Happy Friday fellow Linux geeks! This week, important updates have been issued for Libxslt, Kicad and zlib. Read on to learn about these vulnerabilities and how to secure your system against them.
Have a question about or comment on one of the vulnerabilities highlighted in today's newsletter? Let's discuss!
Yours in Open Source,
LibxsltThe DiscoveryIt was discovered that Libxslt incorrectly handled certain XML and HTML pages (CVE-2019-5815 and CVE-2021-30560). The ImpactAn attacker could possibly use this issue to expose sensitive information or execute arbitrary code. The FixAn update for Libxslt fixes these vulnerabilities. We recommend that you update as soon as possible to protect the privacy of your sensitive information and the security and integrity of your systems. Your Related Advisories:Register to Customize Your Advisories |
KicadThe DiscoveryMultiple buffer overflows were discovered in Kicad, a suite of programs for the creation of printed circuit boards (CVE-2022-23803, CVE-2022-23804, CVE-2022-23946 and CVE-2022-23947). The ImpactThese flaws could result in the execution of arbitrary code. The FixA security update for Kicad mitigates these issues. We recommend that you update now to protect against attacks and compromise. Your Related Advisories:Register to Customize Your Advisories |
zlibThe DiscoveryIt was found that zlib incorrectly handled memory when performing certain inflate operations (CVE-2022-37434). The ImpactAn attacker could use this issue to cause rsync to crash, resulting in a denial of service (DoS), or possibly execute arbitrary code. The FixAn important security update for zlib fixes this dangerous bug. We recommend that you update promptly to protect the security, integrity and availability of your systems. Your Related Advisories:Register to Customize Your Advisories
|