Advisories

Linux Advisory Watch

Don't want to miss that crucial security notice?. The editorial staff at Guardian Digital will bring you complete coverage and in-depth
descriptions of all security bulletins, vulnerabilities and updated packages, all in one convenient weekly newsletter.

Linux Advisory Watch: December 25th, 2020

Linux Advisory Watch: December 25th, 2020

Thank you for reading the LinuxSecurity Linux Advisory Watch newsletter! Staying on top of the latest security advisories issued by the distro(s) you use is essential in maintaining an updated, secure Linux system. Our weekly newsletter is an easy, convenient way to track distribution security advisories - helping you keep your Linux environment safe from malware and other exploits.

Important advisories issued this week include warnings from Debian and Gentoo of multiple vulnerabilites in the mailing list manager Sympa, which could result in local privilege escalation, denial of service or unauthorized access and a Gentoo advisory regarding a flaw in Apache Tomcat that allows for the disclosure of sensitive information. Continue reading to learn about other significant advisories issued this week. Wishing you and your loved ones a happy, safe and secure holidays!

Yours in Open Source,

Brittany Day Signature


LinuxSecurity.com Feature Extras:

Modernize Your Intrusion Detection Strategy with an AI-Powered, Open-Source NIDS - To help you modernize your intrusion detection strategy heading into the new year, we’ll examine the benefits and potential drawbacks of implementing an AI-powered network intrusion detection system (NIDS) and introduce you to a fast and flexible open-source NIDS we love called AIEngine.

Anatomy of a Linux Ransomware Attack - In this article, we’ll examine the anatomy of a Linux ransomware attack, explore the magnitude of the ransomware risk Linux users face compared to Windows users and offer some tips and advice for protecting against Linux ransomware.


  Debian: DSA-4818-1: sympa security update (Dec 23)
 

Several vulnerabilities were discovered in Sympa, a mailing list manager, which could result in local privilege escalation, denial of service or unauthorized access via the SOAP API.

  Debian: DSA-4797-2: webkit2gtk regression update (Dec 22)
 

The update for webkit2gtk released as 4797-1 introduced a regression with the WebSockets functionality. Updated webkit2gtk packages are now available to correct this issue.

  Debian: DSA-4817-1: php-pear security update (Dec 19)
 

Two vulnerabilities were discovered in the PEAR Archive_Tar package for handling tar files in PHP, potentially allowing a remote attacker to execute arbitrary code or overwrite files.

  Debian: DSA-4810-2: lxml regression update (Dec 19)
 

The update for lxml released as 4810-1 introduced a regression when running under Python 2. Updated lxml packages are now available to correct this issue.

  Debian: DSA-4816-1: mediawiki security update (Dec 18)
 

Multiple security issues were discovered in MediaWiki, a website engine for collaborative work, which could result in cross-site scripting or the disclosure of hidden users.

  Debian: DSA-4815-1: thunderbird security update (Dec 17)
 

Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code, denial of service or information leak.

  Debian: DSA-4814-1: xerces-c security update (Dec 17)
 

It was discovered that xerces-c, a validating XML parser library for C++, did not correctly scan DTDs. The use-after-free vulnerability resulting from this issue would allow a remote attacker to leverage a specially crafted XML file in order to crash the application or

  Fedora 32: xen 2020-df772b417b (Dec 24)
 

xenstore watch notifications lacking permission checks [XSA-115, CVE-2020-29480] (#1908091) Xenstore: new domains inheriting existing node permissions [XSA-322, CVE-2020-29481] (#1908095) Xenstore: wrong path length check [XSA-323, CVE-2020-29482] (#1908096) Xenstore: guests can crash xenstored via watchs [XSA-324, CVE-2020-29484] (#1908088) Xenstore: guests can disturb domain cleanup

  Fedora 33: xen 2020-64859a826b (Dec 24)
 

xenstore watch notifications lacking permission checks [XSA-115, CVE-2020-29480] (#1908091) Xenstore: new domains inheriting existing node permissions [XSA-322, CVE-2020-29481] (#1908095) Xenstore: wrong path length check [XSA-323, CVE-2020-29482] (#1908096) Xenstore: guests can crash xenstored via watchs [XSA-324, CVE-2020-29484] (#1908088) Xenstore: guests can disturb domain cleanup

  Fedora 33: pngcheck 2020-f3a397cbf8 (Dec 22)
 

Previous fix for buffer overrun printing the contents of the sPLT chunk in certain malformed inputs (RHBZ#1905775) was incomplete; it should be properly fixed now. ---- Security fix for multiple buffer overflows from crafted file input (RHBZ#1902786,1902806,1902810: no CVE yet assigned), and for buffer overrun printing the contents of the sPLT chunk in certain malformed inputs

  Fedora 32: mbedtls 2020-e2d7a16ae9 (Dec 22)
 

Update to 2.16.9 Release notes: https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9

  Fedora 32: pngcheck 2020-daffd78c3d (Dec 22)
 

Previous fix for buffer overrun printing the contents of the sPLT chunk in certain malformed inputs (RHBZ#1905775) was incomplete; it should be properly fixed now. ---- Security fix for multiple buffer overflows from crafted file input (RHBZ#1902786,1902806,1902810: no CVE yet assigned), and for buffer overrun printing the contents of the sPLT chunk in certain malformed inputs

  Fedora 33: gdm 2020-1650d8012f (Dec 21)
 

gdm 3.38.2.1 release: - Address autologin unlock bug issue (CVE-2020-27837) - Translation updates

  Fedora 33: mingw-openjpeg2 2020-3e00413763 (Dec 21)
 

This update backports patches for CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845.

  Fedora 33: openjpeg2 2020-3e00413763 (Dec 21)
 

This update backports patches for CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845.

  Fedora 32: firefox 2020-0e26e95566 (Dec 20)
 

- Update to Firefox 84 - Built with system nss Please give karma to nss packages which are needed for this update: https://bodhi.fedoraproject.org/updates/FEDORA-2020-c489b93b18 https://bodhi.fedoraproject.org/updates/FEDORA-2020-d04a8e97b3 ---- - New upstream version (Firefox 84) - Enabled WebRender by default on Gnome Wayland

  Fedora 32: phpldapadmin 2020-c6fa47ecd7 (Dec 20)
 

Update to 1.2.6.2 (#1906752)

  Fedora 32: curl 2020-7ab62c73bc (Dec 20)
 

- curl: Inferior OCSP verification (CVE-2020-8286) - libcurl: FTP wildcard stack overflow (CVE-2020-8285) - curl: trusting FTP PASV responses (CVE-2020-8284)

  Fedora 32: chromium 2020-5b9c42f1b9 (Dec 20)
 

Update to 87.0.4280.88. As with pretty much every chromium release ever, this fixes some security bugs. This batch is: CVE-2020-16037 CVE-2020-16038 CVE-2020-16039 CVE-2020-16040 CVE-2020-16041 CVE-2020-16042

  Fedora 33: phpldapadmin 2020-6cc5654c0e (Dec 20)
 

Update to 1.2.6.2 (#1906752)

  Fedora 33: firefox 2020-af3857afd5 (Dec 18)
 

- Update to Firefox 84 - Built with system nss Please give karma to nss packages which are needed for this update: https://bodhi.fedoraproject.org/updates/FEDORA-2020-c489b93b18 https://bodhi.fedoraproject.org/updates/FEDORA-2020-d04a8e97b3 ---- - New upstream version (Firefox 84) - Enabled WebRender by default on Gnome Wayland

  Fedora 33: thunderbird 2020-a7b6d9467e (Dec 18)
 

Update to latest upstream version.

  Fedora 33: mingw-jasper 2020-c549cf2462 (Dec 18)
 

This update backports a patch for CVE-2020-27828.

  Fedora 33: matrix-synapse 2020-eeb66c2ece (Dec 18)
 

Upstream release notes: https://github.com/matrix- org/synapse/blob/master/CHANGES.md#synapse-1240rc1-2020-12-02 This release includes some minor changes which may affect homeserver admins: https://github.com/matrix-org/synapse/blob/develop/UPGRADE.rst#upgrading- to-v1240

  Fedora 32: mingw-jasper 2020-596e40f29c (Dec 18)
 

This update backports a patch for CVE-2020-27828.

  Fedora 32: matrix-synapse 2020-a2172c484d (Dec 18)
 

Upstream release notes: https://github.com/matrix- org/synapse/blob/master/CHANGES.md#synapse-1240rc1-2020-12-02 This release includes some minor changes which may affect homeserver admins: https://github.com/matrix-org/synapse/blob/develop/UPGRADE.rst#upgrading- to-v1240

  Fedora 33: mbedtls 2020-9e97ec4cba (Dec 17)
 

Update to 2.16.9 Release notes: https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9

  Gentoo: GLSA-202012-24: Samba: Multiple vulnerabilities (Dec 24)
 

Multiple vulnerabilities have been found in Samba, the worst of which could result in a Denial of Service condition.

  Gentoo: GLSA-202012-23: Apache Tomcat: Information disclosure (Dec 24)
 

A vulnerability has been discovered in Apache Tomcat that allows for the disclosure of sensitive information.

  Gentoo: GLSA-202012-22: HAProxy: Arbitrary code execution (Dec 24)
 

A buffer overflow in HAProxy might allow an attacker to execute arbitrary code.

  Gentoo: GLSA-202012-21: Mozilla Network Security Service (NSS): Denial of service (Dec 23)
 

A vulnerability in NSS might allow remote attackers to cause a Denial of Service condition.

  Gentoo: GLSA-202012-15: GDK-PixBuf: Denial of service (Dec 23)
 

A vulnerability in GDK-PixBuf library could lead to a Denial of Service condition.

  Gentoo: GLSA-202012-20: Mozilla Firefox, Mozilla Thunderbird: Multiple vulnerabilities (Dec 23)
 

Multiple vulnerabilities have been found in Mozilla Firefox and Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. [More...]

  Gentoo: GLSA-202012-19: PowerDNS Recursor: Denial of service (Dec 23)
 

A vulnerability in PowerDNS Recursor could lead to a Denial of Service condition.

  Gentoo: GLSA-202012-18: PowerDNS: information disclosure (Dec 23)
 

An information disclosure vulnerability in PowerDNS allow remote attackers to obtain sensitive information.

  Gentoo: GLSA-202012-17: D-Bus: Denial of service (Dec 23)
 

A local Denial of Service vulnerability was discovered in D-Bus.

  Gentoo: GLSA-202012-16: PHP: Multiple vulnerabilities (Dec 23)
 

Multiple vulnerabilities have been found in PHP, the worst of which could result in a Denial of Service condition.

  Gentoo: GLSA-202012-14: cURL: Multiple vulnerabilities (Dec 23)
 

Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss.

  Gentoo: GLSA-202012-13: OpenSSL: Denial of service (Dec 23)
 

A vulnerability in OpenSSL might allow remote attackers to cause a Denial of Service condition.

  Gentoo: GLSA-202012-12: libass: User-assisted execution of arbitrary code (Dec 23)
 

A vulnerability has been found in libass that could allow a remote attacker to execute arbitrary code.

  Gentoo: GLSA-202012-11: c-ares: Denial of service (Dec 23)
 

A Denial of Service vulnerability was discovered in c-ares.

  Gentoo: GLSA-202012-10: WebkitGTK+: Multiple vulnerabilities (Dec 23)
 

Multiple vulnerabilities have been found in WebKitGTK+, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202012-09: Cherokee: Multiple vulnerabilities (Dec 23)
 

Multiple vulnerabilities have been found in Cherokee, the worst of which could result in a Denial of Service condition.

  RedHat: RHSA-2020-5656:01 Moderate: kernel security update (Dec 22)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-5664:01 Important: postgresql:10 security update (Dec 22)
 

An update for the postgresql:10 module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5662:01 Moderate: mariadb-connector-c security, bug fix, (Dec 22)
 

An update for mariadb-connector-c is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-5665:01 Important: mariadb:10.3 security, bug fix, (Dec 22)
 

An update for the mariadb:10.3 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5663:01 Important: mariadb:10.3 security, bug fix, (Dec 22)
 

An update for the mariadb:10.3 module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5660:01 Moderate: mariadb-connector-c security, bug fix, (Dec 22)
 

An update for mariadb-connector-c is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-5655:01 Moderate: mariadb-connector-c security, bug fix, (Dec 22)
 

An update for mariadb-connector-c is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-5654:01 Important: mariadb:10.3 security, bug fix, (Dec 22)
 

An update for the mariadb:10.3 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5661:01 Important: postgresql:9.6 security update (Dec 22)
 

An update for the postgresql:9.6 module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5649:01 Low: Red Hat OpenShift Service Mesh 1.1.11 (Dec 22)
 

An update is now available for OpenShift Service Mesh 1.1. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-5645:01 Important: thunderbird security update (Dec 21)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5614:01 Important: OpenShift Container Platform 4.6.9 (Dec 21)
 

Red Hat OpenShift Container Platform release 4.6.9 is now available with updates to packages and images that fix several bugs and add enhancements. This release also includes a security update for Red Hat OpenShift Container Platform 4.6.

  RedHat: RHSA-2020-5642:01 Important: openssl security update (Dec 21)
 

An update for openssl is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5644:01 Important: thunderbird security update (Dec 21)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5641:01 Important: openssl security update (Dec 21)
 

An update for openssl is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.

  RedHat: RHSA-2020-5615:01 Important: OpenShift Container Platform 4.6.9 (Dec 21)
 

Red Hat OpenShift Container Platform release 4.6.9 is now available with updates to packages and images that fix several bugs. This release includes a security update for openshift-clients, openvswitch2.13, and python-sushy, which are now available for Red Hat

  RedHat: RHSA-2020-5640:01 Important: openssl security update (Dec 21)
 

An update for openssl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5639:01 Important: openssl security update (Dec 21)
 

An update for openssl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5638:01 Important: libpq security update (Dec 21)
 

An update for libpq is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5637:01 Important: openssl security update (Dec 21)
 

An update for openssl is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5605:01 Moderate: Red Hat OpenShift Container Storage (Dec 18)
 

Updated images are now available for Red Hat OpenShift Container Storage 4.6.0 on Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-5623:01 Important: openssl security update (Dec 17)
 

An update for openssl is now available for Red Hat Enterprise Linux 7.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5625:01 Moderate: Red Hat Single Sign-On 7.4.0 security (Dec 17)
 

A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-5624:01 Important: thunderbird security update (Dec 17)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-5622:01 Important: thunderbird security update (Dec 17)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5620:01 Important: postgresql:12 security update (Dec 17)
 

An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5619:01 Important: postgresql:9.6 security update (Dec 17)
 

An update for the postgresql:9.6 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-5618:01 Important: thunderbird security update (Dec 17)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-5611:01 Important: Red Hat Virtualization security, (Dec 17)
 

An update for cockpit-ovirt, redhat-release-virtualization-host, redhat-virtualization-host, and v2v-conversion-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2020-5607:01 Important: fapolicyd bug fix update (Dec 17)
 

An update for fapolicyd is now available for Red Hat Enterprise Linux 8. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description:

  RedHat: RHSA-2020-5608:01 Important: fapolicyd bug fix update (Dec 17)
 

An update for fapolicyd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream EUS (v. 8.2) - aarch64, ppc64le, s390x, x86_64

  RedHat: RHSA-2020-5609:01 Important: fapolicyd bug fix update (Dec 17)
 

An update for fapolicyd is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64

  RedHat: RHSA-2020-5606:01 Moderate: Red Hat OpenShift Container Storage 4.6 (Dec 17)
 

An update for mcg is now available for Red Hat OpenShift Container Storage 4.6.0 on RHEL-8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  SUSE: 2020:859-1 ses/7/ceph/ceph Security Update (Dec 23)
 

The container ses/7/ceph/ceph was updated. The following patches have been included in this update:

  SUSE: 2020:858-1 caasp/v4/nginx-ingress-controller Security Update (Dec 18)
 

The container caasp/v4/nginx-ingress-controller was updated. The following patches have been included in this update:

  Debian LTS: DLA-2505-1: spip security update (Dec 23)
 

It was found that spip, a website engine for publishing, did not correctly validate its input (couleur, display, display_navigation, display_outils, imessage, and spip_ecran) allowing authenticated users to execute arbitrary code.

  Debian LTS: DLA-2506-1: awstats security update (Dec 23)
 

It was discovered that Awstats, a web server log analyzer, was vulnerable to path traversal attacks. A remote unauthenticated attacker could leverage that to perform arbitrary code execution. The previous fix did not fully address the issue when the default

  Debian LTS: DLA-2412-2: openjdk-8 regression update (Dec 22)
 

A few issues have been found in the OpenJDK 8u272 update, including LDAP connection failures and application crash. For Debian 9 stretch, this problem has been fixed in version

  Debian LTS: DLA-2503-1: node-ini security update (Dec 21)
 

It was discovered that there was an issue in node-ini, a .ini format parser and serializer for Node.js, where an application could be exploited by a malicious input file.

  Debian LTS: DLA-2502-1: postsrsd security update (Dec 20)
 

A potential denial-of-service attack through malicious timestamp tags was fixed in PostSRSd, a Sender Rewriting Scheme (SRS) lookup table for Postfix.

  Debian LTS: DLA-2501-1: influxdb security update (Dec 20)
 

An issue has been found in influxdb, a scalable datastore for metrics, events, and real-time analytics. By using a JWT token with an empty shared secret, one is able to bypass

  Debian LTS: DLA-2494-1: linux security update (Dec 18)
 

Several vulnerabilities have been discovered in the Linux kernel that may lead to the execution of arbitrary code, privilege escalation, denial of service or information leaks.

  Debian LTS: DLA-2499-1: sympa security update (Dec 17)
 

Sympa, a modern mailing list manager, grants full SOAP API access by sending invalid string as the cookie value, if the SOAP endpoint was enabled. An attacker could manipulate the mailing lists, including subscribing e-mails or getting the list of subscribers.

  Debian LTS: DLA-2498-1: xerces-c security update (Dec 17)
 

The UK's National Cyber Security Centre (NCSC) discovered that Xerces-C, a validating XML parser library for C++, contains a use-after-free error triggered during the scanning of external DTDs. An attacker could cause a Denial of Service (DoS) and possibly

  Debian LTS: DLA-2497-1: thunderbird security update (Dec 17)
 

Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code, denial of service or information leak.

  ArchLinux: 202012-20: lib32-gdk-pixbuf2: denial of service (Dec 17)
 

The package lib32-gdk-pixbuf2 before version 2.42.2-1 is vulnerable to denial of service.

  ArchLinux: 202012-19: gdk-pixbuf2: denial of service (Dec 17)
 

The package gdk-pixbuf2 before version 2.42.2-1 is vulnerable to denial of service.

  ArchLinux: 202012-18: nsd: denial of service (Dec 17)
 

The package nsd before version 4.3.4-1 is vulnerable to denial of service.

  ArchLinux: 202012-17: unbound: denial of service (Dec 17)
 

The package unbound before version 1.13.0-1 is vulnerable to denial of service.

  ArchLinux: 202012-16: hostapd: proxy injection (Dec 17)
 

The package hostapd before version 2.9-4 is vulnerable to proxy injection.

  ArchLinux: 202012-15: minidlna: arbitrary code execution (Dec 17)
 

The package minidlna before version 1.3.0-1 is vulnerable to arbitrary code execution.

  ArchLinux: 202012-14: chromium: multiple issues (Dec 17)
 

The package chromium before version 87.0.4280.88-1 is vulnerable to multiple issues including arbitrary code execution, information disclosure, insufficient validation and denial of service.

  ArchLinux: 202012-13: pam: authentication bypass (Dec 17)
 

The package pam before version 1.5.0-2 is vulnerable to authentication bypass.

  ArchLinux: 202012-12: blueman: privilege escalation (Dec 17)
 

The package blueman before version 2.1.4-1 is vulnerable to privilege escalation.

  CentOS: CESA-2020-5618: Important CentOS 7 thunderbird (Dec 21)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:5618

  CentOS: CESA-2020-5437: Important CentOS 7 kernel (Dec 21)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:5437

  CentOS: CESA-2020-5443: Moderate CentOS 7 gd (Dec 17)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:5443

  CentOS: CESA-2020-5434: Moderate CentOS 7 targetcli (Dec 17)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:5434

  CentOS: CESA-2020-5453: Moderate CentOS 7 pacemaker (Dec 17)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:5453

  CentOS: CESA-2020-5435: Moderate CentOS 7 python-rtslib (Dec 17)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:5435

  CentOS: CESA-2020-5439: Moderate CentOS 7 samba (Dec 17)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:5439

  CentOS: CESA-2020-5566: Important CentOS 7 openssl (Dec 17)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:5566

  SciLinux: SLSA-2020-5618-1 Important: thunderbird on SL7.x x86_64 (Dec 17)
 

This update upgrades Thunderbird to version 78.6.0. * chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) * Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) * Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) * Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use- after-free (CVE-2020-26974) * Mozilla: Memory safety bugs fixed in Firef [More...]

  SciLinux: SLSA-2020-5566-1 Important: openssl on SL7.x x86_64 (Dec 17)
 

openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971) SL7 x86_64 openssl-1.0.2k-21.el7_9.x86_64.rpm openssl-debuginfo-1.0.2k-21.el7_9.i686.rpm openssl-debuginfo-1.0.2k-21.el7_9.x86_64.rpm openssl-libs-1.0.2k-21.el7_9.i686.rpm openssl-libs-1.0.2k-21.el7_9.x86_64.rpm openssl-devel-1.0.2k-21.el7_9.i686.rpm openssl-devel-1.0.2k-21.el7_9.x86_64.rpm opens [More...]

  openSUSE: 2020:2317-1 critical: MozillaThunderbird (Dec 22)
 

An update that fixes 8 vulnerabilities is now available.

  openSUSE: 2020:2318-1 critical: MozillaFirefox (Dec 22)
 

An update that fixes 8 vulnerabilities is now available.

  openSUSE: 2020:2317-1 critical: MozillaThunderbird (Dec 22)
 

An update that fixes 8 vulnerabilities is now available.

  openSUSE: 2020:2315-1 important: MozillaFirefox (Dec 22)
 

An update that fixes 12 vulnerabilities is now available.

  openSUSE: 2020:2314-1 moderate: ovmf (Dec 22)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:2313-1 moderate: xen (Dec 22)
 

An update that solves 7 vulnerabilities and has two fixes is now available.

  openSUSE: 2020:2310-1 important: webkit2gtk3 (Dec 21)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2020:2304-1 important: webkit2gtk3 (Dec 21)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2020:2300-1 moderate: gcc7 (Dec 20)
 

An update that solves one vulnerability and has 7 fixes is now available.

  openSUSE: 2020:2301-1 moderate: gcc7 (Dec 20)
 

An update that solves one vulnerability and has 7 fixes is now available.

  openSUSE: 2020:2298-1 moderate: openssh (Dec 20)
 

An update that solves one vulnerability and has 5 fixes is now available.

  openSUSE: 2020:2292-1 moderate: PackageKit (Dec 20)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:2286-1 important: slurm_18_08 (Dec 19)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:2282-1 moderate: python-urllib3 (Dec 18)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:2276-1 moderate: clamav (Dec 18)
 

An update that fixes 14 vulnerabilities is now available.

  openSUSE: 2020:2269-1 important: openssl-1_0_0 (Dec 17)
 

An update that solves one vulnerability and has 6 fixes is now available.

  openSUSE: 2020:2268-1 moderate: clamav (Dec 17)
 

An update that fixes 14 vulnerabilities is now available.

  Mageia 2020-0469: mbedtls security update (Dec 21)
 

This update provides security bug fixes and minor enhancements. Limit the size of calculations performed by mbedtls_mpi_exp_mod to MBEDTLS_MPI_MAX_SIZE to prevent a potential denial of service when generating Diffie-Hellman key pairs.

  Mageia 2020-0468: golang-googlecode-net security update (Dec 21)
 

This code was vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both (CVE-2019-9512).

  Mageia 2020-0467: openssl security update (Dec 21)
 

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME.

  Mageia 2020-0466: virtualbox security update (Dec 21)
 

Vulnerabilities in the Oracle VM VirtualBox are fixed in version 6.1.16. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability which can lead to execute code in the context of the hypervisor. (CVE-2020-14872).

  Mageia 2020-0465: compat-openssl10 security update (Dec 21)
 

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited

  Mageia 2020-0464: openjpeg2 security update (Dec 20)
 

A heap-buffer overwrites error was discovered in lib/openjp2/mqc.c in OpenJPEG 2.3.1. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution (CVE-2020-27814). A flaw was found in OpenJPEGs encoder. This flaw allows an attacker to pass

  Mageia 2020-0463: jasper security update (Dec 17)
 

There's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an attacker could cause an arbitrary out-of-bounds write. This could potentially affect data confidentiality, integrity, or application availability (CVE-2020-27828).

  Mageia 2020-0462: thunderbird security update (Dec 17)
 

When a BigInt was right-shifted the backing store was not properly cleared, allowing uninitialized memory to be read (CVE-2020-16042). Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow in WebGL on some video drivers (CVE-2020-26971).

  Mageia 2020-0461: firefox security update (Dec 17)
 

When a BigInt was right-shifted the backing store was not properly cleared, allowing uninitialized memory to be read (CVE-2020-16042). Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow in WebGL on some video drivers (CVE-2020-26971).

  Mageia 2020-0460: dpic security update (Dec 17)
 

dpic 2019.06.20 has a Stack-based Buffer Overflow in the wfloat() function in main.c. (CVE-2019-13989) References: - https://bugs.mageia.org/show_bug.cgi?id=27759 - https://security-tracker.debian.org/tracker/CVE-2019-13989

  Mageia 2020-0459: sam2p security update (Dec 17)
 

In sam2p 0.49.3, a heap-based buffer overflow exists in the pcxLoadImage24 function of the file in_pcx.cpp. (CVE-2017-14628). In sam2p 0.49.3, the in_xpm_reader function in in_xpm.cpp has an integer signedness error, leading to a crash when writing to an out-of-bounds array

  Mageia 2020-0458: bitcoin security update (Dec 17)
 

Multiple vulnerabilities have been discovered in Bitcoin. In Bitcoin Core 0.18.0, bitcoin-qt stores wallet.dat data unencrypted in memory. Upon a crash, it may dump a core file. If a user were to mishandle a core file, an attacker can reconstruct the user's

  Mageia 2020-0457: jupyter-notebook security update (Dec 17)
 

Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. (CVE-2020-26215) References: - https://bugs.mageia.org/show_bug.cgi?id=27705 - https://www.debian.org/lts/security/2020/dla-2477

  Mageia 2020-0456: x11-server security update (Dec 17)
 

A flaw was found in the X.Org Server. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (CVE-2020-14360).

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]