Newsletters: Linux Advisory Watch: January 15th, 2021

Advisories

Linux Advisory Watch: January 15th, 2021

Thank you for reading the LinuxSecurity Linux Advisory Watch newsletter! Staying on top of the latest security advisories issued by the distro(s) you use is essential in maintaining an updated, secure Linux system. Our weekly newsletter is an easy, convenient way to track distribution security advisories - helping you keep your Linux environment safe from malware and other exploits.

Important advisories issued this week include warnings from Debian of an input validation issue with ruby-redcarpet that would allow a malicious actor to launch a cross-site scripting attack and a bug in the flatpak-portal service that could allow sandboxed applications to execute arbitrary code on the host system. Fedora has also announced this week that the 5.10.6 stable kernel rebase contains new features, additional hardware support and a number of important fixes across the tree. Continue reading to learn about other significant advisories issued this week. Stay healthy, safe and secure - both on and offline!

Yours in Open Source,

Brittany Day Signature


LinuxSecurity.com Feature Extras:

A Linux Admin's Getting Started Guide to Improving PHP Security - This article will examine how you can configure and run PHP securely to mitigate the risk of attacks and compromise, secure web applications, protect user privacy and maintain a secure and properly functioning Linux web server.

Linux Pentesting: What Is It and How Can It Improve Network Security? - This article will introduce the concept of pentesting to improve and verify network security, explain basic pentesting methodology and explore some excellent pentesting tools, distros and OSes available to Linux users in 2021.


  Debian: DSA-4831-1: ruby-redcarpet security update (Jan 15)
 

Johan Smits discovered that ruby-redcarpet, a markdown parser, did not properly validate its input. This would allow an attacker to mount a cross-site scripting attack.

  Debian: DSA-4830-1: flatpak security update (Jan 14)
 

Simon McVittie discovered a bug in the flatpak-portal service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape).

  Debian: DSA-4829-1: coturn security update (Jan 11)
 

A flaw was discovered in coturn, a TURN and STUN server for VoIP. By default coturn does not allow peers on the loopback addresses (127.x.x.x and ::1). A remote attacker can bypass the protection via a specially crafted request using a peer address of '0.0.0.0' and trick

  Debian: DSA-4828-1: libxstream-java security update (Jan 7)
 

Liaogui Zhong discovered two security issues in XStream, a Java library to serialise objects to XML and back again, which could result in the deletion of files or server-side request forgery when unmarshalling.

  Debian: DSA-4827-1: firefox-esr security update (Jan 7)
 

A security issue was found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For the stable distribution (buster), this problem has been fixed in

  Fedora 33: dia 2020-1fe0e08c8d (Jan 14)
 

- Added upstream patch to avoid infinite loop on filenames with invalid encoding (CVE-2019-19451, #1778767)

  Fedora 32: openjpeg2 2020-d32853a28d (Jan 14)
 

This update backports patches for CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845. ---- This update backports patches for CVE-2020-27824 and CVE-2020-27823. ---- Backport patch for CVE-2020-27814.

  Fedora 32: mingw-openjpeg2 2020-d32853a28d (Jan 14)
 

This update backports patches for CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845. ---- This update backports patches for CVE-2020-27824 and CVE-2020-27823. ---- Backport patch for CVE-2020-27814.

  Fedora 32: adplug 2021-24ef21134b (Jan 13)
 

AdPlug 2.3.3 fixes: (huge thanks to Alexander Miller for these) - CVE-2019-14690 - buffer overflow in `.bmf` - CVE-2019-14691 - buffer overflow in `.dtm` - CVE-2019-14692 - buffer overflow in `.mkj` - CVE-2019-14732 - buffer overflow in `.a2m` - CVE-2019-14733 - buffer overflow in `.rad` -

  Fedora 32: audacious-plugins 2021-24ef21134b (Jan 13)
 

AdPlug 2.3.3 fixes: (huge thanks to Alexander Miller for these) - CVE-2019-14690 - buffer overflow in `.bmf` - CVE-2019-14691 - buffer overflow in `.dtm` - CVE-2019-14692 - buffer overflow in `.mkj` - CVE-2019-14732 - buffer overflow in `.a2m` - CVE-2019-14733 - buffer overflow in `.rad` -

  Fedora 32: ocp 2021-24ef21134b (Jan 13)
 

AdPlug 2.3.3 fixes: (huge thanks to Alexander Miller for these) - CVE-2019-14690 - buffer overflow in `.bmf` - CVE-2019-14691 - buffer overflow in `.dtm` - CVE-2019-14692 - buffer overflow in `.mkj` - CVE-2019-14732 - buffer overflow in `.a2m` - CVE-2019-14733 - buffer overflow in `.rad` -

  Fedora 32: python-lxml 2020-307946cfb6 (Jan 13)
 

This update fixes mXSS security vulnerability due to the use of improper parser (CVE-2020-27783)

  Fedora 33: cpu-x 2021-9b7b3599be (Jan 13)
 

build: dmidecode - apply upstream patch & remove -Wno-format-security flag

  Fedora 33: kernel 2021-3465ada1ca (Jan 13)
 

The 5.10.6 stable kernel rebase contains new features, additional hardware support, and a number of important fixes across the tree.

  Fedora 33: kernel-headers 2021-3465ada1ca (Jan 13)
 

The 5.10.6 stable kernel rebase contains new features, additional hardware support, and a number of important fixes across the tree.

  Fedora 33: php 2021-8dac5c39f3 (Jan 13)
 

**PHP version 7.4.14** (07 Jan 2021) **Core:** * Fixed bug php#74558 (Can't rebind closure returned by Closure::fromCallable()). (cmb) * Fixed bug php#80345 (PHPIZE configuration has outdated PHP_RELEASE_VERSION). (cmb) * Fixed bug php#72964 (White space not unfolded for CC/Bcc headers). (cmb) * Fixed bug php#80362 (Running dtrace scripts can cause php to crash). (al at coralnet dot

  Fedora 33: ocp 2021-64168929e4 (Jan 13)
 

AdPlug 2.3.3 fixes: (huge thanks to Alexander Miller for these) - CVE-2019-14690 - buffer overflow in `.bmf` - CVE-2019-14691 - buffer overflow in `.dtm` - CVE-2019-14692 - buffer overflow in `.mkj` - CVE-2019-14732 - buffer overflow in `.a2m` - CVE-2019-14733 - buffer overflow in `.rad` -

  Fedora 33: audacious-plugins 2021-64168929e4 (Jan 13)
 

AdPlug 2.3.3 fixes: (huge thanks to Alexander Miller for these) - CVE-2019-14690 - buffer overflow in `.bmf` - CVE-2019-14691 - buffer overflow in `.dtm` - CVE-2019-14692 - buffer overflow in `.mkj` - CVE-2019-14732 - buffer overflow in `.a2m` - CVE-2019-14733 - buffer overflow in `.rad` -

  Fedora 33: adplug 2021-64168929e4 (Jan 13)
 

AdPlug 2.3.3 fixes: (huge thanks to Alexander Miller for these) - CVE-2019-14690 - buffer overflow in `.bmf` - CVE-2019-14691 - buffer overflow in `.dtm` - CVE-2019-14692 - buffer overflow in `.mkj` - CVE-2019-14732 - buffer overflow in `.a2m` - CVE-2019-14733 - buffer overflow in `.rad` -

  Fedora 33: python-lxml 2020-0e055ea503 (Jan 13)
 

This update fixes mXSS security vulnerability due to the use of improper parser (CVE-2020-27783)

  Fedora 33: sympa 2021-11cb6626e2 (Jan 12)
 

Update to 6.2.60 Fixes CVE-2020-29668

  Fedora 33: roundcubemail 2021-73359af51c (Jan 12)
 

**RELEASE 1.4.10** - Fix extra angle brackets in In-Reply-To header derived from mailto: params (#7655) - Fix folder list issue whan special folder is a subfolder (#7647) - Fix Elastic's folder subscription toggle in search result (#7653) - Fix state of subscription toggle on folders list after changing folder state from the search result (#7653) - **Security**: Fix cross-site scripting

  Fedora 32: sympa 2021-a5570c5281 (Jan 12)
 

Update to 6.2.60 Fixes CVE-2020-29668

  Fedora 32: roundcubemail 2021-2cb0643316 (Jan 12)
 

**RELEASE 1.4.10** - Fix extra angle brackets in In-Reply-To header derived from mailto: params (#7655) - Fix folder list issue whan special folder is a subfolder (#7647) - Fix Elastic's folder subscription toggle in search result (#7653) - Fix state of subscription toggle on folders list after changing folder state from the search result (#7653) - **Security**: Fix cross-site scripting

  Fedora 32: firefox 2021-6eac5874a3 (Jan 9)
 

New Firefox version (84.0.2) which fixes security / stability issues.

  Fedora 33: flac 2021-df42ebeac2 (Jan 9)
 

Security fix for CVE-2020-0499

  Fedora 33: nodejs 2021-fb1a136393 (Jan 9)
 

Update to Node.js 14.15.4 security release

  Fedora 33: firefox 2021-944b551751 (Jan 8)
 

New Firefox version (84.0.2) which fixes security / stability issues.

  Fedora 33: awstats 2020-4cba5f2846 (Jan 7)
 

Security fix for CVE-2020-35176

  Fedora 32: dia 2020-cbc0754798 (Jan 7)
 

- Added upstream patch to avoid infinite loop on filenames with invalid encoding (CVE-2019-19451, #1778767)

  Fedora 32: awstats 2020-d1aa0e030c (Jan 7)
 

Update to AWStats 7.8. Includes security fix for CVE-2020-29600 / CVE-2020-35176

  Gentoo: GLSA-202101-10: Asterisk: Multiple vulnerabilities (Jan 12)
 

Multiple vulnerabilities have been found in Asterisk, the worst of which could result in a Denial of Service condition.

  Gentoo: GLSA-202101-09: VirtualBox: Multiple vulnerabilities (Jan 12)
 

Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox.

  Gentoo: GLSA-202101-08: Pillow: Multiple vulnerabilities (Jan 11)
 

Multiple vulnerabilities have been found in Pillow, the worst of which could result in a Denial of Service condition.

  Gentoo: GLSA-202101-07: NodeJS: Multiple vulnerabilities (Jan 11)
 

Multiple vulnerabilities have been found in NodeJS, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202101-06: Ark: Symlink vulnerability (Jan 11)
 

Ark was found to allow arbitrary file overwrite, possibly allowing arbitrary code execution.

  Gentoo: GLSA-202101-05: Chromium, Google Chrome: Multiple vulnerabilities (Jan 10)
 

Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202101-04: Mozilla Firefox: Remote code execution (Jan 10)
 

A use-after-free in Mozilla Firefox's SCTP handling may allow remote code execution.

  Gentoo: GLSA-202101-03: ipmitool: Multiple vulnerabilities (Jan 10)
 

A buffer overflow in ipmitool might allow remote attacker(s) to execute arbitrary code.

  Gentoo: GLSA-202101-02: Firejail: Multiple vulnerabilities (Jan 10)
 

Multiple vulnerabilities have been found in Firejail, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202101-01: Dovecot: Multiple vulnerabilities (Jan 10)
 

Multiple vulnerabilities have been found in Dovecot, the worst of which could allow remote attackers to cause a Denial of Service condition.

  RedHat: RHSA-2021-0146:01 Moderate: Release of OpenShift Serverless 1.12.0 (Jan 14)
 

Release of OpenShift Serverless 1.12.0 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each

  RedHat: RHSA-2021-0145:01 Moderate: Red Hat OpenShift Serverless Client kn (Jan 14)
 

Red Hat OpenShift Serverless Client kn 1.12.0 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each

  RedHat: RHSA-2021-0136:01 Moderate: kernel-rt security and bug fix update (Jan 14)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0114:01 Important: .NET Core 3.1 on Red Hat Enterprise (Jan 13)
 

An update for rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0110:01 Important: Red Hat Integration Tech-Preview 2 (Jan 13)
 

An update to the Camel K operator image for Red Hat Integration tech-preview is now available. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2021-0030:01 Moderate: OpenShift Container Platform 4.4.32 (Jan 13)
 

Red Hat OpenShift Container Platform release 4.4.32 is now available with updates to packages and images that fix several bugs and add enhancements. This release also includes a security update for Red Hat OpenShift Container Platform 4.4.

  RedHat: RHSA-2021-0105:01 Important: Red Hat Process Automation Manager (Jan 13)
 

An update is now available for Red Hat Process Automation Manager. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2021-0106:01 Important: Red Hat Decision Manager 7.9.1 (Jan 13)
 

An update is now available for Red Hat Decision Manager. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2021-0095:01 Important: dotnet3.1 security and bugfix update (Jan 13)
 

An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0094:01 Important: dotnet5.0 security and bugfix update (Jan 13)
 

An update for .NET 5.0 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2021-0096:01 Important: .NET 5.0 on Red Hat Enterprise Linux (Jan 13)
 

An update for rh-dotnet50-dotnet is now available for .NET on Red Hat Enterprise Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0087:01 Critical: thunderbird security update (Jan 13)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2021-0088:01 Critical: thunderbird security update (Jan 13)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0089:01 Critical: thunderbird security update (Jan 13)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2021-0084:01 Moderate: Red Hat build of Quarkus 1.7.6 release (Jan 12)
 

An update is now available for Red Hat build of Quarkus. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For

  RedHat: RHSA-2021-0083:01 Important: Red Hat Ceph Storage 4.2 security and (Jan 12)
 

An update is now available for Red Hat Ceph Storage 4.2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2021-0081:01 Important: Red Hat Ceph Storage 4.2 Security and (Jan 12)
 

An update is now available for Red Hat Ceph Storage 4.2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2021-0073:01 Moderate: kernel security and bug fix update (Jan 12)
 

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0072:01 Moderate: OpenShift Serverless 1.9.0 release and (Jan 11)
 

OpenShift Serverless 1.9.0 release and security update is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2021-0057:01 Important: libpq security update (Jan 11)
 

An update for libpq is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0053:01 Critical: firefox security update (Jan 11)
 

An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2021-0056:01 Important: openssl security update (Jan 11)
 

An update for openssl is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0055:01 Critical: firefox security update (Jan 11)
 

An update for firefox is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0054:01 Critical: firefox security update (Jan 11)
 

An update for firefox is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0052:01 Critical: firefox security update (Jan 11)
 

An update for firefox is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2021-0050:01 Moderate: Red Hat Quay v3.3.3 bug fix and (Jan 11)
 

Red Hat Quay v3.3.3 is now available with bug fixes and security updates. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-5388:01 Important: Red Hat support for Spring Boot 2.2.11 (Jan 7)
 

An update is now available for Red Hat support for Spring Boot. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each

  Slackware: 2021-014-01: wavpack Security Update (Jan 14)
 

New wavpack packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.

  Slackware: 2021-011-01: sudo Security Update (Jan 11)
 

New sudo packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

  SUSE: 2021:25-1 suse/sle15 Security Update (Jan 15)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  SUSE: 2021:24-1 suse/sle15 Security Update (Jan 15)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  SUSE: 2021:23-1 suse/sle15 Security Update (Jan 15)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  SUSE: 2021:22-1 suse/sles12sp5 Security Update (Jan 15)
 

The container suse/sles12sp5 was updated. The following patches have been included in this update:

  SUSE: 2021:21-1 suse/sle15 Security Update (Jan 14)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  SUSE: 2021:20-1 suse/sle15 Security Update (Jan 8)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  SUSE: 2021:19-1 ses/6/rook/ceph Security Update (Jan 8)
 

The container ses/6/rook/ceph was updated. The following patches have been included in this update:

  SUSE: 2021:18-1 ses/6/ceph/ceph Security Update (Jan 8)
 

The container ses/6/ceph/ceph was updated. The following patches have been included in this update:

  SUSE: 2021:17-1 ses/6/cephcsi/cephcsi Security Update (Jan 8)
 

The container ses/6/cephcsi/cephcsi was updated. The following patches have been included in this update:

  Debian LTS: DLA-2526-1: ruby-redcarpet security update (Jan 15)
 

In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions, no HTML escaping was being performed when

  Debian LTS: DLA-2525-1: wavpack security update (Jan 15)
 

Multiple vulnerabilites in wavpack were found, like OOB read (which could potentially lead to a DOS attack), unexpected control flow, crashes, integer overflow, and segfaults.

  Debian LTS: DLA-2524-1: spice-vdagent security update (Jan 13)
 

Several vulnerabilities were discovered in spice-vdagent, a spice guest agent for enchancing SPICE integeration and experience. CVE-2017-15108

  Debian LTS: DLA-2523-1: imagemagick security update (Jan 12)
 

Several security vulnerabilities were found in ImageMagick, a suite of image manipulation programs. An attacker could cause denial of service and execution of arbitrary code when a crafted image file is processed.

  Debian LTS: DLA-2520-1: golang-websocket security update (Jan 7)
 

There was an integer overflow vulnerability concerning the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.

  ArchLinux: 202101-7: mbedtls: private key recovery (Jan 10)
 

The package mbedtls before version 2.25.0-1 is vulnerable to private key recovery.

  ArchLinux: 202101-6: chromium: multiple issues (Jan 10)
 

The package chromium before version 87.0.4280.141-1 is vulnerable to multiple issues including access restriction bypass, arbitrary code execution and insufficient validation.

  ArchLinux: 202101-5: firefox: arbitrary code execution (Jan 10)
 

The package firefox before version 84.0.2-1 is vulnerable to arbitrary code execution.

  SciLinux: SLSA-2021-0087-1 Critical: thunderbird on SL7.x x86_64 (Jan 14)
 

This update upgrades Thunderbird to version 78.6.1. * Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044) SL7 x86_64 thunderbird-78.6.1-1.el7_9.x86_64.rpm thunderbird-debuginfo-78.6.1-1.el7_9.x86_64.rpm - Scientific Linux Development Team

  SciLinux: SLSA-2021-0053-1 Critical: firefox on SL7.x x86_64 (Jan 11)
 

This update upgrades Firefox to version 78.6.1 ESR. * Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044) SL7 x86_64 firefox-78.6.1-1.el7_9.x86_64.rpm firefox-debuginfo-78.6.1-1.el7_9.x86_64.rpm firefox-78.6.1-1.el7_9.i686.rpm - Scientific Linux Development Team

  openSUSE: 2021:0063-1 important: MozillaFirefox (Jan 15)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0060-1 important: the Linux Kernel (Jan 14)
 

An update that solves 17 vulnerabilities and has 99 fixes is now available.

  openSUSE: 2021:0058-1 moderate: cobbler (Jan 14)
 

An update that solves 6 vulnerabilities and has 58 fixes is now available.

  openSUSE: 2021:0059-1 moderate: libzypp, zypper (Jan 14)
 

An update that solves one vulnerability and has 11 fixes is now available.

  openSUSE: 2021:0054-1 important: hawk2 (Jan 13)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0055-1 important: crmsh (Jan 13)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0056-1 important: MozillaFirefox (Jan 13)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0047-1 important: chromium (Jan 11)
 

An update that fixes 13 vulnerabilities is now available.

  openSUSE: 2021:0048-1 important: chromium (Jan 11)
 

An update that fixes 13 vulnerabilities is now available.

  openSUSE: 2021:0046-1 moderate: cobbler (Jan 11)
 

An update that solves 6 vulnerabilities and has 58 fixes is now available.

  openSUSE: 2021:0045-1 moderate: rpmlint (Jan 11)
 

An update that contains security fixes can now be installed.

  openSUSE: 2021:0043-1 moderate: tomcat (Jan 11)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0041-1 important: chromium (Jan 10)
 

An update that fixes 13 vulnerabilities is now available.

  openSUSE: 2021:0040-1 important: chromium (Jan 10)
 

An update that fixes 13 vulnerabilities is now available.

  openSUSE: 2021:0027-1 moderate: gimp (Jan 7)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2021:0026-1 important: dovecot23 (Jan 7)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2021:0025-1 important: kitty (Jan 7)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0024-1 moderate: python-notebook (Jan 7)
 

An update that fixes one vulnerability is now available.

  Mageia 2021-0031: kernel-linus security update (Jan 15)
 

This update provides an upgrade to the new upstream 5.10 longterm branch, currently based on 5.10.6, adding new features and new and improved hardware support. This update also fixes atleast the following security issues:

  Mageia 2021-0030: kernel security update (Jan 15)
 

This update provides an upgrade to the new upstream 5.10 longterm branch, currently based on 5.10.6, adding new features and new and improved hardware support. This update also fixes atleast the following security issues:

  Mageia 2021-0029: nvidia-current security update (Jan 14)
 

NVIDIA GPU Display Driver Linux contains a vulnerability in the kernel mode layer (nvidia.ko) IOCTL in which user-mode clients can access legacy privileged APIs, which may lead to denial of service, escalation of privileges, and information disclosure (CVE20211052).

  Mageia 2021-0028: cairo security update (Jan 14)
 

LibreOffice slideshow aborts with stack smashing in cairos composite_boxes (CVE-2020-35492). References: - https://bugs.mageia.org/show_bug.cgi?id=28084

  Mageia 2021-0027: thunderbird security update (Jan 14)
 

Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk. (CVE-2020-16044) See upstream releasenotes for other changes. References:

  Mageia 2021-0026: nvidia390 security update (Jan 14)
 

NVIDIA GPU Display Driver Linux contains a vulnerability in the kernel mode layer (nvidia.ko) IOCTL in which user-mode clients can access legacy privileged APIs, which may lead to denial of service, escalation of privileges, and information disclosure (CVE20211052).

  Mageia 2021-0025: php security update (Jan 14)
 

FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071). stream_get_contents() fails with maxlength=-1 or default. See upstream releasenotes for other changes.

  Mageia 2021-0024: awstats security update (Jan 14)
 

It was discovered that Awstats was vulnerable to path traversal attacks. A remote unauthenticated attacker could leverage that to perform arbitrary code execution. The previous fix did not fully address the issue when the default /etc/awstats/awstats.conf is not present (CVE-2020-29600).

  Mageia 2021-0023: bison security update (Jan 14)
 

It was discovered that GNU Bison before 3.5.4 allows attackers to cause a denial of service (application crash) (CVE-2020-14150). References: - https://bugs.mageia.org/show_bug.cgi?id=27730

  Mageia 2021-0022: krb5 security update (Jan 14)
 

MIT Kerberos 5 (aka krb5) before 1.17.2 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit (CVE-2020-28196). References:

  Mageia 2021-0021: guava security update (Jan 10)
 

A temp directory creation vulnerability exist in Guava versions prior to 30.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.google.common.io.Files.createTempDir(). The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the

  Mageia 2021-0020: tomcat security update (Jan 10)
 

While investigating Apache issue 64830 it was discovered that Apache Tomcat could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests

  Mageia 2021-0019: cherokee security update (Jan 10)
 

Cherokee 0.4.27 to 1.2.104 is affected by a denial of service due to a NULL pointer dereferences. A remote unauthenticated attacker can crash the server by sending an HTTP request to protected resources using a malformed Authorization header that is mishandled during a cherokee_buffer_add call within cherokee_validator_parse_basic or cherokee_validator_parse_digest.

  Mageia 2021-0018: golang security update (Jan 10)
 

An input validation vulnerability was found in go. From a generated go file (from the cgo tool) it is possible to modify symbols within that object file and specify code instead. An attacker could potentially use this flaw by creating a repository which included malicious pre-built object files that could execute arbitrary code when downloaded and run via "go get" or "go build"

  Mageia 2021-0017: libass security update (Jan 10)
 

In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow. (CVE-2020-26682) References: - https://bugs.mageia.org/show_bug.cgi?id=27385

  Mageia 2021-0016: xrdp security update (Jan 10)
 

Ashley Newson discovered that the XRDP sessions manager was susceptible to denial of service. A local attacker can further take advantage of this flaw to impersonate the XRDP sessions manager and capture any user credentials that are submitted to XRDP, approve or reject arbitrary login credentials or to hijack existing sessions for xorgxrdp sessions (CVE-2020-4044).

  Mageia 2021-0015: openexr security update (Jan 10)
 

An issue was discovered in OpenEXR before 2.5.2. An invalid tiled input file could cause invalid memory access in TiledInputFile::TiledInputFile() in IlmImf/ImfTiledInputFile.cpp, as demonstrated by a NULL pointer dereference (CVE-2020-15304).

  Mageia 2021-0014: alpine and c-client security update (Jan 10)
 

Alpine before 2.23 silently proceeds to use an insecure connection after a /tls is sent in certain circumstances involving PREAUTH, which is a less secure behavior than the alternative of closing the connection and letting the user decide what they would like to do (CVE-2020-14929).

  Mageia 2021-0013: imagemagick security update (Jan 10)
 

The imagemagick package has been updated to version 7.0.10-55, fixing several security issues. The abydos, converseen, libopenshot, mgba, pfstools, php-imagick, sk1, synfig, transcode, uniconvertor, and xine-lib1.2 packages have been rebuilt against

  Mageia 2021-0012: firefox security update (Jan 8)
 

A malicious peer could have modified a COOKIE-ECHO chunk in a SCTP packet in a way that potentially resulted in a use-after-free. We presume that with enough effort it could have been exploited to run arbitrary code. (CVE-2020-16044).

  Mageia 2021-0011: binutils security update (Jan 8)
 

It was discovered that mingw-binutils and binutils suffered from two vulnerabilites which might lead to DoS. Null Pointer Dereference in debug_get_real_type could result in DoS (CVE-2020-16598).

  Mageia 2021-0010: squirrelmail security update (Jan 8)
 

XSS was discovered in SquirrelMail through 1.4.22. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element ().

  Mageia 2021-0009: busybox security update (Jan 8)
 

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file". ().

  Mageia 2021-0008: dovecot security update (Jan 8)
 

It was discovered that Dovecot incorrectly handled certain imap hibernation commands. A remote authenticated attacker could possibly use this issue to access other users email (CVE-2020-24386). Innokentii Sennovskiy discovered that Dovecot incorrectly handled MIME

  Mageia 2021-0007: c-ares security update (Jan 8)
 

Avoid read-heap-buffer-overflow in ares_parse_soa_reply found during fuzzing. Avoid theoretical buffer overflow in RC4 loop comparison.

  Mageia 2021-0006: dash security update (Jan 8)
 

Code was executed even if noexec ("-n") was specified. (bdo#58288 / bsc#1178978) References: - https://bugs.mageia.org/show_bug.cgi?id=27655

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.