Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.


LinuxSecurity.com Feature Extras:

LinuxSecurity.com Launches New site, Celebrates 20 Years of Following Open Source Security News and Resources - July 29, 2019 - Midland Park, NJ -- LinuxSecurity.com, the open-source communitys go-to source for security news and information, has revealed a completely new site design and a renewed focus on providing timely, authoritative industry content.

Welcome to the New LinuxSecurity.com! - As Linux and Security Evolves, So Has LinuxSecurity.com!


  Debian: DSA-4490-1: subversion security update (Jul 31)
 

Several vulnerabilities were discovered in Subversion, a version control system. The Common Vulnerabilities and Exposures project identifies the following problems:

  Debian: DSA-4489-1: patch security update (Jul 27)
 

Imre Rad discovered several vulnerabilities in GNU patch, leading to shell command injection or escape from the working directory and access and overwrite files, if specially crafted patch files are processed.

  Debian: DSA-4488-1: exim4 security update (Jul 25)
 

Jeremy Harris discovered that Exim, a mail transport agent, does not properly handle the ${sort } expansion. This flaw can be exploited by a remote attacker to execute programs with root privileges in non-default (and unusual) configurations where ${sort } expansion is used for items

 
  Fedora 30: proftpd FEDORA-2019-e9187610c3 (Jul 31)
 

This update addresses an arbitrary file copy vulnerability in mod_copy in ProFTPD, which allowed for remote code execution and information disclosure without authentication due to not honoring ` ` constraints. Upstream bug: http://bugs.proftpd.org/show_bug.cgi?id=4372

  Fedora 29: kernel-headers FEDORA-2019-3dbfaeac73 (Jul 30)
 

Update to v5.1.20 ---- Update to v5.1.19

  Fedora 29: kernel FEDORA-2019-3dbfaeac73 (Jul 30)
 

Update to v5.1.20 ---- Update to v5.1.19

  Fedora 29: oniguruma FEDORA-2019-5409bb5e68 (Jul 30)
 

Some security issues are found on oniguruma. This new rpm should fix these issues

  Fedora 30: oniguruma FEDORA-2019-3f3d0953db (Jul 30)
 

Some security issues are found on oniguruma. This new rpm should fix these issues.

  Fedora 30: cutter-re FEDORA-2019-2a16e1ab93 (Jul 29)
 

Rebase to radare2 3.6.0 and fix CVE-2019-12790, CVE-2019-12802 and CVE-2019-12865 and rebase cutter to 1.8.3.

  Fedora 30: radare2 FEDORA-2019-2a16e1ab93 (Jul 29)
 

Rebase to radare2 3.6.0 and fix CVE-2019-12790, CVE-2019-12802 and CVE-2019-12865 and rebase cutter to 1.8.3.

  Fedora 30: deepin-clone FEDORA-2019-3d418f349c (Jul 27)
 

Security fix for CVE-2019-13228, CVE-2019-13229, CVE-2019-13227, CVE-2019-13226.

  Fedora 30: dtkwidget FEDORA-2019-3d418f349c (Jul 27)
 

Security fix for CVE-2019-13228, CVE-2019-13229, CVE-2019-13227, CVE-2019-13226.

  Fedora 30: dtkcore FEDORA-2019-3d418f349c (Jul 27)
 

Security fix for CVE-2019-13228, CVE-2019-13229, CVE-2019-13227, CVE-2019-13226.

  Fedora 30: sqlite FEDORA-2019-02b81266b7 (Jul 26)
 

Fixed out of bounds heap read in function rtreenode() Enhance the rtreenode() function of rtree (used for testing) so that it uses the newer sqlite3_str object for better performance and improved error reporting.

  Fedora 30: kernel FEDORA-2019-9d3fe6fd5b (Jul 25)
 

Update to v5.1.19

  Fedora 30: kernel-headers FEDORA-2019-9d3fe6fd5b (Jul 25)
 

Update to v5.1.19

 
  RedHat: RHSA-2019-2003:01 Important: icedtea-web security update (Jul 31)
 

An update for icedtea-web is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2004:01 Important: icedtea-web security update (Jul 31)
 

An update for icedtea-web is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-1951:01 Moderate: nss and nspr security, bug fix, (Jul 30)
 

An update for nss and nspr is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2019-2000:01 Low: Red Hat OpenShift Enterprise final (Jul 30)
 

This is the final notification for the retirement of Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7. This notification applies only to those customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7.

  RedHat: RHSA-2019-1972:01 Important: ruby:2.5 security update (Jul 30)
 

An update for the ruby:2.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1973:01 Important: kernel-alt security and bug fix update (Jul 30)
 

An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-1971:01 Important: kernel-rt security and bug fix update (Jul 30)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-1968:01 Important: qemu-kvm-rhev security and bug fix (Jul 30)
 

An update for qemu-kvm-rhev is now available for Red Hat Virtualization for Red Hat Virtualization Host 7. Red Hat Product Security has rated this update as having a Important security impact. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1967:01 Moderate: samba security, (Jul 30)
 

Updated samba packages that fix one security issue and provide several bug fixes and enhancements are now available for Red Hat Gluster Storage 3.4 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2019-1966:01 Moderate: samba security, (Jul 30)
 

Updated samba packages that fix one security issue and provide several bug fixes and enhancements are now available for Red Hat Gluster Storage 3.4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2019-1959:01 Important: kernel security, bug fix, (Jul 30)
 

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-1946:01 Important: kernel security, bug fix, (Jul 30)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1942:01 Important: perl security update (Jul 30)
 

An update for perl is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1948:01 Important: ruby security update (Jul 30)
 

An update for ruby is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1943:01 Important: libssh2 security update (Jul 30)
 

An update for libssh2 is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1945:01 Important: keepalived security update (Jul 30)
 

An update for keepalived is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1944:01 Important: procps-ng security update (Jul 30)
 

An update for procps-ng is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1947:01 Important: vim security update (Jul 30)
 

An update for vim is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1931:01 Important: kernel security and bug fix update (Jul 29)
 

An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1932:01 Important: kernel security update (Jul 29)
 

An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1930:01 Important: chromium-browser security update (Jul 29)
 

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-1910:01 Moderate: docker security and bug fix update (Jul 29)
 

An update for docker is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-1907:01 Moderate: podman security, bug fix, (Jul 29)
 

An update for podman is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-1883:01 Important: qemu-kvm security update (Jul 29)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-1880:01 Low: curl security and bug fix update (Jul 29)
 

An update for curl is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2019-1896:01 Moderate: 389-ds-base security and bug fix update (Jul 29)
 

An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2019-1881:01 Important: qemu-kvm-ma security and bug fix update (Jul 29)
 

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-1873:01 Important: kernel security, bug fix, (Jul 29)
 

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-1891:01 Important: kernel-rt security and bug fix update (Jul 29)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-1884:01 Moderate: libssh2 security update (Jul 29)
 

An update for libssh2 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2019-1898:01 Low: httpd security update (Jul 29)
 

An update for httpd is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2019-1862:01 Low: Red Hat OpenShift Enterprise one-month (Jul 26)
 

This is the one-month notification for the end of the maintenance phase for Red Hat OpenShift Enterprise 3.6 and 3.7. This notification applies only to customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and 3.7. 2. Description:

  RedHat: RHSA-2019-1860:01 Important: rh-redis32-redis security update (Jul 25)
 

An update for rh-redis32-redis is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

 
  SUSE: 2019:2034-1 moderate: python-Django1 (Aug 1)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2035-1 important: polkit (Aug 1)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2036-1 important: java-1_8_0-openjdk (Aug 1)
 

An update that solves 8 vulnerabilities and has one errata is now available.

  SUSE: 2019:2031-1 important: subversion (Jul 31)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:2032-1 important: subversion (Jul 31)
 

An update that solves two vulnerabilities and has one errata is now available.

  SUSE: 2019:2033-1 important: icedtea-web (Jul 31)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2019:2030-1 moderate: zypper, libzypp and libsolv (Jul 31)
 

An update that solves three vulnerabilities and has 41 fixes is now available.

  SUSE: 2019:2028-1 important: java-1_7_0-openjdk (Jul 31)
 

An update that fixes 10 vulnerabilities is now available.

  SUSE: 2019:2027-1 moderate: python-requests (Jul 31)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2021-1 important: java-1_8_0-openjdk (Jul 30)
 

An update that solves 8 vulnerabilities and has one errata is now available.

  SUSE: 2019:2018-1 important: polkit (Jul 30)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2020-1 important: mariadb, mariadb-connector-c (Jul 30)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2019:2014-1 moderate: openexr (Jul 29)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2013-1 important: bzip2 (Jul 29)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:1861-2 important: MozillaFirefox (Jul 29)
 

An update that fixes 10 vulnerabilities is now available.

  SUSE: 2019:1990-1 cronie (Jul 26)
 

An update that solves two vulnerabilities and has two fixes is now available.

  SUSE: 2019:1973-1 important: rmt-server (Jul 25)
 

An update that solves two vulnerabilities and has 10 fixes is now available.

  SUSE: 2019:1972-1 moderate: libsolv, libzypp, zypper (Jul 25)
 

An update that solves three vulnerabilities and has 9 fixes is now available.

  SUSE: 2019:1971-1 moderate: libgcrypt (Jul 25)
 

An update that fixes one vulnerability is now available.

 
  Ubuntu 4079-2: SoX vulnerabilities (Aug 1)
 

SoX could be made to crash if it received a specially crafted MP3 file.

  Ubuntu 4085-1: Sigil vulnerability (Aug 1)
 

Sigil could be made to overwrite files.

  Ubuntu 4084-1: Django vulnerabilities (Aug 1)
 

Several security issues were fixed in Django.

  Ubuntu 4069-2: Linux kernel (HWE) vulnerabilities (Aug 1)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4083-1: OpenJDK 11 vulnerabilities (Jul 31)
 

Several security issues were fixed in OpenJDK 11.

  Ubuntu 4082-1: Subversion vulnerabilities (Jul 31)
 

Subversion could be made to crash if it received specially crafted network traffic.

  Ubuntu 4081-1: Pango vulnerability (Jul 31)
 

Pango could be made to execute arbitrary code if it received a specially crafted input.

  Ubuntu 4080-1: OpenJDK 8 vulnerabilities (Jul 30)
 

Several security issues were fixed in OpenJDK.

  Ubuntu 4079-1: SoX vulnerabilities (Jul 30)
 

SoX could be made to crash if it received a specially crafted MP3 file.

  Ubuntu 4078-1: OpenLDAP vulnerabilities (Jul 30)
 

Several security issues were fixed in OpenLDAP.

  Ubuntu 4077-1: tmpreaper vulnerability (Jul 29)
 

tmpreaper could be made to overwrite files as the administrator.

  Ubuntu 3990-2: urllib3 vulnerability (Jul 29)
 

urllib3 could be used to perform a CRLF injection if it received a specially crafted request.

  Ubuntu 0053-1: Linux kernel vulnerability (Jul 29)
 

Several security issues were fixed in the kernel.

  Ubuntu 4076-1: Linux kernel vulnerabilities (Jul 25)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4054-2: Firefox regressions (Jul 25)
 

USN-4054-1 caused some minor regressions in Firefox.

  Ubuntu 4075-1: Exim vulnerability (Jul 25)
 

Exim could be made to run programs as an administrator if it received specially crafted network traffic.

  Ubuntu 4074-1: VLC vulnerabilities (Jul 25)
 

Several security issues were fixed in VLC.

  Ubuntu 4073-1: libEBML vulnerability (Jul 25)
 

libEBML could be made to crash if it opened a specially crafted file.

 
  Debian LTS: DLA-1868-1: squirrelmail security update (Aug 1)
 

A XSS vulnerability was discovered in SquirrelMail. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mails can be executed within the application context via

  Debian LTS: DLA-1867-1: wpa security update (Jul 31)
 

Several vulnerabilities were discovered in WPA supplicant / hostapd. Some of them could only partially be mitigated, please read below for details.

  Debian LTS: DLA-1866-1: glib2.0 security update (Jul 31)
 

Various minor issues have been addressed in the GLib library. GLib is a useful general-purpose C library used by projects such as GTK+, GIMP, and GNOME.

  Debian LTS: DLA-1730-4: libssh2 regression update (Jul 30)
 

Several more boundary checks have been backported to libssh2's src/sftp.c. Furthermore, all boundary checks in src/sftp.c now result in an LIBSSH2_ERROR_BUFFER_TOO_SMALL error code, rather than a

  Debian LTS: DLA-1865-1: sdl-image1.2 security update (Jul 27)
 

The following issues have been found in sdl-image1.2, the 1.x version of the image file loading library. CVE-2018-3977

  Debian LTS: DLA-1864-1: patch security update (Jul 25)
 

An issue with quoting has been found in patch, a tool to apply a diff file to an original, when invoking ed. In order to avoid this, ed is now directly started instead of calling a shell which starts ed.

  Debian LTS: DLA-1730-3: libssh2 regression update (Jul 25)
 

Various security problems have been additionally fixed in libssh2, an SSH client implementation written in C++.

 
  CentOS: CESA-2019-1898: Low CentOS 7 httpd (Jul 31)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2019:1898

  CentOS: CESA-2019-1883: Important CentOS 7 qemu-kvm (Jul 31)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2019:1883

  CentOS: CESA-2019-1884: Moderate CentOS 7 libssh2 (Jul 31)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2019:1884

  CentOS: CESA-2019-1880: Low CentOS 7 curl (Jul 31)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2019:1880

  CentOS: CESA-2019-1896: Moderate CentOS 7 389-ds-base (Jul 31)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2019:1896

  CentOS: CESA-2019-1873: Important CentOS 7 kernel (Jul 31)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2019:1873

 
  SciLinux: SLSA-2019-2003-1 Important: icedtea-web on SL7.x x86_64 (Jul 31)
 

icedtea-web: path traversal while processing elements of JNLP files results in arbitrary file overwrite (CVE-2019-10182) * icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite (CVE-2019-10185) * icedtea-web: unsigned code injection in a signed JAR file (CVE-2019-10181) SL7 x86_64 icedtea-web-1.7.1-2.el7_6.x86_64.rpm icedtea- [More...]

  SciLinux: SLSA-2019-1873-1 Important: kernel on SL7.x x86_64 (Jul 30)
 

kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884) * kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085) * kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871) * kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_ [More...]

  SciLinux: SLSA-2019-1898-1 Low: httpd on SL7.x x86_64 (Jul 30)
 

httpd: Weak Digest auth nonce generation in mod_auth_digest (CVE-2018-1312) SL7 x86_64 httpd-2.4.6-89.el7_6.1.x86_64.rpm httpd-debuginfo-2.4.6-89.el7_6.1.x86_64.rpm httpd-devel-2.4.6-89.el7_6.1.x86_64.rpm httpd-tools-2.4.6-89.el7_6.1.x86_64.rpm mod_ldap-2.4.6-89.el7_6.1.x86_64.rpm mod_proxy_html-2.4.6-89.el7_6.1.x86_64.rpm mod_session-2.4.6-89.el7_6.1.x86_64.rpm [More...]

  SciLinux: SLSA-2019-1896-1 Moderate: 389-ds-base on SL7.x x86_64 (Jul 29)
 

389-ds-base: DoS via hanging secured connections (CVE-2019-3883) Bug Fix(es): * Previously, if you were using the PAM plugin and attempted to bind as a dn that doesn't exist, the server would crash. This has now been fixed. SL7 x86_64 389-ds-base-1.3.8.4-25.1.el7_6.x86_64.rpm 389-ds-base-debuginfo-1.3.8.4-25.1.el7_6.x86_64.rpm 389-ds-base-devel-1.3.8.4-25.1.el7_6.x86_64.rpm [More...]

  SciLinux: SLSA-2019-1884-1 Moderate: libssh2 on SL7.x x86_64 (Jul 29)
 

libssh2: Out-of-bounds memory comparison with specially crafted message channel request (CVE-2019-3862) SL7 x86_64 libssh2-1.4.3-12.el7_6.3.i686.rpm libssh2-1.4.3-12.el7_6.3.x86_64.rpm libssh2-debuginfo-1.4.3-12.el7_6.3.i686.rpm libssh2-debuginfo-1.4.3-12.el7_6.3.x86_64.rpm libssh2-devel-1.4.3-12.el7_6.3.i686.rpm libssh2-devel-1.4.3-12.el7_6.3.x86_64.rpm libssh2- [More...]

  SciLinux: SLSA-2019-1883-1 Important: qemu-kvm on SL7.x x86_64 (Jul 29)
 

QEMU: device_tree: heap buffer overflow while loading device tree blob (CVE-2018-20815) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * As newer machine remove csske feature, detection of the processor fail and machine used old version a [More...]

  SciLinux: SLSA-2019-1880-1 Low: curl on SL7.x x86_64 (Jul 29)
   
 
  openSUSE: 2019:1824-1: important: rmt-server (Aug 1)
 

An update that solves two vulnerabilities and has 10 fixes is now available.

  openSUSE: 2019:1826-1: moderate: openexr (Aug 1)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2019:1816-1: moderate: openexr (Jul 30)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2019:1815-1: important: chromium (Jul 30)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2019:1813-1: important: MozillaThunderbird (Jul 30)
 

An update that fixes 10 vulnerabilities is now available.

  openSUSE: 2019:1815-1: important: chromium (Jul 30)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2019:1814-1: important: virtualbox (Jul 30)
 

An update that fixes 52 vulnerabilities is now available.

  openSUSE: 2019:1811-1: important: MozillaFirefox (Jul 29)
 

An update that fixes 10 vulnerabilities is now available.

  openSUSE: 2019:1808-1: moderate: tomcat (Jul 25)
 

An update that solves two vulnerabilities and has one errata is now available.

 
  Mageia 2019-0216: virtualbox security update (Jul 27)
 

OpenSSL versions 1.1.0 through 1.1.0j and 1.1.1 through 1.1.1b are susceptible to a vulnerability that could lead to disclosure of sensitive information or the addition or modification of data (CVE-2019-1543). Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability

  Mageia 2019-0215: vlc security update (Jul 25)
 

VLC 3.0.7 has been released on June 6 including security fixes References: - https://bugs.mageia.org/show_bug.cgi?id=24940 - https://jbkempf.com/blog/post/2019/VLC-3.0.7-and-security/