Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Open-Source AI Projects For Linux - It seems like artificial intelligence (AI) has made its way into nearly every facet of modern life. Programs like the Amazon Alexa, Apples Siri and Microsofts Cortana are used by millions of people around the world. By the year 2022, over 50 percent of the online searches performed will be done with AI and the power of the human voice.

Five Open-Source Projects AI Enthusiasts Might Want to Know About - Linux is arguably software developers favorite OS. Over 14,000 contributors have invested countless hours in developing the Linux Kernel. With Linux becoming increasingly popular due to its security and flexibility, developers who are interested in artificial intelligence (AI) may want to explore the possibilities within the Linux environment.


  Debian: DSA-4650-1: qbittorrent security update (Apr 2)
 

Miguel Onoro reported that qbittorrent, a bittorrent client with a Qt5 GUI user interface, allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, which could result in remote command execution via a crafted name within an RSS feed

  Debian: DSA-4651-1: mediawiki security update (Apr 2)
 

It was discovered that some user-generated CSS selectors in MediaWiki, a website engine for collaborative work, were not escaped. The oldstable distribution (stretch) is not affected.

  Debian: DSA-4649-1: haproxy security update (Apr 2)
 

Felix Wilhelm of Google Project Zero discovered that HAProxy, a TCP/HTTP reverse proxy, did not properly handle HTTP/2 headers. This would allow an attacker to write arbitrary bytes around a certain location on the heap, resulting in denial-of-service or potential arbitrary code

  Debian: DSA-4648-1: libpam-krb5 security update (Mar 31)
 

Russ Allbery discovered a buffer overflow in the PAM module for MIT Kerberos, which could result in denial of service or potentially the execution of arbitrary code.

  Debian: DSA-4647-1: bluez security update (Mar 26)
 

It was reported that the BlueZ's HID and HOGP profile implementations don't specifically require bonding between the device and the host. Malicious devices can take advantage of this flaw to connect to a target host and impersonate an existing HID device without security or to cause


  Fedora 31: tomcat FEDORA-2020-04ac174fa9 (Apr 2)
 

This update includes a rebase from 9.0.30 up to 9.0.31 which resolves one CVE along with various other bugs/features: * rhbz#1806805 CVE-2020-1938 tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability * rhbz#1801729 tomcat-9.0.31 is available **WARNING** - This update does *not* enforce the change in defaults for the AJP Connector like the upstream fix does. This is

  Fedora 30: tomcat FEDORA-2020-c870aa8378 (Apr 2)
 

This update includes a rebase from 9.0.30 up to 9.0.31 which resolves one CVE along with various other bugs/features: * rhbz#1806805 CVE-2020-1938 tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability * rhbz#1801729 tomcat-9.0.31 is available **WARNING** - This update does *not* enforce the change in defaults for the AJP Connector like the upstream fix does. This is

  Fedora 32: telnet FEDORA-2020-11ea78ff8e (Apr 1)
 

Security fix for CVE-2020-10188

  Fedora 32: coturn FEDORA-2020-6efa0fc869 (Apr 1)
 

* An exploitable heap overflow vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. * An exploitable denial-of-service vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to server crash and denial of

  Fedora 32: phpMyAdmin FEDORA-2020-e60ce63865 (Apr 1)
 

The **phpMyAdmin** team announces the release of both **4.9.5** and **5.0.2**. Both versions contain several security fixes: * PMASA-2020-2 SQL injection vulnerability in the user accounts page, particularly when changing a password * PMASA-2020-3 SQL injection vulnerability relating to the search feature * PMASA-2020-4 SQL injection and XSS having to do with displaying results *

  Fedora 32: cyrus-sasl FEDORA-2020-51d591d035 (Apr 1)
 

Security fix for CVE-2019-19906

  Fedora 30: coturn FEDORA-2020-f3fcb1608a (Mar 31)
 

* An exploitable heap overflow vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. * An exploitable denial-of-service vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to server crash and denial of

  Fedora 30: phpMyAdmin FEDORA-2020-25f3aea389 (Mar 31)
 

The **phpMyAdmin** team announces the release of both **4.9.5** and **5.0.2**. Both versions contain several security fixes: * PMASA-2020-2 SQL injection vulnerability in the user accounts page, particularly when changing a password * PMASA-2020-3 SQL injection vulnerability relating to the search feature * PMASA-2020-4 SQL injection and XSS having to do with displaying results *

  Fedora 30: libarchive FEDORA-2019-71b2273a9f (Mar 31)
 

Security fix for CVE-2019-18408 RAR reader: fix use after free If read_data_compressed() returns ARCHIVE_FAILED, the caller is allowed to continue with next archive headers. We need to set rar->start_new_table after the ppmd7_context got freed, otherwise it won't be allocated again.

  Fedora 31: coturn FEDORA-2020-305c173af8 (Mar 31)
 

* An exploitable heap overflow vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. * An exploitable denial-of-service vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to server crash and denial of

  Fedora 31: phpMyAdmin FEDORA-2020-d7b0a5a84a (Mar 31)
 

The **phpMyAdmin** team announces the release of both **4.9.5** and **5.0.2**. Both versions contain several security fixes: * PMASA-2020-2 SQL injection vulnerability in the user accounts page, particularly when changing a password * PMASA-2020-3 SQL injection vulnerability relating to the search feature * PMASA-2020-4 SQL injection and XSS having to do with displaying results *

  Fedora 30: okular FEDORA-2020-e35573f7df (Mar 30)
 

Security fix for CVE-2020-9359

  Fedora 32: glibc FEDORA-2020-444c372453 (Mar 30)
 

This update incorporates fixes from the upstream glibc 2.31 stable release branch, including 2 fixes for medium severity security vulnerabilities. (CVE-2020-10029, CVE-2020-1752)

  Fedora 32: okular FEDORA-2020-dcde488e68 (Mar 30)
 

Security fix for CVE-2020-9359

  Fedora 32: java-11-openjdk FEDORA-2020-07624ddb99 (Mar 30)
 

Update to January 2020 CPU. See: http://mail.openjdk.java.net/pipermail/jdk-updates-dev/2020-January/002374.html

  Fedora 32: tomcat FEDORA-2020-0e42878ba7 (Mar 30)
 

This update includes a rebase from 9.0.30 up to 9.0.31 which resolves one CVE along with various other bugs/features: * rhbz#1806805 CVE-2020-1938 tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability * rhbz#1801729 tomcat-9.0.31 is available **WARNING** - This update does *not* enforce the change in defaults for the AJP Connector like the upstream fix does. This is

  Fedora 31: libmodsecurity FEDORA-2020-dc9aee5510 (Mar 29)
 

Fix DoS vulnerability (CVE-2019-19886, RHBZ #1801720 / #1801719)

  Fedora 30: libmodsecurity FEDORA-2020-f7ba0ac7a4 (Mar 29)
 

Fix DoS vulnerability (CVE-2019-19886, RHBZ #1801720 / #1801719)

  Fedora 32: libmodsecurity FEDORA-2020-1b5b3b465d (Mar 29)
 

Fix DoS vulnerability (CVE-2019-19886, RHBZ #1801720 / #1801719)

  Fedora 32: weechat FEDORA-2020-d242130019 (Mar 29)
 

New version, fixes a lot of bugs (some of them security). In the same update, fixed up epel7 build to latest version as well.

  Fedora 30: dcraw FEDORA-2020-545493aa4b (Mar 28)
 

Fix CVE-2018-19655

  Fedora 31: dcraw FEDORA-2020-19c7f8e25f (Mar 28)
 

Fix CVE-2018-19655

  Fedora 32: dcraw FEDORA-2020-ef1ff20b59 (Mar 28)
 

Fix CVE-2018-19655

  Fedora 32: PyYAML FEDORA-2020-e9741a6a15 (Mar 28)
 

* New upstream release 5.3.1 (rhbz#1814882) * Fixes CVE-2020-1747 (rhbz#1807367,1809011)

  Fedora 31: kernel FEDORA-2020-76966b3419 (Mar 27)
 

The 5.5.11 stable kernel update contains a number of important fixes across the tree.

  Fedora 31: PyYAML FEDORA-2020-bdb0bfa928 (Mar 27)
 

* New upstream release 5.3.1 (rhbz#1814882) * Fixes CVE-2020-1747 (rhbz#1807367,1809011)

  Fedora 30: chromium FEDORA-2020-39e0b8bd14 (Mar 27)
 

Update to 80.0.3987.149. Upstream says it fixes "13" security issues, but only lists these CVEs: * CVE-2020-6422: Use after free in WebGL * CVE-2020-6424: Use after free in media * CVE-2020-6425: Insufficient policy enforcement in extensions. * CVE-2020-6426: Inappropriate implementation in V8 * CVE-2020-6427: Use after free in audio * CVE-2020-6428: Use after free in audio

  Fedora 30: PyYAML FEDORA-2020-40c35d7b37 (Mar 27)
 

* New upstream release 5.3.1 (rhbz#1814882) * Fixes CVE-2020-1747 (rhbz#1807367,1809011)

  Fedora 32: chromium FEDORA-2020-17149a4f3d (Mar 27)
 

Update to 80.0.3987.149. Upstream says it fixes "13" security issues, but only lists these CVEs: * CVE-2020-6422: Use after free in WebGL * CVE-2020-6424: Use after free in media * CVE-2020-6425: Insufficient policy enforcement in extensions. * CVE-2020-6426: Inappropriate implementation in V8 * CVE-2020-6427: Use after free in audio * CVE-2020-6428: Use after free in audio

  Fedora 30: php FEDORA-2020-ce5a2a7403 (Mar 26)
 

**PHP version 7.3.16** (19 Mar 2020) **Core:** * Fixed bug php#63206 (restore_error_handler does not restore previous errors mask). (Mark Plomer) **DOM:** * Fixed bug php#77569: (Write Access Violation in DomImplementation). (Nikita, cmb) * Fixed bug php#79271 (DOMDocumentType::$childNodes is NULL). (cmb) **Enchant:** * Fixed bug php#79311 (enchant_dict_suggest() fails on big

  Fedora 30: libxslt FEDORA-2020-40fa1ae94b (Mar 26)
 

Security and performance fixes.


  Gentoo: GLSA-202004-06: GnuTLS: DTLS protocol regression (Apr 2)
 

A regression in GnuTLS breaks the security guarantees of the DTLS protocol.

  Gentoo: GLSA-202004-05: ledger: Multiple vulnerabilities (Apr 1)
 

Multiple vulnerabilities have been found in ledger, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202004-04: Qt WebEngine: Arbitrary code execution (Apr 1)
 

A heap use-after-free flaw in Qt WebEngine at worst might allow an attacker to execute arbitrary code.

  Gentoo: GLSA-202004-03: GPL Ghostscript: Multiple vulnerabilities (Apr 1)
 

Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in the execution of arbitrary code.

  Gentoo: GLSA-202004-02: VirtualBox: Multiple vulnerabilities (Apr 1)
 

Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox.

  Gentoo: GLSA-202004-01: HAProxy: Remote execution of arbitrary code (Apr 1)
 

A vulnerability in HAProxy might lead to remote execution of arbitrary code.

  Gentoo: GLSA-202003-66: QEMU: Multiple vulnerabilities (Mar 30)
 

Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202003-65: FFmpeg: Multiple vulnerabilities (Mar 30)
 

Multiple vulnerabilities have been found in FFmpeg, the worst of which allows remote attackers to execute arbitrary code.

  Gentoo: GLSA-202003-64: libxls: Multiple vulnerabilities (Mar 30)
 

Multiple vulnerabilities have been found in libxls, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202003-63: GNU IDN Library 2: Multiple vulnerabilities (Mar 30)
 

Multiple vulnerabilities have been found in GNU IDN Library 2, the worst of which could result in the remote execution of arbitrary code.

  Gentoo: GLSA-202003-62: GNU Screen: Buffer overflow (Mar 30)
 

A buffer overflow in GNU Screen might allow remote attackers to corrupt memory.

  Gentoo: GLSA-202003-61: Adobe Flash Player: Remote execution of arbitrary code (Mar 26)
 

A vulnerability in Adobe Flash Player might allow remote attackers to execute arbitrary code.

  Gentoo: GLSA-202003-60: QtCore: Multiple vulnerabilities (Mar 26)
 

Multiple vulnerabilities have been found in QtCore, the worst of which could result in the execution of arbitrary code.

  Gentoo: GLSA-202003-59: libvpx: User-assisted execution of arbitrary code (Mar 26)
 

Multiple vulnerabilities have been found in libvpx, the worst of which could result in the execution of arbitrary code.

  Gentoo: GLSA-202003-58: UnZip: User-assisted execution of arbitrary code (Mar 26)
 

Multiple vulnerabilities have been found in UnZip, the worst of which could result in the execution of arbitrary code.

  Gentoo: GLSA-202003-57: PHP: Multiple vulnerabilities (Mar 26)
 

Multiple vulnerabilities have been found in PHP, the worst of which could result in the execution of arbitrary shell commands.


  RedHat: RHSA-2020-1308:01 Low: Red Hat Virtualization Engine security, (Apr 2)
 

An update is now available for Red Hat Virtualization Engine 4.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1288:01 Critical: haproxy security update (Apr 2)
 

An update for haproxy is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1290:01 Critical: rh-haproxy18-haproxy security update (Apr 2)
 

An update for rh-haproxy18-haproxy is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1289:01 Critical: haproxy security update (Apr 2)
 

An update for haproxy is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1300:01 Important: qemu-kvm-rhev security update (Apr 2)
 

An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 10.0 (Newton). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1296:01 Important: qemu-kvm-rhev security update (Apr 2)
 

An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 13.0 (Queens). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1293:01 Important: nodejs:12 security update (Apr 2)
 

An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1292:01 Important: qemu-kvm-rhev security update (Apr 2)
 

An update for qemu-kvm-rhev is now available for Red Hat Virtualization for Red Hat Virtualization Host 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0933:01 Moderate: OpenShift Container Platform 4.3.9 (Apr 1)
 

An update for ose-openshift-apiserver-container is now available for Red Hat OpenShift Container Platform 4.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0934:01 Moderate: OpenShift Container Platform 4.3.9 (Apr 1)
 

An update for ose-openshift-controller-manager-container is now available for Red Hat OpenShift Container Platform 4.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1270:01 Important: chromium-browser security update (Apr 1)
 

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1269:01 Important: idm:DL1 security update (Apr 1)
 

An update for the idm:DL1 module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1267:01 Important: nss-softokn security update (Apr 1)
 

An update for nss-softokn is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1264:01 Moderate: systemd security and bug fix update (Apr 1)
 

An update for systemd is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1266:01 Important: kernel security and bug fix update (Apr 1)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1268:01 Moderate: python security update (Apr 1)
 

An update for python is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1265:01 Moderate: procps-ng security update (Apr 1)
 

An update for procps-ng is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1261:01 Important: virt:8.1 security update (Apr 1)
 

An update for the virt:8.1 module is now available for Advanced Virtualization for RHEL 8.1.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1226:01 Moderate: dpdk security, bug fix, (Mar 31)
 

An update for dpdk is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1227:01 Moderate: podman security, bug fix, (Mar 31)
 

An update for podman is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1234:01 Moderate: docker security and bug fix update (Mar 31)
 

An update for docker is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1231:01 Moderate: buildah security and bug fix update (Mar 31)
 

An update for buildah is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1230:01 Moderate: skopeo security and bug fix update (Mar 31)
 

An update for skopeo is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1208:01 Important: qemu-kvm security update (Mar 31)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-1209:01 Important: qemu-kvm-ma security update (Mar 31)
 

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-1091:01 Moderate: python-twisted-web security update (Mar 31)
 

An update for python-twisted-web is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1190:01 Moderate: libxml2 security update (Mar 31)
 

An update for libxml2 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1180:01 Moderate: ImageMagick security, bug fix, (Mar 31)
 

An update for ImageMagick, autotrace, emacs, and inkscape is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1132:01 Moderate: python3 security update (Mar 31)
 

An update for python3 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1113:01 Moderate: bash security update (Mar 31)
 

An update for bash is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1135:01 Low: polkit security and bug fix update (Mar 31)
 

An update for polkit is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1074:01 Moderate: poppler and evince security update (Mar 31)
 

An update for poppler and evince is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1176:01 Low: avahi security update (Mar 31)
 

An update for avahi is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1101:01 Low: bluez security update (Mar 31)
 

An update for bluez is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1167:01 Low: nbdkit security and bug fix update (Mar 31)
 

An update for nbdkit is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1116:01 Important: qemu-kvm security, bug fix, (Mar 31)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-1121:01 Moderate: httpd security, bug fix, (Mar 31)
 

An update for httpd is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1131:01 Moderate: python security update (Mar 31)
 

An update for python is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1068:01 Moderate: squid security and bug fix update (Mar 31)
 

An update for squid is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1178:01 Moderate: zziplib security update (Mar 31)
 

An update for zziplib is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1047:01 Moderate: wireshark security and bug fix update (Mar 31)
 

An update for wireshark is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1062:01 Moderate: dovecot security and bug fix update (Mar 31)
 

An update for dovecot is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1036:01 Moderate: texlive security update (Mar 31)
 

An update for texlive is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1150:01 Important: qemu-kvm-ma security update (Mar 31)
 

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-1051:01 Low: libosinfo security and bug fix update (Mar 31)
 

An update for libosinfo is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1173:01 Moderate: okular security update (Mar 31)
 

An update for okular is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1181:01 Low: unzip security update (Mar 31)
 

An update for unzip is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1050:01 Moderate: cups security and bug fix update (Mar 31)
 

An update for cups is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1189:01 Moderate: libqb security update (Mar 31)
 

An update for libqb is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1172:01 Moderate: qt security update (Mar 31)
 

An update for qt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1112:01 Moderate: php security update (Mar 31)
 

An update for php is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1054:01 Moderate: mailman security and bug fix update (Mar 31)
 

An update for mailman is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1070:01 Moderate: kernel-rt security and bug fix update (Mar 31)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1175:01 Low: taglib security update (Mar 31)
 

An update for taglib is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1037:01 Moderate: advancecomp security update (Mar 31)
 

An update for advancecomp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1151:01 Moderate: libreoffice security and bug fix update (Mar 31)
 

An update for libreoffice is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1138:01 Low: gettext security and bug fix update (Mar 31)
 

An update for gettext is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1084:01 Moderate: samba security, bug fix, (Mar 31)
 

An update for samba is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1126:01 Moderate: mutt security update (Mar 31)
 

An update for mutt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1045:01 Moderate: lftp security update (Mar 31)
 

An update for lftp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1081:01 Moderate: net-snmp security and bug fix update (Mar 31)
 

An update for net-snmp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1185:01 Moderate: libsndfile security update (Mar 31)
 

An update for libsndfile is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1100:01 Moderate: mariadb security and bug fix update (Mar 31)
 

An update for mariadb is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1061:01 Moderate: bind security and bug fix update (Mar 31)
 

An update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1080:01 Moderate: evolution security and bug fix update (Mar 31)
 

An update for evolution, evolution-data-server, evolution-ews, and atk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1034:01 Low: doxygen security and bug fix update (Mar 31)
 

An update for doxygen is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1021:01 Moderate: GNOME security, bug fix, (Mar 31)
 

An update for GNOME is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1011:01 Moderate: expat security update (Mar 31)
 

An update for expat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1020:01 Low: curl security and bug fix update (Mar 31)
 

An update for curl is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1003:01 Moderate: mod_auth_mellon security and bug fix (Mar 31)
 

An update for mod_auth_mellon is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1016:01 Moderate: kernel security, bug fix, (Mar 31)
 

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1022:01 Low: file security update (Mar 31)
 

An update for file is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1000:01 Moderate: rsyslog security, bug fix, (Mar 31)
 

An update for rsyslog is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1216:01 Important: qemu-kvm-rhev security, bug fix, (Mar 31)
 

An update for qemu-kvm-rhev is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization Engine 4.3. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0984:01 Important: ipmitool security update (Mar 26)
 

An update for ipmitool is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0983:01 Important: Red Hat Fuse 7.6.0 security update (Mar 26)
 

A minor version update (from 7.5 to 7.6) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2020-0981:01 Important: ipmitool security update (Mar 26)
 

An update for ipmitool is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0980:01 Moderate: rh-postgresql10-postgresql security (Mar 26)
 

An update for rh-postgresql10-postgresql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0979:01 Important: ipmitool security update (Mar 26)
 

An update for ipmitool is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0978:01 Important: zsh security update (Mar 26)
 

An update for zsh is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0830:01 Moderate: OpenShift Container Platform 4.2 (Mar 26)
 

An update for openshift-enterprise-mediawiki-container is now available for Red Hat OpenShift Container Platform 4.2. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which


  Slackware: 2020-091-02: httpd Security Update (Mar 31)
 

New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

  Slackware: 2020-091-01: gnutls Security Update (Mar 31)
 

New gnutls packages are available for Slackware 14.2 and -current to fix a security issue.

  Slackware: 2020-086-01: Slackware 14.2 kernel Security Update (Mar 26)
 

New kernel packages are available for Slackware 14.2 to fix security issues.


  SUSE: 2020:0868-1 important: the Linux Kernel (Live Patch 37 for SLE 12 SP1) (Apr 3)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:0891-1 important: the Linux Kernel (Live Patch 3 for SLE 12 SP5) (Apr 3)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0860-1 moderate: exiv2 (Apr 3)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2020:0856-1 moderate: SUSE Manager Server 3.2 (Apr 2)
 

An update that solves two vulnerabilities and has 15 fixes is now available.

  SUSE: 2020:0852-1 important: haproxy (Apr 2)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0853-1 moderate: mgetty (Apr 2)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0854-1 moderate: python3 (Apr 2)
 

An update that solves three vulnerabilities and has two fixes is now available.

  SUSE: 2020:0851-1 important: haproxy (Apr 2)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0845-1 important: qemu (Apr 1)
 

An update that solves 6 vulnerabilities and has 6 fixes is now available.

  SUSE: 2020:0843-1 moderate: memcached (Apr 1)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:0844-1 important: qemu (Apr 1)
 

An update that solves 6 vulnerabilities and has two fixes is now available.

  SUSE: 2020:0836-1 important: the Linux Kernel (Mar 31)
 

An update that solves 5 vulnerabilities and has 58 fixes is now available.

  SUSE: 2020:0836-1 important: the Linux Kernel (Mar 31)
 

An update that solves 5 vulnerabilities and has 58 fixes is now available.

  SUSE: 2020:0832-1 important: glibc (Mar 31)
 

An update that solves three vulnerabilities and has two fixes is now available.

  SUSE: 2020:0831-1 important: mariadb (Mar 31)
 

An update that fixes 9 vulnerabilities is now available.

  SUSE: 2020:0819-1 important: icu (Mar 31)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0820-1 important: glibc (Mar 31)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0818-1 moderate: cloud-init (Mar 31)
 

An update that solves two vulnerabilities and has one errata is now available.

  SUSE: 2020:0813-1 important: spamassassin (Mar 30)
 

An update that solves three vulnerabilities and has one errata is now available.

  SUSE: 2020:0811-1 important: spamassassin (Mar 30)
 

An update that solves three vulnerabilities and has one errata is now available.

  SUSE: 2020:0810-1 important: spamassassin (Mar 30)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2020:0806-1 important: tomcat (Mar 27)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:14334-1 important: tomcat6 (Mar 27)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0801-1 moderate: ldns (Mar 26)
 

An update that fixes two vulnerabilities is now available.


  Ubuntu 4316-2: GD Graphics Library vulnerabilities (Apr 2)
 

Several security issues were fixed in GD Graphics Library.

  Ubuntu 4316-1: GD Graphics Library vulnerabilities (Apr 2)
 

Several security issues were fixed in GD Graphics Library.

  Ubuntu 4315-1: Apport vulnerabilities (Apr 2)
 

Several security issues were fixed in Apport.

  Ubuntu 4314-1: pam-krb5 vulnerability (Mar 31)
 

pam-krb5 could be made to execute arbitrary code if it received a specially crafted response.

  Ubuntu 4311-1: BlueZ vulnerabilities (Mar 30)
 

Several security issues were fixed in BlueZ.

  Ubuntu 4313-1: Linux kernel vulnerability (Mar 30)
 

The system could be made to expose sensitive information or run programs as an administrator.

  Ubuntu 4312-1: Timeshift vulnerability (Mar 30)
 

Timeshift could be made to run programs as an administrator.

  Ubuntu 4310-1: WebKitGTK+ vulnerability (Mar 30)
 

Several security issues were fixed in WebKitGTK+.

  Ubuntu 4308-2: Twisted vulnerabilities (Mar 30)
 

Several security issues were fixed in Twisted.


  Debian LTS: DLA-2168-1: libplist security update (Apr 2)
 

libplist is a library for reading and writing the Apple binary and XML property lists format. It's part of the libimobiledevice stack, providing access to iDevices (iPod, iPhone, iPad ...).

  Debian LTS: DLA-2166-1: libpam-krb5 security update (Apr 1)
 

The krb5 PAM module (pam_krb5.so) had a buffer overflow that might have caused remote code execution in situations involving supplemental prompting by a Kerberos library.

  Debian LTS: DLA-2167-1: python-bleach security update (Apr 1)
 

A vulnerability was discovered in python-bleach, a whitelist-based HTML-sanitizing library. Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to a regular expression denial

  Debian LTS: DLA-2165-1: apng2gif security update (Mar 31)
 

An issue has been found in apng2gif, a tool for converting APNG images to animated GIF format.

  Debian LTS: DLA-2164-1: gst-plugins-bad0.10 security update (Mar 31)
 

Several issues have been found in gst-plugins-bad0.10, a package containing GStreamer plugins from the "bad" set.

  Debian LTS: DLA-2163-1: tinyproxy security update (Mar 31)
 

A minor security issue and a severe packaging bug have been fixed in tinyproxy, a lightweight http proxy daemon.

  Debian LTS: DLA-2162-1: php-horde-form security update (Mar 29)
 

A remote code execution vulnerability was discovered in the Form API component of the Horde Application Framework. An authenticated remote attacker could use this flaw to upload arbitrary content to an arbitrary

  Debian LTS: DLA-2161-1: tika security update (Mar 28)
 

Two security issues have been detected in tika and fixed. CVE-2020-1950:

  Debian LTS: DLA-2160-1: php5 security update (Mar 26)
 

Two security issues have been identified and fixed in php5, a server-side, HTML-embedded scripting language.


  ArchLinux: 202004-5: pam-krb5: arbitrary code execution (Apr 1)
 

The package pam-krb5 before version 4.9-1 is vulnerable to arbitrary code execution.

  ArchLinux: 202004-4: linux: privilege escalation (Apr 1)
 

The package linux before version 5.5.13.arch2-1 is vulnerable to privilege escalation.

  ArchLinux: 202004-3: linux-lts: privilege escalation (Apr 1)
 

The package linux-lts before version 5.4.28-2 is vulnerable to privilege escalation.

  ArchLinux: 202004-2: linux-hardened: privilege escalation (Apr 1)
 

The package linux-hardened before version 5.5.13.b-1 is vulnerable to privilege escalation.

  ArchLinux: 202004-1: chromium: arbitrary code execution (Apr 1)
 

The package chromium before version 80.0.3987.162-1 is vulnerable to arbitrary code execution.


  SciLinux: SLSA-2020-0984-1 Important: ipmitool on SL7.x x86_64 (Mar 27)
 

ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c (CVE-2020-5208) SL7 x86_64 ipmitool-1.8.18-9.el7_7.x86_64.rpm ipmitool-debuginfo-1.8.18-9.el7_7.x86_64.rpm noarch bmc-snmp-proxy-1.8.18-9.el7_7.noarch.rpm exchange-bmc-os-info-1.8.18-9.el7_7.noarch.rpm - Scientific Linux Development Team


  openSUSE: 2020:0440-1: moderate: python-nltk (Apr 1)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0438-1: moderate: ldns (Apr 1)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0436-1: moderate: python-nltk (Mar 31)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0430-1: moderate: python-mysql-connector-python (Mar 31)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0428-1: moderate: tor (Mar 31)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0429-1: moderate: GraphicsMagick (Mar 31)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0427-1: moderate: phpMyAdmin (Mar 31)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2020:0416-1: moderate: GraphicsMagick (Mar 31)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0405-1: moderate: phpMyAdmin (Mar 29)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2020:0403-1: moderate: strongswan (Mar 29)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0405-1: moderate: phpMyAdmin (Mar 29)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2020:0406-1: moderate: tor (Mar 29)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0409-1: moderate: python-mysql-connector-python (Mar 29)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0402-1: moderate: opera (Mar 29)
 

An update that contains security fixes can now be installed.

  openSUSE: 2020:0400-1: moderate: cloud-init (Mar 29)
 

An update that solves two vulnerabilities and has one errata is now available.

  openSUSE: 2020:0395-1: important: Recommended ruby2.5 (Mar 28)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2020:0398-1: moderate: cni, cni-plugins, conmon, fuse-overlayfs, podma (Mar 28)
 

An update that solves one vulnerability and has two fixes is now available.

  openSUSE: 2020:0388-1: important: the Linux Kernel (Mar 27)
 

An update that solves four vulnerabilities and has 37 fixes is now available.

  openSUSE: 2020:0391-1: moderate: mcpp (Mar 27)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0389-1: important: chromium (Mar 27)
 

An update that fixes 9 vulnerabilities is now available.


  Mageia 2020-0156: kernel security update (Apr 2)
 

This update is based on upstream 5.5.14 and fixes atleast the following security vulnerabilities: In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h)

  Mageia 2020-0155: python-yaml security update (Apr 2)
 

Updated python-yaml packages fix security vulnerability: A vulnerability was discovered in the PyYAML library, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader.

  Mageia 2020-0154: varnish security update (Apr 2)
 

Updated varnish packages fix security vulnerability: An assert can be triggered in Varnish Cache when using Varnish with a TLS termination proxy, and the proxy and Varnish use the PROXY version 2. The assert will cause Varnish to restart, and the cache will be empty after the

  Mageia 2020-0153: weechat security update (Apr 2)
 

Updated weechat packages fix security vulnerabilities: An issue was discovered in WeeChat before 2.7.1 (0.4.0 to 2.7 are affected). A malformed message 352 (who) can cause a NULL pointer dereference in the callback function, resulting in a crash

  Mageia 2020-0152: bluez security update (Apr 2)
 

The updated packages fix security vulnerabilities: A bug in Bluez may allow for the Bluetooth Discoverable state being set to on when no Bluetooth agent is registered with the system. This situation could lead to the unauthorized pairing of certain Bluetooth

  Mageia 2020-0151: vim security update (Mar 31)
 

It was discovered that the autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory (CVE-2019-20079). References: - https://bugs.mageia.org/show_bug.cgi?id=26380

  Mageia 2020-0150: phpmyadmin security update (Mar 31)
 

Some SQL injections via table names and parameters were fixed. References: - https://bugs.mageia.org/show_bug.cgi?id=26372 - https://www.phpmyadmin.net/news/2020/3/21/phpmyadmin-495-and-502-are-released/

  Mageia 2020-0149: chromium-browser-stable security update (Mar 31)
 

Multiple flaws were found in the way Chromium 80.0.3987.122 processes various types of web content, where loading a web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information. (CVE-2020-6420, CVE-2020-6422, CVE-2020-6424, CVE-2020-6425, CVE-2020-6426, CVE-2020-6427,

  Mageia 2020-0148: php security update (Mar 31)
 

Critical bugs closed: - Use-of-uninitialized-value in exif [1] - mb_strtolower (UTF-32LE): stack-buffer-overflow at php_unicode_tolower_full [2] - get_headers() silently truncates after a null byte [3]

  Mageia 2020-0147: nghttp2 security update (Mar 31)
 

Malformed request header may cause route matchers or access controls to be bypassed, resulting in escalation of privileges or information disclosure (CVE-2019-18802). References:

  Mageia 2020-0146: sympa security update (Mar 31)
 

Updated sympa packages fix security vulnerability: Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed