Happy Friday fellow Linux geeks! This week, important updates have been issued for OpenJDK, the Linux kernel and u-boot. Read on to learn about these vulnerabilities and how to secure your system against them.
Have a question about or comment on one of the vulnerabilities highlighted in today's newsletter? Let's discuss!
Yours in Open Source,
OpenJDKThe DiscoverySeveral vulnerabilities have been discovered in the OpenJDK Java runtime (CVE-2022-21540, CVE-2022-21541, CVE-2022-21549 and CVE-2022-34169). The ImpactThese issues may result in the execution of arbitrary Java bytecode or the bypass of the Java sandbox. The FixAn OpenJDK security update fixes these bugs. We recommend that you update now to protect against attacks and compromise. Your Related Advisories:Register to Customize Your Advisories |
Linux KernelThe DiscoverySeveral important security issues have been found in the Linux kernel. The ImpactThese vulnerabilities could result in privilege escalation attacks, denial of service (system crash), the execution of arbitrary code, or information leakage. The FixA Linux kernel security update mitigates these flaws. We recommend that you update promptly to protect the security, integrity and availability of your systems. Your Related Advisories:Register to Customize Your Advisories |
u-bootThe DiscoveryTwo out-of-bounds write vulnerabilities in the IP defragmentation (CVE-2022-30790 and CVE-2022-34835), and a stack buffer overflow vulnerability in the i2c md command (CVE-2022-34835) have been discovered in the u-boot primary boot loader. The ImpactThese critical bugs could result in buffer overflow attacks. The FixAn update for u-boot fixes these flaws. We recommend that you update as soon as possible to avoid potential security incidents that may result from the exploitation of these vulnerabilities. Your Related Advisories:Register to Customize Your Advisories
|