effective reminders, but we still want to retain the emphasis on avoiding distraction."
    5:40p
    They’re ba-ack: Browser-sniffing ghosts return to haunt Chrome, IE, Firefox (Ars Technica)
    Ars Technica looks at a revival of a technique for remote sites to determine browser history. Originally, using JavaScript and CSS allowed sites to track browsing history, but those holes were eventually closed by browser makers. Exploiting a timing attack [PDF] on the browser can distinguish between sites that have been visited and those that have not. "The browser timing attack technique [Aäron] Thijs borrowed from fellow researcher [Paul] Stone abuses a programming interface known as requestAnimationFrame, which is designed to make animations smoother. It can be used to time the browser's rendering, which is the time it takes for the browser to display a given webpage. By measuring variations in the time it takes links to be displayed, attackers can infer if a particular website has been visited."

    << Previous Day 2014/06/05
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org