Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

- Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration tester when there is a lack of information about the target that can be exploited.

- When you’re dealing with a security incident it’s essential you – and the rest of your team – not only have the skills they need to comprehensively deal with an issue, but also have a framework to support them as they approach it. This framework means they can focus purely on what they need to do, following a process that removes any vulnerabilities and threats in a proper way – so everyone who depends upon the software you protect can be confident that it’s secure and functioning properly.


  (Jan 26)
 

Two vulnerabilities were discovered in cURL, an URL transfer library. CVE-2018-1000005

  (Jan 25)
 

Multiple vulnerabilities were discovered in the poppler PDF rendering library, which could result in denial of service or the execution of arbitrary code if a malformed PDF file is processed.

  (Jan 25)
 

Several security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, use-after-frees, integer overflows and other implementation errors may lead to the execution of arbitrary code, denial of service or URL spoofing.

  (Jan 24)
 

It was discovered that gcab, a Microsoft Cabinet file manipulation tool, is prone to a stack-based buffer overflow vulnerability when extracting .cab files. An attacker can take advantage of this flaw to cause a denial-of-service or, potentially the execution of arbitrary code with

  (Jan 22)
 

It was discovered that Smarty, a PHP template engine, was vulnerable to code-injection attacks. An attacker was able to craft a filename in comments that could lead to arbitrary code execution on the host running Smarty.

  (Jan 22)
 

Josef Gajdusek discovered that OpenOCD, a JTAG debugger for ARM and MIPS, was vulnerable to Cross Protocol Scripting attacks. An attacker could craft a HTML page that, when visited by a victim running OpenOCD, could execute arbitrary commands on the victims host.

  (Jan 19)
 

The cPanel Security Team discovered that awstats, a log file analyzer, was vulnerable to path traversal attacks. A remote unauthenticated attacker could leverage that to perform arbitrary code execution.

  (Jan 18)
 

Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.59, which includes additional changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for


  Fedora 27: clamav Security Update (Jan 25)
 

Fixes some regressions of previous versions ---- Security fixes CVE-2017-6420 (#1483910), CVE-2017-6418 (#1483908) ---- - Fix bugs 1126595,1464269,1126625 and 1258536, - Update of main.cvd, daily.cvd and bytecode.cvd ---- - Fixes for rhbz 1530678 and 1518016

  Fedora 27: firefox Security Update (Jan 25)
 

- Update to latest version - Firefox 58.0

  Fedora 27: bind-dyndb-ldap Security Update (Jan 23)
 

Upgrades to latest minor supported BIND. Includes first -P1 security release fixing CVE-2017-3145.

  Fedora 27: dnsperf Security Update (Jan 23)
 

Upgrades to latest minor supported BIND. Includes first -P1 security release fixing CVE-2017-3145.

  Fedora 27: bind Security Update (Jan 23)
 

Upgrades to latest minor supported BIND. Includes first -P1 security release fixing CVE-2017-3145.

  Fedora 27: kernel Security Update (Jan 23)
 

The 4.14.14 stable update contains a number of important fixes across the tree. This update also includes some PPC mitigations, and has been built with a retpoline capable compiler for improved Spectre mitigation on x86_64.

  Fedora 27: libtasn1 Security Update (Jan 23)
 

Update to 4.13 (#1535261)

  Fedora 27: libvpx Security Update (Jan 23)
 

fix for CVE-2017-13194

  Fedora 27: glibc Security Update (Jan 23)
 

This update addresses two security vulnerabilities: * CVE-2017-16997: Check for empty tokens before dynamic string token expansion in the dynamic linker, so that pre-existing privileged programs with `$ORIGIN` rpaths/runpaths do not cause the dynamic linker to search the current directory, potentially leading to privilege escalation. (RHBZ#1526866). * CVE-2018-1000001: `getcwd` would

  Fedora 27: ruby Security Update (Jan 23)
 

Update to Ruby 2.4.3.

  Fedora 27: sox Security Update (Jan 23)
 

Security fix for **CVE-2017-15370** and **CVE-2017-15371**

  Fedora 27: python-bottle Security Update (Jan 23)
 

Update to 0.12.13

  Fedora 26: glibc Security Update (Jan 23)
 

This update addresses two security vulnerabilities: * CVE-2017-15670, CVE-2017-15671, CVE-2017-15804: Various vulnerabilities could lead to memory corruption in the `glob` and `glob64` function. (RHBZ#1505298, RHBZ##1504807) * CVE-2017-16997: Check for empty tokens before dynamic string token expansion in the dynamic linker, so that pre-existing privileged programs with `$ORIGIN`

  Fedora 26: kernel Security Update (Jan 23)
 

The 4.14.14 stable update contains a number of important fixes across the tree. This update also includes some PPC mitigations, and has been built with a retpoline capable compiler for improved Spectre mitigation on x86_64.

  Fedora 26: python-bottle Security Update (Jan 23)
 

Update to 0.12.13

  Fedora 26: mariadb Security Update (Jan 23)
 

**Update to 10.1.30** sysusers and tmpfiles added by upstream **Release notes:** https://mariadb.com/kb/en/mariadb-10130-release-notes/ **CVE's fixed:** CVE-2017-15365

  Fedora 26: sox Security Update (Jan 23)
 

Security fix for **CVE-2017-15370** and **CVE-2017-15371**

  Fedora 27: keycloak-httpd-client-install Security Update (Jan 18)
 

Security fix for CVE-2017-15111, CVE-2017-15112 Two minor security issues were discovered and were assigned CVE's. CVE-2017-15112 concerns the ability to pass a password on the command line where it could be exposed. That option has been deprecated. See the man page for multiple ways to pass the password. CVE-2017-15111 corrects the default location of a log file when running the low

  Fedora 27: rootsh Security Update (Jan 18)
 

Fix permissions on rootsh log directory to limit it to root.

  Fedora 26: rootsh Security Update (Jan 18)
 

Fix permissions on rootsh log directory to limit it to root.

  Fedora 27: icecat Security Update (Jan 18)
 

- Update to 52.5.3 - Patched for mozilla bug-1427870 (spectre mitigation)

  Fedora 27: transmission Security Update (Jan 18)
 

Security fix for CVE-2018-5702 (Mitigate dns rebinding attacks against daemon)


  (Jan 25)
 

An update for nautilus is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  (Jan 25)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 25)
 

An update for kernel-rt is now available for Red Hat Enterprise MRG 2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  (Jan 25)
 

An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  (Jan 25)
 

An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  (Jan 25)
 

An update for dhcp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  (Jan 25)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  (Jan 25)
 

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  (Jan 25)
 

An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  (Jan 24)
 

An update for firefox is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  (Jan 23)
 

An update for rh-eclipse46-jackson-databind is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for java-1.6.0-sun is now available for Oracle Java for Red Hat Enterprise Linux 6 and Oracle Java for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for libvirt is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support. Red Hat Product Security has rated this update as having a security impact

  (Jan 22)
 

An update for libvirt is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support. Red Hat Product Security has rated this update as having a security impact

  (Jan 22)
 

An update for libvirt is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for libvirt is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for libvirt is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 22)
 

An update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  (Jan 22)
 

An update for bind is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  (Jan 18)
 

An update for java-1.7.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6 and Oracle Java for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  (Jan 18)
 

An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6 and Oracle Java for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which


  Slackware: 2018-025-01: mozilla-thunderbird Security Update (Jan 26)
 

New mozilla-thunderbird packages are available for Slackware 14.2 and -current to fix security issues.

  Slackware: 2018-024-01: curl Security Update (Jan 25)
 

New curl packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.


  SUSE: 2018:0233-1: important: the Linux Kernel (Live Patch 30 for SLE 12) (Jan 26)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2018:0229-1: important: newsbeuter (Jan 26)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2018:0223-1: important: mysql-community-server (Jan 26)
 

An update that fixes 15 vulnerabilities is now available.

  SUSE: 2018:0219-1: important: webkit2gtk3 (Jan 25)
 

An update that fixes 89 vulnerabilities is now available.

  SUSE: 2018:0213-1: important: the Linux Kernel (Jan 25)
 

An update that solves 22 vulnerabilities and has 72 fixes is now available.

  openSUSE: 2018:0203-1: important: MozillaFirefox (Jan 25)
 

An update that fixes 11 vulnerabilities is now available.

  openSUSE: 2018:0187-1: important: virtualbox (Jan 24)
 

An update that fixes 11 vulnerabilities is now available.

  SUSE: 2018:0180-1: important: the Linux Kernel (Jan 23)
 

An update that solves 26 vulnerabilities and has 24 fixes is now available.

  SUSE: 2018:0170-1: important: perl-XML-LibXML (Jan 22)
 

An update that fixes one vulnerability is now available.

  SUSE: 2018:0171-1: important: the Linux Kernel (Jan 22)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2018:0166-1: important: newsbeuter (Jan 20)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2018:0158-1: important: xmltooling (Jan 20)
 

An update that fixes one vulnerability is now available.

  SUSE: 2018:0140-1: important: xmltooling (Jan 19)
 

An update that fixes one vulnerability is now available.

  SUSE: 2018:0131-1: important: the Linux Kernel (Jan 18)
 

An update that fixes two vulnerabilities is now available.


  (Jan 26)
 

The system could be made to crash or run programs as an administrator.

  (Jan 26)
 

The system could be made to crash or run programs as an administrator.

  (Jan 25)
 

Several security issues were fixed in Libtasn1.

  (Jan 25)
 

Several security issues were fixed in MySQL.

  (Jan 23)
 

Several security issues were addressed in the Linux kernel.

  (Jan 23)
 

Several security issues were addressed in the Linux kernel.

  (Jan 23)
 

Several security issues were addressed in the Linux kernel.

  (Jan 23)
 

Several security issues were addressed in the Linux kernel.

  (Jan 23)
 

Several security issues were addressed in the Linux kernel.

  (Jan 23)
 

Several security issues were addressed in the Linux kernel.

  (Jan 22)
 

Several security issues were fixed in GIMP.


  (Jan 18)
 

The package bind before version 9.11.2.P1-1 is vulnerable to denial of service.

  (Jan 18)
 

The package perl-xml-libxml before version 2.0130-1 is vulnerable to arbitrary code execution.

  (Jan 18)
 

The package transmission-cli before version 2.92-8 is vulnerable to arbitrary command execution.

  (Jan 18)
 

The package nrpe before version 3.2.1-3 is vulnerable to arbitrary command execution.

  (Jan 18)
 

The package irssi before version 1.0.6-1 is vulnerable to denial of service.


  (Jan 25)
 

An integer overflow vulnerability in ip6_find_1stfragopt() function was found. A local attacker that has privileges (of CAP_NET_RAW) to open raw socket can cause an infinite loop inside the ip6_find_1stfragopt() function. (CVE-2017-7542, Moderate) * The IPv6 fragmentation implementation in the Linux kernel does not consider that the nexthdr field may be associated with an invalid option, whic [More...]

  (Jan 25)
 

It was found that the DHCP daemon did not properly clean up closed OMAPI connections in certain cases. A remote attacker able to connect to the OMAPI port could use this flaw to exhaust file descriptors in the DHCP daemon, leading to a denial of service in the OMAPI functionality. (CVE-2017-3144) SL7 x86_64 dhclient-4.2.5-58.el7_4.1.x86_64.rpm dhcp-common-4.2.5-58.el7_4.1.x86_64.rpm [More...]

  (Jan 25)
 

An untrusted .desktop file with executable permission set could choose its displayed name and icon, and execute commands without warning when opened by the user. An attacker could use this flaw to trick a user into opening a .desktop file disguised as a document, such as a PDF, and execute arbitrary commands. (CVE-2017-14604) Note: This update will change the behavior of Nautilus. Nautilus wi [More...]

  (Jan 25)
 

A stack buffer overflow flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2017-15134) Bug Fix(es): * Previously, when a connection received a high operation rate, Directory Server stopped to poll the [More...]

  (Jan 25)
 

An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel [More...]

  (Jan 24)
 

This update upgrades Firefox to version 52.6.0 ESR. * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2018-5089, CVE-2018-5091, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018- [More...]

  (Jan 22)
 

A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3145) SL6 x86_64 bind-debuginfo-9.8.2-0. [More...]

  (Jan 22)
 

A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3145) SL7 x86_64 bind-debuginfo-9.9.4-51 [More...]


  (Jan 25)
 

Several security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, use-after-frees and other implementation errors may lead to the execution of arbitrary code or denial of service.

  (Jan 21)
 

Jayachandran Palanisamy of Cygate AB reported that BIND, a DNS server implementation, was improperly sequencing cleanup operations, leading in some cases to a use-after-free error, triggering an assertion failure

  (Jan 21)
 

Michael Stepankin and Olga Barinova discovered a remote code execution vulnerability in Apache Solr by exploiting XML External Entity processing (XXE) in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. To resolve this

  (Jan 21)
 

OpenOCD, an on-chip JTAG debug solution for ARM and MIPS systems, does not block attempts to use HTTP POST for sending data to localhost, which allows remote attackers to conduct cross-protocol scripting attacks, and consequently execute arbitrary commands, via a crafted web site.

  (Jan 21)
 

CVE-2017-12635 Prevent non-admin users to give themselves admin privileges.

  (Jan 20)
 

It was discovered that PHP5 was vulnerable to a reflected cross-site scripting (XSS) attack on the PHAR 404 error page by manipulating the URI of a request for a .phar file. This issue is only exploitable if the web server is configured to handle phar files using PHP5.

  (Jan 19)
 

Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.59, which includes additional changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for

  (Jan 19)
 

It was discovered that there was a code-injection vulnerability in smarty3, a PHP template engine. A via specially-crafted filename in comments could result in arbitray code

  (Jan 19)
 

It was discovered that there was a denial-of-service attack in the libgd2 image library. A corrupt file could have exploited a signedness confusion leading to an infinite loop.

  (Jan 19)
 

It was discovered that there was an injection vulnerability in the rsync file-copying tool. For Debian 7 "Wheezy", this issue has been fixed in rsync version

  (Jan 18)
 

Tavis Ormandy discovered a vulnerability in the Transmission BitTorrent client; insecure RPC handling between the Transmission daemon and the client interface(s) may result in the execution of arbitrary code if a user visits a malicious website while Transmission is running.


  (Jan 26)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0223

  (Jan 26)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0151

  (Jan 26)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0158

  (Jan 26)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0163

  (Jan 25)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0122

  (Jan 25)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0122

  (Jan 22)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0102

  (Jan 22)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0101

  (Jan 18)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0095

  (Jan 18)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2018:0095