Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Linux: An OS Capable of Effectively Meeting the US Governments Security Needs Heading into 2020 - As Open Source has become increasingly mainstream and widely accepted for its numerous benefits, the use of Linux as a flexible, transparent and highly secure operating system has also increasingly become a prominent choice among corporations, educational institutions and government sectors alike. With national security concerns at an all time high heading into 2020, it appears that the implementation of Linux could effectively meet the United States governments critical security needs for application development and installations.

Linux Kernel Security in a Nutshell: How to Secure Your Linux System - The Linux kernel is the core component of the Linux operating system, maintaining complete control over everything in the system. It is the interface between applications and data processing at the hardware level, connecting the system hardware to the application software. The kernel manages input/output requests from software, memory, processes, peripherals and security, among other hefty responsibilities. Needless to say, the Linux kernel is pretty important.


  Debian: DSA-4590-1: cyrus-imapd security update (Dec 19)
 

It was discovered that the lmtpd component of the Cyrus IMAP server created mailboxes with administrator privileges if the "fileinto" was used, bypassing ACL checks.

  Debian: DSA-4589-1: debian-edu-config security update (Dec 18)
 

It was discovered that debian-edu-config, a set of configuration files used for the Debian Edu blend, configured too permissive ACLs for the Kerberos admin server, which allowed password changes for other user principals.

  Debian: DSA-4588-1: python-ecdsa security update (Dec 17)
 

It was discovered that python-ecdsa, a cryptographic signature library for Python, incorrectly handled certain signatures. A remote attacker could use this issue to cause python-ecdsa to either not warn about incorrect signatures, or generate exceptions resulting in a

  Debian: DSA-4587-1: ruby2.3 security update (Dec 17)
 

Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code.

  Debian: DSA-4586-1: ruby2.5 security update (Dec 17)
 

Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code.

  Debian: DSA-4585-1: thunderbird security update (Dec 15)
 

Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code. For the oldstable distribution (stretch), these problems have been fixed

  Debian: DSA-4584-1: spamassassin security update (Dec 14)
 

Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. CVE-2018-11805

  Debian: DSA-4565-2: intel-microcode security update (Dec 13)
 

This update ships updated CPU microcode for CFL-S (Coffe Lake Desktop) models of Intel CPUs which were not yet included in the Intel microcode update released as DSA 4565-1. For details please refer to https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/IPU-2019.2-microcode-update-guidance-v1.01.pdf

  Debian: DSA-4583-1: spip security update (Dec 13)
 

A vulnerability was discovered in the SPIP publishing system, which could result in unauthorised writes to the database by authors. The oldstable distribution (stretch) is not affected.

  Debian: DSA-4582-1: davical security update (Dec 13)
 

Multiple cross-site scripting and cross-site request forgery issues were discovered in the DAViCal CalDAV Server. For the oldstable distribution (stretch), these problems have been fixed


  Fedora 30: cacti-spine FEDORA-2019-6bf27b45b3 (Dec 19)
 

- Update to 1.2.8 Release notes:

  Fedora 30: cacti FEDORA-2019-6bf27b45b3 (Dec 19)
 

- Update to 1.2.8 Release notes:

  Fedora 30: fribidi FEDORA-2019-533a72fec5 (Dec 19)
 

Security fix for CVE-2019-18397

  Fedora 31: python-django FEDORA-2019-adc8990386 (Dec 18)
 

bugfix release for CVE-2019-19118

  Fedora 30: openslp FEDORA-2019-86bceb61b3 (Dec 18)
 

Security fix for CVE-2019-5544

  Fedora 31: chromium FEDORA-2019-1a10c04281 (Dec 17)
 

Update to Chromium 79. Fixes the usual giant pile of bugs and security issues. This time, the list is: CVE-2019-13725 CVE-2019-13726 CVE-2019-13727 CVE-2019-13728 CVE-2019-13729 CVE-2019-13730 CVE-2019-13732 CVE-2019-13734 CVE-2019-13735 CVE-2019-13764 CVE-2019-13736 CVE-2019-13737 CVE-2019-13738 CVE-2019-13739 CVE-2019-13740 CVE-2019-13741 CVE-2019-13742 CVE-2019-13743

  Fedora 31: libssh FEDORA-2019-8b0ad69829 (Dec 17)
 

Update to version 0.9.3 to address CVE-2019-14889

  Fedora 31: fribidi FEDORA-2019-7075bc4ff8 (Dec 17)
 

Security fix for CVE-2019-18397

  Fedora 31: openslp FEDORA-2019-1e5ae33e87 (Dec 17)
 

Security fix for CVE-2019-5544

  Fedora 31: kernel FEDORA-2019-39e97683e8 (Dec 16)
 

The 5.3.16 update contains a number of important fixes across the tree

  Fedora 31: libgit2 FEDORA-2019-9c3d054f39 (Dec 16)
 

This is a security release fixing the following issues: * CVE-2019-1348: the fast-import stream command "feature export-marks=path" allows writing to arbitrary file paths. As libgit2 does not offer any interface for fast-import, it is not susceptible to this vulnerability. * CVE-2019-1349: by using NTFS 8.3 short names, backslashes or alternate filesystreams, it is possible to cause

  Fedora 30: knot-resolver FEDORA-2019-44ccfa9b29 (Dec 12)
 

- update to upstream version 4.3.0 - fixes CVE-2019-19331 - root.keys is moved to /var/lib/knot-resolver - knot-resolver no longer requires write permission to /etc/knot-resolver/

  Fedora 30: xen FEDORA-2019-3d7105bd2a (Dec 12)
 

Device quarantine for alternate pci assignment methods [XSA-306]

  Fedora 31: knot-resolver FEDORA-2019-866dc03603 (Dec 12)
 

- update to upstream version 4.3.0 - fixes CVE-2019-19331 - root.keys is moved to /var/lib/knot-resolver - knot-resolver no longer requires write permission to /etc/knot-resolver/


  RedHat: RHSA-2019-4237:01 Moderate: OpenShift Container Platform 4.1.28 (Dec 19)
 

An update for the openshift-enterprise-builder container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4358:01 Important: openstack-keystone security update (Dec 19)
 

An update for openstack-keystone is now available for Red Hat OpenStack Platform 15 (Stein). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-4356:01 Important: git security update (Dec 19)
 

An update for git is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-4357:01 Moderate: Red Hat Ceph Storage security update (Dec 19)
 

An update is now available for Red Hat Ceph Storage 3.3 that runs on Ubuntu 16.04. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4353:01 Moderate: Red Hat Ceph Storage security, bug fix, (Dec 19)
 

An update is now available for Red Hat Ceph Storage 3.3 that runs on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4326:01 Important: fribidi security update (Dec 19)
 

An update for fribidi is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-4341:01 Moderate: Red Hat Quay v3.2.0 security and bug (Dec 19)
 

An update is now available for Red Hat Quay 3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2019-4352:01 Important: Red Hat JBoss Fuse/A-MQ 6.3 R14 (Dec 19)
 

An update is now available for Red Hat JBoss Fuse 6.3 and Red Hat JBoss A-MQ 6.3. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-4317:01 Important: rh-maven35-apache-commons-beanutils (Dec 18)
 

An update for rh-maven35-apache-commons-beanutils is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-4256:01 Important: kernel security and bug fix update (Dec 17)
 

An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-4254:01 Moderate: freetype security update (Dec 17)
 

An update for freetype is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2019-4273:01 Important: container-tools:1.0 security update (Dec 17)
 

An update for the container-tools:1.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-4269:01 Important: container-tools:rhel8 security and bug (Dec 17)
 

An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-4255:01 Important: kernel security update (Dec 17)
 

An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-4090:01 Moderate: OpenShift Container Platform 4.1 (Dec 17)
 

An update for openshift-enterprise-cli-container, openshift-enterprise-hyperkube-container, openshift-enterprise-hypershift-container, openshift-enterprise-node-container, and ose-cli-artifacts-container is now

  RedHat: RHSA-2019-4091:01 Moderate: OpenShift Container Platform 4.1 (Dec 17)
 

An update for ose-cluster-kube-controller-manager-operator-container and ose-cluster-kube-scheduler-operator-container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2019-4088:01 Moderate: OpenShift Container Platform 4.1 (Dec 17)
 

An update for ose-cluster-openshift-apiserver-operator-container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4245:01 Important: kpatch-patch security update (Dec 17)
 

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-4225:01 Moderate: OpenShift Container Platform 4.1 (Dec 16)
 

An update for openshift-external-storage is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4089:01 Important: OpenShift Container Platform 4.1 (Dec 16)
 

An update for jenkins-2-plugins is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-4087:01 Moderate: OpenShift Container Platform 4.1 (Dec 16)
 

An update for openshift is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4243:01 Important: Red Hat Ansible Tower 3.6.2-1 - RHEL7 (Dec 16)
 

Red Hat Ansible Tower 3.6.2-1 - RHEL7 Container 2. Description: * Added a command to generate a new SECRET_KEY and rekey the database * Removed the guest user from the optionally-configured RabbitMQ admin

  RedHat: RHSA-2019-4242:01 Important: Red Hat Ansible Tower 3.5.4-1 - RHEL7 (Dec 16)
 

Red Hat Ansible Tower 3.5.4-1 - RHEL7 Container 2. Description: * Added a command to generate a new SECRET_KEY and rekey the database * Removed the guest user from the optionally-configured RabbitMQ admin

  RedHat: RHSA-2019-4053:01 Moderate: OpenShift Container Platform 3.11 (Dec 16)
 

An update for openshift-enterprise-console-container is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4054:01 Moderate: OpenShift Container Platform 3.11 (Dec 16)
 

An update for openshift-external-storage is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4055:01 Important: OpenShift Container Platform 3.11 (Dec 16)
 

An update for jenkins-2-plugins is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-4052:01 Moderate: OpenShift Container Platform 3.11 (Dec 16)
 

An update for atomic-openshift is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4240:01 Critical: openslp security update (Dec 16)
 

An update for openslp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2019-4238:01 Critical: chromium-browser security update (Dec 16)
 

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-4201:01 Moderate: CloudForms 5.0.1 security, (Dec 12)
 

An update is now available for CloudForms Management Engine 5.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from


  Slackware: 2019-353-01: wavpack Security Update (Dec 19)
 

New wavpack packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.


  SUSE: 2019:3369-1 moderate: mariadb (Dec 20)
 

An update that fixes 7 vulnerabilities is now available.

  SUSE: 2019:3371-1 important: the Linux Kernel (Dec 20)
 

An update that solves 24 vulnerabilities and has 58 fixes is now available.

  SUSE: 2019:3371-1 important: the Linux Kernel (Dec 20)
 

An update that solves 24 vulnerabilities and has 58 fixes is now available.

  SUSE: 2019:3349-1 moderate: trousers (Dec 19)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:3347-1 important: MozillaFirefox (Dec 19)
 

An update that fixes 8 vulnerabilities is now available.

  SUSE: 2019:3348-1 moderate: spectre-meltdown-checker (Dec 19)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:3340-1 moderate: spectre-meltdown-checker (Dec 19)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:3341-1 moderate: zziplib (Dec 19)
 

An update that solves two vulnerabilities and has one errata is now available.

  SUSE: 2019:3337-1 important: MozillaFirefox (Dec 18)
 

An update that fixes 8 vulnerabilities is now available.

  SUSE: 2019:3338-1 important: xen (Dec 18)
 

An update that solves 7 vulnerabilities and has two fixes is now available.

  SUSE: 2019:3339-1 important: MozillaThunderbird (Dec 18)
 

An update that fixes 8 vulnerabilities is now available.

  SUSE: 2019:3318-1 important: samba (Dec 17)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:3319-1 important: samba (Dec 17)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:3313-1 moderate: LibreOffice (Dec 16)
 

An update that solves one vulnerability and has three fixes is now available.

  SUSE: 2019:3308-1 important: libssh (Dec 16)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:3306-1 moderate: mariadb (Dec 16)
 

An update that fixes 7 vulnerabilities is now available.

  SUSE: 2019:3307-1 important: libssh (Dec 16)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:3309-1 important: xen (Dec 16)
 

An update that fixes 9 vulnerabilities is now available.

  SUSE: 2019:3310-1 important: xen (Dec 16)
 

An update that fixes 10 vulnerabilities is now available.

  SUSE: 2019:3311-1 important: git (Dec 16)
 

An update that solves 9 vulnerabilities and has one errata is now available.

  SUSE: 2019:3294-1 important: the Linux Kernel (Dec 13)
 

An update that solves 16 vulnerabilities and has 124 fixes is now available.

  SUSE: 2019:3296-1 important: xen (Dec 13)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2019:3293-1 important: libssh (Dec 13)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:3297-1 important: xen (Dec 13)
 

An update that fixes 15 vulnerabilities is now available.

  SUSE: 2019:3288-1 important: haproxy (Dec 12)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:14249-1 important: openssl (Dec 12)
 

An update that fixes one vulnerability is now available.


  Ubuntu 4224-1: Django vulnerability (Dec 18)
 

Django accounts could be hijacked through password reset requests.

  Ubuntu 4223-1: OpenJDK vulnerabilities (Dec 17)
 

Several security issues were fixed in OpenJDK.

  Ubuntu 4222-1: GraphicsMagick vulnerabilities (Dec 16)
 

Several security issues were fixed in GraphicsMagick.


  Debian LTS: DLA-2043-2: gdk-pixbuf regression update (Dec 20)
 

While preparing a fix for CVE-2017-6314 an unknown symbol g_uint_checked_mul() was introduced.

  Debian LTS: DLA-2043-1: gdk-pixbuf security update (Dec 19)
 

Several issues in gdk-pixbuf, a library to handle pixbuf, have been found. CVE-2016-6352 fix for denial of service (out-of-bounds write and crash) via

  Debian LTS: DLA-2042-1: python-django security update (Dec 18)
 

It was discovered that there was a potential account hijack vulnerabilility in Django, the Python-based web development framework.

  Debian LTS: DLA-2041-1: debian-edu-config security update (Dec 18)
 

It was discovered that debian-edu-config, the package containing the configuration files and scripts for Debian Edu (Skolelinux), contained an insecure configuration for kadmin, the Kerberos administration server. The

  Debian LTS: DLA-2040-1: harfbuzz security update (Dec 17)
 

An issue has been found in harfbuzz, an OpenType text shaping engine. Due to a buffer over-read, remote attackers are able to cause a denial of

  Debian LTS: DLA-2039-1: libvorbis security update (Dec 17)
 

Two issues have been found in libvorbis, a decoder library for Vorbis General Audio Compression Codec.

  Debian LTS: DLA-2038-1: libssh security update (Dec 17)
 

It was found that libssh, a tiny C SSH library, does not sufficiently sanitize path parameters provided to the server, allowing an attacker with only SCP file access to execute arbitrary commands on the server.

  Debian LTS: DLA-2037-1: spamassassin security update (Dec 16)
 

Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. CVE-2018-11805

  Debian LTS: DLA-2036-1: thunderbird security update (Dec 16)
 

Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version

  Debian LTS: DLA-2035-1: libpgf security update (Dec 15)
 

An issue has been found in libpgf, a library to handle Progressive Graphics File (PGF).

  Debian LTS: DLA-2034-1: davical security update (Dec 14)
 

Multiple cross-site scripting and cross-site request forgery issues were discovered in the DAViCal CalDAV Server.

  Debian LTS: DLA-2033-1: php-horde security update (Dec 13)
 

A vulnerability has been found in php-horde, the Horde Application Framework, which may result in information disclosure via cross-site scripting.


  ArchLinux: 201912-6: git: arbitrary code execution (Dec 18)
 

The package git before version 2.24.1-1 is vulnerable to arbitrary code execution.

  ArchLinux: 201912-5: libgit2: arbitrary code execution (Dec 18)
 

The package libgit2 before version 1:0.28.4-1 is vulnerable to arbitrary code execution.

  ArchLinux: 201912-4: shadow: privilege escalation (Dec 18)
 

The package shadow before version 4.8-1 is vulnerable to privilege escalation.


  SciLinux: SLSA-2019-4326-1 Important: fribidi on SL7.x x86_64 (Dec 19)
 

fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib /fribidi-bidi.c leading to denial of service and possible code execution (CVE-2019-18397) SL7 x86_64 fribidi-debuginfo-1.0.2-1.el7_7.1.i686.rpm fribidi-debuginfo-1.0.2-1.el7_7.1.x86_64.rpm fribidi-1.0.2-1.el7_7.1.i686.rpm fribidi-1.0.2-1.el7_7.1.x86_64.rpm fribidi-devel-1.0.2-1.el7_7.1.i686.rpm [More...]

  SciLinux: SLSA-2019-4256-1 Important: kernel on SL6.x i386/x86_64 (Dec 18)
 

Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821) Bug Fix(es): * KEYS: prevent creating a different user's keyrings SL-6.10 * BUG: unable to handle kernel NULL pointer dereference at (null) * long I/O stalls with bnx2fc from not masking off scope bits of retry delay value SL6 x86_64 kernel-2.6.32-754.25.1.el6.x86_64.rpm kernel-debug-2.6.32-754.25.1.el6.x86_64. [More...]

  SciLinux: SLSA-2019-4254-1 Moderate: freetype on SL6.x i386/x86_64 (Dec 18)
 

freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to information disclosure (CVE-2015-9381) * freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read (CVE-2015-9382) SL6 x86_64 freetype-2.3.11-19.el6_10.i686.rpm freetype-2.3.11-19.el6_10.x86_64.rpm freet [More...]

  SciLinux: SLSA-2019-4240-1 Critical: openslp on SL7.x x86_64 (Dec 16)
 

openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution (CVE-2019-5544) SL7 x86_64 openslp-2.0.0-8.el7_7.i686.rpm openslp-2.0.0-8.el7_7.x86_64.rpm openslp-debuginfo-2.0.0-8.el7_7.i686.rpm openslp-debuginfo-2.0.0-8.el7_7.x86_64.rpm openslp-server-2.0.0-8.el7_7.x86_64.rpm openslp-devel-2.0.0-8.el7_7.i686.rpm opensl [More...]


  openSUSE: 2019:2694-1: important: chromium (Dec 18)
 

An update that fixes 37 vulnerabilities is now available.

  openSUSE: 2019:2693-1: important: chromium (Dec 18)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2019:2692-1: important: chromium (Dec 16)
 

An update that fixes 37 vulnerabilities is now available.

  openSUSE: 2019:2689-1: important: libssh (Dec 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2692-1: important: chromium (Dec 16)
 

An update that fixes 37 vulnerabilities is now available.

  openSUSE: 2019:2687-1: important: java-1_8_0-openjdk (Dec 15)
 

An update that fixes 17 vulnerabilities is now available.

  openSUSE: 2019:2685-1: moderate: postgresql (Dec 15)
 

An update that contains security fixes can now be installed.


  Mageia 2019-0403: htmldoc security update (Dec 19)
 

Updated htmldoc packages fix security vulnerability: In HTMLDOC, there was a one-byte underflow in htmldoc/ps-pdf.cxx caused by a floating point math difference between GCC and Clang (CVE-2019-19630).

  Mageia 2019-0402: libssh security update (Dec 19)
 

Updated libssh packages fix security vulnerability: In an environment where a user is only allowed to copy files and not to execute applications, it would be possible to pass a location which contains commands to be executed in addition (CVE-2019-14889).

  Mageia 2019-0401: freerdp security update (Dec 19)
 

Updated freerdp packages fix security vulnerabilities: Multiple memory leaks in libfreerdp/codec/region.c (CVE-2019-17177). Memory leak in HuffmanTree_makeFromFrequencies (CVE-2019-17178).

  Mageia 2019-0400: rsyslog security update (Dec 19)
 

Updated rsyslog packages fix security vulnerabilities: Heap overflow in the parser for AIX log messages (CVE-2019-17041). Heap overflow in the parser for Cisco log messages (CVE-2019-17042).

  Mageia 2019-0399: apache-commons-beanutils security update (Dec 19)
 

Updated apache-commons-beanutils packages fix security vulnerability: In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We,

  Mageia 2019-0398: fence-agents security update (Dec 19)
 

pdated fence-agents package fixes security vulnerability: Denial of service via guest VM comments (CVE-2019-10153). References:

  Mageia 2019-0397: samba security update (Dec 19)
 

Updated samba packages fix security vulnerabilities: Malicious servers can cause Samba client code to return filenames containing path separators to calling code (CVE-2019-10218).

  Mageia 2019-0396: flightcrew security update (Dec 19)
 

The updated packages fix security vulnerabilities: An issue was discovered in FlightCrew v0.9.2 and earlier. A NULL pointer dereference occurs in GetRelativePathToNcx() or GetRelativePathsToXhtmlDocuments() when a NULL pointer is passed to

  Mageia 2019-0395: sssd security update (Dec 19)
 

The updated packages fix a security vulnerability: A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login

  Mageia 2019-0394: pacemaker security update (Dec 19)
 

The updated packages fix security vulnerabilities: A use-after-free flaw was found in pacemaker up to and including version 2.0.1 which could result in certain sensitive information to be leaked via the system logs. (CVE-2019-3885)

  Mageia 2019-0393: git security update (Dec 15)
 

The updated packages fix security vulnerabilities: The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it allows overwriting arbitrary paths. (CVE-2019-1348)

  Mageia 2019-0392: dnsmasq security update (Dec 15)
 

A vulnerability was found in dnsmsq through version 2.90, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation. (CVE-2019-14834)

  Mageia 2019-0391: libgit2 security update (Dec 15)
 

libgit2 has been updated to version 0.28.4 to fix several security issues: * A carefully constructed commit object with a very large number of parents may lead to potential out-of-bounds writes or potential denial of service.

  Mageia 2019-0390: libvirt security update (Dec 15)
 

Updated libvirt packages fix security vulnerabilities: An information leak which allowed to retrieve the guest hostname under readonly mode (CVE-2019-3886).

  Mageia 2019-0389: libcroco security update (Dec 15)
 

Updated libcroco packages fix security vulnerabilities: Heap overflow (input: check end of input before reading a byte) (CVE-2017-7960).

  Mageia 2019-0388: kernel security update (Dec 13)
 

This update provides an update to 5.4 series kernels, currently based on upstream 5.4.2, adding support for new hardware and features, and fixing atleast the following security issue: KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID

  Mageia 2019-0387: ncurses security update (Dec 13)
 

Updated ncurses packages fix security vulnerabilities: Heap-based buffer over-read in the _nc_find_entry function (CVE-2019-17594).

  Mageia 2019-0386: signing-party security update (Dec 13)
 

Updated signing-party package fixes security vulnerability: The gpg-key2ps tool in signing-party contained an unsafe shell call enabling shell injection via a User ID (CVE-2019-11627).

  Mageia 2019-0385: proftpd security update (Dec 13)
 

An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server

  Mageia 2019-0384: wireshark security update (Dec 13)
 

Version 3.0.7 fixes the following security vulnerability: CMS dissector crash (CVE-2019-19553). This update also brings the Mageia package from version 3.0.4 to 3.0.7.

  Mageia 2019-0383: openafs security update (Dec 13)
 

Update to security-release 1.8.5, adresses: * OPENAFS-SA-2019-001: Skip server OUT args on error * OPENAFS-SA-2019-002: Zero all server RPC args * OPENAFS-SA-2019-003: ubik: Avoid unlocked ubik_currentTrans deref

  Mageia 2019-0382: squid security update (Dec 13)
 

Potential remote code execution during URN processing (CVE-2019-12526). Multiple improper validations in URI processing (CVE-2019-12523, CVE-2019-18676).

  Mageia 2019-0381: jasper security update (Dec 13)
 

Heap based overflow in jas_icctxtdesc_input (CVE-2018-19540). Heap based overread in jas_image_depalettize (CVE-2018-19541). References:

  Mageia 2019-0380: clementine security update (Dec 13)
 

NULL ptr dereference (crash) in the moodbar pipeline (CVE-2019-14332). References: - https://bugs.mageia.org/show_bug.cgi?id=25753 -

  Mageia 2019-0379: qbittorrent security update (Dec 13)
 

In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed (CVE-2019-13640).

  Mageia 2019-0378: kdelibs4 security update (Dec 13)
 

kdelibs: malicious desktop files and configuration files lead to code execution with minimal user interaction (CVE-2019-14744). References: - https://bugs.mageia.org/show_bug.cgi?id=25403