Linux Advisory Watch: January 22nd, 2021

Advisories

Linux Advisory Watch: January 22nd, 2021

Thank you for reading the LinuxSecurity Linux Advisory Watch newsletter! Staying on top of the latest security advisories issued by the distro(s) you use is essential in maintaining an updated, secure Linux system. Our weekly newsletter is an easy, convenient way to track distribution security advisories - helping you keep your Linux environment safe from malware and other exploits.

Important advisories issued this week include a warning from Debian of multiple security issues  in the Chromium web browser which could result in the execution of arbitrary code, denial of service or information disclosure and an advisory from Mageia regarding a XSS vulnerability discovered in python-lxml's clean module which could be exploited by a remote attacker to run arbitrary HTML/JS code. Continue reading to learn about other significant advisories issued this week. Stay healthy, safe and secure - both on and offline!

Yours in Open Source,

Brittany Day Signature


LinuxSecurity.com Feature Extras:

Fileless Malware on Linux: Anatomy of an Attack - This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy and malicious threat. Let’s begin by exploring the concept of fileless malware.

A Linux Admin's Getting Started Guide to Improving PHP Security - This article will examine how you can configure and run PHP securely to mitigate the risk of attacks and compromise, secure web applications, protect user privacy and maintain a secure and properly functioning Linux web server.


  Debian: DSA-4833-1: gst-plugins-bad1.0 security update (Jan 18)
 

Andrew Wesie discovered a buffer overflow in the H264 support of the GStreamer multimedia framework, which could potentially result in the execution of arbitrary code.

  Debian: DSA-4832-1: chromium security update (Jan 16)
 

Multiple security issues were discovered in the Chromium web browser, which could result in the execution of arbitrary code, denial of service or information disclosure.

  Debian: DSA-4831-1: ruby-redcarpet security update (Jan 15)
 

Johan Smits discovered that ruby-redcarpet, a markdown parser, did not properly validate its input. This would allow an attacker to mount a cross-site scripting attack.

  Debian: DSA-4830-1: flatpak security update (Jan 14)
 

Simon McVittie discovered a bug in the flatpak-portal service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape).

  Fedora 33: dotnet3.1 2021-fb078913dd (Jan 21)
 

This is the January 2021 security update for .NET Core 3.1: https://github.com/dotnet/core/blob/master/release-notes/3.1/3.1.11/3.1.11.md This update includes a fix for CVE-2021-1723.

  Fedora 32: dotnet3.1 2021-77a4202036 (Jan 21)
 

This is the January 2021 security update for .NET Core 3.1: https://github.com/dotnet/core/blob/master/release-notes/3.1/3.1.11/3.1.11.md This update includes a fix for CVE-2021-1723.

  Fedora 33: python-pillow 2021-a8ddc1ce70 (Jan 20)
 

Backport fixes for CVE-2020-35653, CVE-2020-35654, CVE-2020-35655.

  Fedora 33: mingw-python-pillow 2021-a8ddc1ce70 (Jan 20)
 

Backport fixes for CVE-2020-35653, CVE-2020-35654, CVE-2020-35655.

  Fedora 33: libntlm 2020-8794383d6f (Jan 20)
 

Update to security fix 1.6 version. Fixes CVE-2019-17455

  Fedora 32: sudo 2021-234d14bfcc (Jan 20)
 

Rebase to 1.9.5p1 - updated sudo url Resolves: rhbz#1902758 - enabled python plugin as a subpackage Resolves: rhbz#1909299 - fixed double free in sss_to_sudoers Resolves: rhbz#1885874 - fixed CVE-2021-23239 sudo: possible directory existence test due to race condition in sudoedit Resolves: rhbz#1915055 - fixed CVE-2021-23240 sudo: symbolic link attack in SELinux-

  Fedora 33: sudo 2021-324479472c (Jan 19)
 

Rebase to 1.9.5p1 - updated sudo url Resolves: rhbz#1902758 - enabled python plugin as a subpackage Resolves: rhbz#1909299 - fixed double free in sss_to_sudoers Resolves: rhbz#1885874 - fixed CVE-2021-23239 sudo: possible directory existence test due to race condition in sudoedit Resolves: rhbz#1915055 - fixed CVE-2021-23240 sudo: symbolic link attack in SELinux-

  Fedora 33: coturn 2021-dee141fc61 (Jan 19)
 

Coturn 4.5.2 memory - Add prometheus metrics - Delete trailing whitespace in example configuration files - Add architecture ppc64le to travis build - Fix misleading option in doc (prometheus) - Allow RFC6062 TCP relay data to look like TLS - Add support for proxy protocol V1 - Print full date and time in

  Fedora 32: glibc 2021-6e581c051a (Jan 19)
 

- x86: Check IFUNC definition in unrelocated executable [BZ #20019] - x86: Set header.feature_1 in TCB for always-on CET [BZ #27177] - x86-64: Avoid rep movsb with short distance [BZ #27130] - Fix for CVE-2019-25013 buffer overrun in EUC-KR conversion module (bz #24973) - Add NEWS entry for CVE-2020-29562 (BZ #26923) - iconv: Fix incorrect UCS4 inner loop bounds

  Fedora 32: coturn 2021-32d0068851 (Jan 19)
 

Coturn 4.5.2 memory - Add prometheus metrics - Delete trailing whitespace in example configuration files - Add architecture ppc64le to travis build - Fix misleading option in doc (prometheus) - Allow RFC6062 TCP relay data to look like TLS - Add support for proxy protocol V1 - Print full date and time in

  Fedora 32: dovecot 2021-c90cb486f7 (Jan 19)
 

fix rundir location ---- - dovecot updated to 2.3.13, pigeonhole to 0.5.13 - CVE-2020-24386: Specially crafted command can cause IMAP hibernate to allow logged in user to access other people's emails and filesystem information. - Metric filter and global event filter variable syntax changed to a SQL-like format. - auth: Added new aliases for %{variables}. Usage of the old ones is

  Fedora 32: flatpak 2021-f807eb480a (Jan 18)
 

This is a security update that fixes a sandbox escape where a malicious application can execute code outside the sandbox by controlling the environment of the "flatpak run" command when spawning a sub-sandbox. See the advisory for details: https://github.com/flatpak/flatpak/security/advisories/GHSA-4ppf- fxf6-vxg2

  Fedora 33: glibc 2021-6feb090c97 (Jan 17)
 

- x86: Check IFUNC definition in unrelocated executable [BZ #20019] - x86: Set header.feature_1 in TCB for always-on CET [BZ #27177] - Update for [BZ #27130] fix - x86-64: Avoid rep movsb with short distance [BZ #27130] - Fix for CVE-2019-25013 buffer overrun in EUC-KR conversion module (bz #24973) - tests-mcheck: New variable to run tests with MALLOC_CHECK_=3 - iconv:

  Fedora 33: chromium 2021-79926272ce (Jan 16)
 

Update to 87.0.4280.141. Fixes: CVE-2021-21106 CVE-2021-21107 CVE-2021-21108 CVE-2021-21109 CVE-2021-21110 CVE-2021-21111 CVE-2021-21112 CVE-2021-21113 CVE-2020-16043 CVE-2021-21114 CVE-2020-15995 CVE-2021-21115 CVE-2021-21116

  Fedora 33: flatpak 2021-f970ea9d79 (Jan 15)
 

This updates flatpak from 1.8 to new 1.10 stable series. The major new feature in this series compared to 1.8 is the support for the new repo format which should make updates faster and download less data. For details what's new in 1.10, see https://github.com/flatpak/flatpak/releases/tag/1.10.0 This also includes a security update that fixes a sandbox escape where a malicious

  Fedora 33: kernel 2021-620fb40359 (Jan 15)
 

The 5.10.7 stable kernel update contains a number of important fixes across the tree.

  Fedora 33: kernel-headers 2021-620fb40359 (Jan 15)
 

The 5.10.7 stable kernel update contains a number of important fixes across the tree.

  Fedora 33: python-cairosvg 2021-a2d05a2e65 (Jan 15)
 

security fix for GHSA-hq37-853p-g5cf: "Regular Expression Denial of Service (REDoS)", rated as "moderate severity" published 17 hours ago by liZe

  Fedora 32: kernel 2021-082e638d02 (Jan 15)
 

The 5.10.7 stable kernel rebase contains new features, improved hardware support, and a number of important fixes across the tree.

  Fedora 32: kernel-headers 2021-082e638d02 (Jan 15)
 

The 5.10.7 stable kernel rebase contains new features, improved hardware support, and a number of important fixes across the tree.

  Fedora 32: python-cairosvg 2021-8537865fb5 (Jan 15)
 

security fix for GHSA-hq37-853p-g5cf: "Regular Expression Denial of Service (REDoS)", rated as "moderate severity" published 17 hours ago by liZe

  Fedora 32: nodejs 2021-d5b2c18fe6 (Jan 15)
 

Update to 12.20.1 security release

  Fedora 32: php 2021-ca0e53d310 (Jan 15)
 

**PHP version 7.4.14** (07 Jan 2021) **Core:** * Fixed bug php#74558 (Can't rebind closure returned by Closure::fromCallable()). (cmb) * Fixed bug php#80345 (PHPIZE configuration has outdated PHP_RELEASE_VERSION). (cmb) * Fixed bug php#72964 (White space not unfolded for CC/Bcc headers). (cmb) * Fixed bug php#80362 (Running dtrace scripts can cause php to crash). (al at coralnet dot

  Fedora 33: dia 2020-1fe0e08c8d (Jan 14)
 

- Added upstream patch to avoid infinite loop on filenames with invalid encoding (CVE-2019-19451, #1778767)

  Fedora 32: openjpeg2 2020-d32853a28d (Jan 14)
 

This update backports patches for CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845. ---- This update backports patches for CVE-2020-27824 and CVE-2020-27823. ---- Backport patch for CVE-2020-27814.

  Fedora 32: mingw-openjpeg2 2020-d32853a28d (Jan 14)
 

This update backports patches for CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845. ---- This update backports patches for CVE-2020-27824 and CVE-2020-27823. ---- Backport patch for CVE-2020-27814.

  Gentoo: GLSA-202101-11: Zabbix: Root privilege escalation (Jan 21)
 

Multiple vulnerabilities were discovered in Gentoo's ebuild for Zabbix which could lead to root privilege escalation.

  RedHat: RHSA-2021-0079:01 Moderate: OpenShift Container Platform 3.11.374 (Jan 20)
 

Red Hat OpenShift Container Platform release 3.11.374 is now available with updates to packages and images that fix several bugs. This release also includes a security update for Red Hat OpenShift Container Platform 3.11.

  RedHat: RHSA-2021-0034:01 Important: OpenShift Container Platform 4.5.27 (Jan 19)
 

Red Hat OpenShift Container Platform release 4.5.27 is now available with updates to packages and images that fix several bugs and add enhancements. This release also includes a security update for Red Hat OpenShift Container Platform 4.5.

  RedHat: RHSA-2021-0155:01 Moderate: dnsmasq security update (Jan 19)
 

An update for dnsmasq is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0154:01 Moderate: dnsmasq security update (Jan 19)
 

An update for dnsmasq is now available for Red Hat Enterprise Linux 7.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0153:01 Moderate: dnsmasq security update (Jan 19)
 

An update for dnsmasq is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2021-0190:01 Moderate: OpenShift Container Platform 4.6 (Jan 19)
 

An update for compliance-content-container, ose-compliance-openscap-container, ose-compliance-operator-container, and ose-compliance-operator-metadata-container is now available for Red Hat OpenShift Container Platform 4.6.

  RedHat: RHSA-2021-0156:01 Moderate: dnsmasq security update (Jan 19)
 

An update for dnsmasq is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.

  RedHat: RHSA-2021-0151:01 Important: dnsmasq security update (Jan 19)
 

An update for dnsmasq is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0152:01 Important: dnsmasq security update (Jan 19)
 

An update for dnsmasq is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0150:01 Important: dnsmasq security update (Jan 19)
 

An update for dnsmasq is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2021-0187:01 Moderate: OpenShift Virtualization 2.5.3 security (Jan 19)
 

Red Hat OpenShift Virtualization release 2.5.3 is now available with updates to packages and images that fix several bugs and security issues. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0189:01 Important: kpatch-patch security update (Jan 19)
 

An update is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2021-0183:01 Important: linux-firmware security update (Jan 19)
 

An update for linux-firmware is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0184:01 Important: kernel security and bug fix update (Jan 19)
 

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0181:01 Moderate: kernel security update (Jan 19)
 

An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0037:01 Moderate: OpenShift Container Platform 4.6.12 bug (Jan 18)
 

Red Hat OpenShift Container Platform release 4.6.12 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat OpenShift Container Platform 4.6.

  RedHat: RHSA-2021-0039:01 Moderate: OpenShift Container Platform 4.6.12 (Jan 18)
 

Red Hat OpenShift Container Platform release 4.6.12 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0167:01 Important: postgresql:9.6 security update (Jan 18)
 

An update for the postgresql:9.6 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0166:01 Important: postgresql:10 security update (Jan 18)
 

An update for the postgresql:10 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0165:01 Important: libpq security update (Jan 18)
 

An update for libpq is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0160:01 Critical: thunderbird security update (Jan 18)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2021-0038:01 Important: OpenShift Container Platform 4.6.12 (Jan 18)
 

Red Hat OpenShift Container Platform release 4.6.12 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat OpenShift Container Platform 4.6.

  RedHat: RHSA-2021-0162:01 Important: xstream security update (Jan 18)
 

An update for xstream is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2021-0164:01 Important: postgresql:9.6 security update (Jan 18)
 

An update for the postgresql:9.6 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0161:01 Important: postgresql:10 security update (Jan 18)
 

An update for the postgresql:10 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0163:01 Important: postgresql:12 security update (Jan 18)
 

An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2021-0146:01 Moderate: Release of OpenShift Serverless 1.12.0 (Jan 14)
 

Release of OpenShift Serverless 1.12.0 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each

  RedHat: RHSA-2021-0145:01 Moderate: Red Hat OpenShift Serverless Client kn (Jan 14)
 

Red Hat OpenShift Serverless Client kn 1.12.0 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each

  RedHat: RHSA-2021-0136:01 Moderate: kernel-rt security and bug fix update (Jan 14)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  Slackware: 2021-014-01: wavpack Security Update (Jan 14)
 

New wavpack packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.

  SUSE: 2021:26-1 suse/sle15 Security Update (Jan 15)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  SUSE: 2021:25-1 suse/sle15 Security Update (Jan 15)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  SUSE: 2021:24-1 suse/sle15 Security Update (Jan 15)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  SUSE: 2021:23-1 suse/sle15 Security Update (Jan 15)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  SUSE: 2021:22-1 suse/sles12sp5 Security Update (Jan 15)
 

The container suse/sles12sp5 was updated. The following patches have been included in this update:

  SUSE: 2021:21-1 suse/sle15 Security Update (Jan 14)
 

The container suse/sle15 was updated. The following patches have been included in this update:

  Debian LTS: DLA-2529-1: mutt security update (Jan 20)
 

rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups).

  Debian LTS: DLA-2528-1: gst-plugins-bad1.0 security update (Jan 18)
 

Andrew Wesie discovered a buffer overflow in the H264 support of the GStreamer multimedia framework, which could potentially result in the execution of arbitrary code.

  Debian LTS: DLA-2527-1: snapd security update (Jan 18)
 

golang-go.crypto was recently updated with a fix for CVE-2019-11840. This in turn requires all packages that use the affected code to be recompiled in order to pick up the security fix.

  Debian LTS: DLA-2526-1: ruby-redcarpet security update (Jan 15)
 

In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions, no HTML escaping was being performed when

  Debian LTS: DLA-2525-1: wavpack security update (Jan 15)
 

Multiple vulnerabilites in wavpack were found, like OOB read (which could potentially lead to a DOS attack), unexpected control flow, crashes, integer overflow, and segfaults.

  ArchLinux: 202101-24: atftp: denial of service (Jan 15)
 

The package atftp before version 0.7.2-3 is vulnerable to denial of service.

  ArchLinux: 202101-23: wavpack: arbitrary code execution (Jan 15)
 

The package wavpack before version 5.3.0-2 is vulnerable to arbitrary code execution.

  ArchLinux: 202101-22: mediawiki: multiple issues (Jan 15)
 

The package mediawiki before version 1.35.1-1 is vulnerable to multiple issues including cross-site scripting and information disclosure.

  ArchLinux: 202101-21: coturn: insufficient validation (Jan 15)
 

The package coturn before version 4.5.2-1 is vulnerable to insufficient validation.

  ArchLinux: 202101-20: vivaldi: multiple issues (Jan 15)
 

The package vivaldi before version 3.5.2115.87-1 is vulnerable to multiple issues including access restriction bypass, arbitrary code execution and insufficient validation.

  ArchLinux: 202101-19: nvidia-utils: multiple issues (Jan 15)
 

The package nvidia-utils before version 460.32.03-1 is vulnerable to multiple issues including privilege escalation, denial of service and information disclosure.

  ArchLinux: 202101-18: opensmtpd: multiple issues (Jan 15)
 

The package opensmtpd before version 6.8.0p2-1 is vulnerable to multiple issues including information disclosure and denial of service.

  ArchLinux: 202101-17: thunderbird: arbitrary code execution (Jan 15)
 

The package thunderbird before version 78.6.1-1 is vulnerable to arbitrary code execution.

  ArchLinux: 202101-16: nodejs: multiple issues (Jan 15)
 

The package nodejs before version 15.5.1-1 is vulnerable to multiple issues including arbitrary code execution and url request injection.

  ArchLinux: 202101-15: nodejs-lts-fermium: multiple issues (Jan 15)
 

The package nodejs-lts-fermium before version 14.15.4-1 is vulnerable to multiple issues including arbitrary code execution and url request injection.

  ArchLinux: 202101-14: nodejs-lts-erbium: multiple issues (Jan 15)
 

The package nodejs-lts-erbium before version 12.20.1-1 is vulnerable to multiple issues including arbitrary code execution and url request injection.

  ArchLinux: 202101-13: nodejs-lts-dubnium: multiple issues (Jan 15)
 

The package nodejs-lts-dubnium before version 10.23.1-1 is vulnerable to multiple issues including arbitrary code execution and url request injection.

  ArchLinux: 202101-12: python-cairosvg: denial of service (Jan 15)
 

The package python-cairosvg before version 2.5.1-1 is vulnerable to denial of service.

  ArchLinux: 202101-11: python-pillow: multiple issues (Jan 15)
 

The package python-pillow before version 8.1.0-1 is vulnerable to multiple issues including arbitrary code execution, information disclosure and denial of service.

  ArchLinux: 202101-10: gitlab: multiple issues (Jan 15)
 

The package gitlab before version 13.7.2-1 is vulnerable to multiple issues including authentication bypass, denial of service and information disclosure.

  ArchLinux: 202101-9: php: insufficient validation (Jan 15)
 

The package php before version 7.4.14-1 is vulnerable to insufficient validation.

  ArchLinux: 202101-8: mdbook: cross-site scripting (Jan 15)
 

The package mdbook before version 0.4.5-1 is vulnerable to cross-site scripting.

  CentOS: CESA-2021-0087: Critical CentOS 7 thunderbird (Jan 15)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2021:0087

  CentOS: CESA-2021-0053: Critical CentOS 7 firefox (Jan 15)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2021:0053

  SciLinux: SLSA-2021-0087-1 Critical: thunderbird on SL7.x x86_64 (Jan 14)
 

This update upgrades Thunderbird to version 78.6.1. * Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044) SL7 x86_64 thunderbird-78.6.1-1.el7_9.x86_64.rpm thunderbird-debuginfo-78.6.1-1.el7_9.x86_64.rpm - Scientific Linux Development Team

  openSUSE: 2021:0132-1 moderate: python-autobahn (Jan 21)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0127-1 important: MozillaThunderbird (Jan 20)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0129-1 important: dnsmasq (Jan 20)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2021:0128-1 important: tcmu-runner (Jan 20)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0124-1 important: dnsmasq (Jan 20)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2021:0122-1 important: vlc (Jan 20)
 

An update that solves two vulnerabilities and has one errata is now available.

  openSUSE: 2021:0123-1 moderate: viewvc (Jan 20)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0121-1 important: vlc (Jan 19)
 

An update that solves two vulnerabilities and has one errata is now available.

  openSUSE: 2021:0117-1 moderate: python-jupyter_notebook (Jan 19)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0119-1 moderate: viewvc (Jan 19)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0106-1 moderate: php7 (Jan 18)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0107-1 moderate: openldap2 (Jan 18)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2021:0101-1 moderate: php7 (Jan 17)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0102-1 moderate: openldap2 (Jan 17)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2021:0097-1 important: tcmu-runner (Jan 17)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0096-1 important: slurm_18_08 (Jan 17)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2021:0089-1 important: open-iscsi (Jan 16)
 

An update that contains security fixes can now be installed.

  openSUSE: 2021:0093-1 important: MozillaThunderbird (Jan 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0091-1 important: vlc (Jan 16)
 

An update that solves two vulnerabilities and has one errata is now available.

  openSUSE: 2021:0082-1 moderate: nodejs10 (Jan 16)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2021:0084-1 moderate: viewvc (Jan 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0079-1 moderate: ceph (Jan 16)
 

An update that solves one vulnerability and has 5 fixes is now available.

  openSUSE: 2021:0073-1 important: crmsh (Jan 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0074-1 important: hawk2 (Jan 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0076-1 important: vlc (Jan 16)
 

An update that solves two vulnerabilities and has one errata is now available.

  openSUSE: 2021:0078-1 moderate: python-jupyter_notebook (Jan 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0081-1 moderate: tomcat (Jan 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0075-1 important: the Linux Kernel (Jan 16)
 

An update that solves 17 vulnerabilities and has 62 fixes is now available.

  openSUSE: 2021:0072-1 important: dovecot23 (Jan 16)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2021:0066-1 moderate: nodejs14 (Jan 15)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2021:0065-1 moderate: nodejs10 (Jan 15)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2021:0064-1 moderate: nodejs12 (Jan 15)
 

An update that fixes four vulnerabilities is now available.

  openSUSE: 2021:0063-1 important: MozillaFirefox (Jan 15)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2021:0060-1 important: the Linux Kernel (Jan 14)
 

An update that solves 17 vulnerabilities and has 99 fixes is now available.

  openSUSE: 2021:0058-1 moderate: cobbler (Jan 14)
 

An update that solves 6 vulnerabilities and has 58 fixes is now available.

  openSUSE: 2021:0059-1 moderate: libzypp, zypper (Jan 14)
 

An update that solves one vulnerability and has 11 fixes is now available.

  Mageia 2021-0047: kernel security update (Jan 20)
 

This kernel update is based on upstream 5.10.8 and fixes atleast the following security issue: SCSI EXTENDED COPY (XCOPY) requests sent to a Linux SCSI target (LIO) allow an attacker to read or write anywhere on any LIO backstore configured

  Mageia 2021-0046: openldap security update (Jan 19)
 

It was discovered that OpenLDAP incorrectly handled certain malformed inputs. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service (CVE-2020-25709, CVE-2020-25710). References:

  Mageia 2021-0045: resource-agents security update (Jan 19)
 

Multiple vulnerabilities related to unsafe tempfile usage (bsc#1146690, bsc#1146691, bsc#1146692, bsc#1146766, bsc#1146776, bsc#1146784, bsc#1146785, bsc#1146787). Issues where the ocfmon user was created with a default password (bsc#1021689,

  Mageia 2021-0044: chromium-browser-stable security update (Jan 17)
 

The updated packages fix security vulnerabilities. See upstream releasenotes. References:

  Mageia 2021-0043: caribou security update (Jan 17)
 

An issue in caribou, that was exposed by a CVE fix in X.org server, permits a screensaver-lock bypass. It is possible to crash the screensaver and unlock the desktop via the virtual keyboard. References:

  Mageia 2021-0042: sudo security update (Jan 17)
 

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. (CVE-2021-23239).

  Mageia 2021-0041: p11-kit security update (Jan 17)
 

Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc (CVE-2020-29361). A heap-based buffer over-read has been discovered in the RPC protocol used by

  Mageia 2021-0040: synergy security update (Jan 17)
 

In Synergy before version 1.12.0, a Synergy server can be crashed by receiving a kMsgHelloBack packet with a client name length set to 0xffffffff (4294967295) if the servers memory is less than 4 GB. It was verified that this issue does not cause a crash through the exception handler if the available memory of the Server is more than 4GB (CVE-2020-15117).

  Mageia 2021-0039: resteasy security update (Jan 17)
 

A flaw was found in Resteasy, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed (CVE-2020-1695).

  Mageia 2021-0038: python-lxml security update (Jan 17)
 

A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code. (CVE-2020-27783).

  Mageia 2021-0037: opensc security update (Jan 17)
 

The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file (CVE-2020-26570). The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init (CVE-2020-26571).

  Mageia 2021-0036: bind security update (Jan 17)
 

A flaw was found in bind. An assertion failure can occur when trying to verify a truncated response to a TSIG-signed request. The highest threat from this vulnerability is to system availability (CVE-2020-8622). A flaw was found in bind. Updates to "Update-policy" rules of type "subdomain"

  Mageia 2021-0035: edk2 security update (Jan 17)
 

Improper configuration in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access. (CVE-2018-12179). Insufficient memory write check in SMM service for EDK II may allow an

  Mageia 2021-0034: dom4j security update (Jan 17)
 

A flaw was found in the dom4j library. By using the default SaxReader() provided by Dom4J, external DTDs and External Entities are allowed, resulting in a possible XXE (CVE-2020-10683). References:

  Mageia 2021-0033: unzip security update (Jan 17)
 

Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a "better zip bomb" issue (CVE-2019-13232). References:

  Mageia 2021-0032: policycoreutils security update (Jan 17)
 

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing) (CVE-2018-1063).

  Mageia 2021-0031: kernel-linus security update (Jan 15)
 

This update provides an upgrade to the new upstream 5.10 longterm branch, currently based on 5.10.6, adding new features and new and improved hardware support. This update also fixes atleast the following security issues:

  Mageia 2021-0030: kernel security update (Jan 15)
 

This update provides an upgrade to the new upstream 5.10 longterm branch, currently based on 5.10.6, adding new features and new and improved hardware support. This update also fixes atleast the following security issues:

  Mageia 2021-0029: nvidia-current security update (Jan 14)
 

NVIDIA GPU Display Driver Linux contains a vulnerability in the kernel mode layer (nvidia.ko) IOCTL in which user-mode clients can access legacy privileged APIs, which may lead to denial of service, escalation of privileges, and information disclosure (CVE20211052).

  Mageia 2021-0028: cairo security update (Jan 14)
 

LibreOffice slideshow aborts with stack smashing in cairos composite_boxes (CVE-2020-35492). References: - https://bugs.mageia.org/show_bug.cgi?id=28084

  Mageia 2021-0027: thunderbird security update (Jan 14)
 

Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk. (CVE-2020-16044) See upstream releasenotes for other changes. References:

  Mageia 2021-0026: nvidia390 security update (Jan 14)
 

NVIDIA GPU Display Driver Linux contains a vulnerability in the kernel mode layer (nvidia.ko) IOCTL in which user-mode clients can access legacy privileged APIs, which may lead to denial of service, escalation of privileges, and information disclosure (CVE20211052).

  Mageia 2021-0025: php security update (Jan 14)
 

FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071). stream_get_contents() fails with maxlength=-1 or default. See upstream releasenotes for other changes.

  Mageia 2021-0024: awstats security update (Jan 14)
 

It was discovered that Awstats was vulnerable to path traversal attacks. A remote unauthenticated attacker could leverage that to perform arbitrary code execution. The previous fix did not fully address the issue when the default /etc/awstats/awstats.conf is not present (CVE-2020-29600).

  Mageia 2021-0023: bison security update (Jan 14)
 

It was discovered that GNU Bison before 3.5.4 allows attackers to cause a denial of service (application crash) (CVE-2020-14150). References: - https://bugs.mageia.org/show_bug.cgi?id=27730

  Mageia 2021-0022: krb5 security update (Jan 14)
 

MIT Kerberos 5 (aka krb5) before 1.17.2 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit (CVE-2020-28196). References:

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.