A new Linux variant of the IceFire ransomware has recently been discovered and observed attacking large enterprises, leveraging double extortion, evasion techniques such as deleting log files, and numerous persistence mechanisms. ​​Learn how to prevent an IceFire ransomware attack from locking up your critical files and rendering your systems useless.

Several critical and high-severity vulnerabilities have also been discovered in Chromium that could lead to a server crash, memory leak, or the execution of arbitrary code. In addition, important SnakeYAML and ImageMagick updates have been released to fix bugs that could be exploited to carry out privilege escalation or denial of service (DoS) attacks leading to server crash and unauthorized access to confidential information. It is crucial that all impacted users update immediately to protect against downtime and compromise.

Continue reading to learn about other significant issues that have been fixed, and how to secure your systems against them.

Yours in Open Source,

Brittany Signature 150

Chromium

The Discovery 

Several critical and high-severity use after free, heap buffer overflow and integer overflow vulnerabilities have been found in Chromium. 

Chromium

The Impact

These issues could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page or PDF file, resulting in a server crash, memory leak, or the execution of arbitrary code. 

The Fix

An update is available for Chromium that fixes these flaws. We recommend that all impacted users update now to protect the confidentiality, integrity and availability of their systems.

Your Related Advisories:

Register to Customize Your Advisories

SnakeYAML

The Discovery 

Multiple security issues have been discovered in the SnakeYAML YAML parser and emitter for the Java programming language. It was discovered that SnakeYAML did not limit the maximal nested depth for collections when parsing YAML data (CVE-2022-25857, CVE-2022-38749, CVE-2022-38750), and that SnakeYAML did not limit the maximal data matched with regular expressions when parsing YAML data (CVE-2022-38751).

Java

The Impact

If a user or automated system were tricked into opening a specially crafted YAML file, an attacker could possibly use these vulnerabilities to cause applications using SnakeYAML to crash. This could result in a denial of service (DoS) attack leading to server crash and loss of access.

The Fix

Updates have been released for SnakeYAML that mitigate these DoS bugs. We urge all impacted users to update immediately to protect against attacks leading to downtime and system compromise.

Your Related Advisories:

Register to Customize Your Advisories

ImageMagick

The Discovery 

Several vulnerabilities have been discovered in ImageMagick, a package commonly used by web services to process images, including a high-severity stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c (CVE-2020-19667).

ImageMagick

The Impact

These issues may lead to privilege escalation attacks, denial of service (DoS) attacks resulting in unauthorized access or server crash, or information leaks.

The Fix

An ImageMagick security update that fixes these bugs is now available. We strongly recommend that all impacted users update as soon as possible to prevent potential downtime and compromise of sensitive data.

Your Related Advisories:

Register to Customize Your Advisories