Happy Friday fellow Linux geeks! This week, important updates have been issued for gdk-pixbuf, connman and zlib. Read on to learn about these vulnerabilities and how to secure your system against them. 

Have a question about or comment on one of the vulnerabilities highlighted in today's newsletter? Let's discuss!

Managing encrypted Linux devices across your entire organization? Join us for a discussion with Linux experts on how to make this process easier for your enterprise - next Wednesday at 2pm EST. There are only a few spots left- Save Your Spot Now!

Yours in Open Source,

Brittany Signature 150

gdk-pixbuf

The Discovery 

Several vulnerabilities were discovered in the GDK Pixbuf library gdk-pixbuf, including  heap-based buffer overflow vulnerabilities when decoding the lzw compressed stream of image data (CVE-2021-44648) and when compositing or clearing frames in GIF files (CVE-2021-46829).

Gdk Pixbuf Logo

The Impact

These bugs may result in the execution of arbitrary code or denial of service (DoS) if a malformed GIF image is processed.

The Fix

A gdk-pixbuf security update fixes these flaws. We recommend that you update now to protect the security, integrity and availability of your systems.

Your Related Advisories:

Register to Customize Your Advisories

connman

The Discovery 

Two security issues were discovered in connman, an Internet connection manager for embedded devices running Linux. It was found that remote attackers able to send HTTP requests to the gweb component were able to exploit a heap-based buffer overflow in the received_data function to execute code (CVE-2022-32292). A man-in-the-middle attack against a WISPR HTTP query which could be used to trigger a use-after-free in WISPR handling (CVE-2022-32293) was also discovered.


LinuxKernel

The Impact

These bugs could result in remote code execution (RCE) attacks, man-in-the-middle attacks, or crashes.

The Fix

A security update is available for connman that fixes these dangerous flaws. We recommend that you update as soon as possible to protect against attacks and compromise.

Your Related Advisories:

Register to Customize Your Advisories

zlib

The Discovery

A heap-based buffer overflow vulnerability was discovered in the inflate operation in zlib (CVE-2022-37434).

The Impact

This issue could result in denial of service (DoS) or the execution of arbitrary code.

Zlib

The Fix

A zlib security update mitigates this flaw. We recommend that you update as soon as possible to protect against potential security issues and downtime.

Your Related Advisories:

Register to Customize Your Advisories