Linux Advisory Watch: July 15, 2022
Happy Friday fellow Linux geeks! This week, important updates have been issued for OpenSSL, SpiderMonkey and the Linux kernel. Read on to learn about these vulnerabilities and how to secure your system against them.
Have a question about or comment on one of the vulnerabilities highlighted in today's newsletter? Let's discuss!
Yours in Open Source,
OpenSSLThe DiscoveryIt was discovered that the c_rehash script included in OpenSSL did not sanitize shell meta characters (CVE-2022-2068). The ImpactThis could result in the execution of arbitrary commands. The FixAn OpenSSL security update fixes this issue. We recommend that you update now to protect the security and integrity of your systems. Your Related Advisories:Register to Customize Your Advisories |
SpiderMonkeyThe DiscoverySeveral remotely exploitable security issues have been identified in the SpiderMonkey JavaScript library. It was found that SpiderMonkey incorrectly generated certain assembly code (CVE-2022-28285 and CVE-2022-31740). The ImpactA remote attacker could possibly use this issue to cause a crash or expose sensitive information. The FixA SpiderMonkey update mitigates these dangerous vulnerabilities. Update as soon as possibly to secure your systems and your sensitive information. Your Related Advisories:Register to Customize Your Advisories |
Linux KernelThe DiscoveryIt was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free (CVE-2022-28388). The ImpactThis issue could be exploited to cause a denial of service (system crash). The FixA Linux kernel security update fixes this flaw. Update now to protect against denial of service (DoS) attacks. Your Related Advisories:Register to Customize Your Advisories
|