Thank you for subscribing to the LinuxSecurity Linux Advisory Watch newsletter! Staying on top of the latest security advisories issued by the distro(s) you use is essential in maintaining an updated, secure Linux system. Our weekly newsletter is an easy, convenient way to track distribution security advisories - helping you keep your Linux environment safe from malware and other exploits.

Important advisories issued this week include warnings from CentOS and Gentoo of multiple vulnerabilities in Mozilla Firefox and Mozilla Thunderbird and an advisory issued by Gentoo regarding various flaws in Google Chrome and Chromium. Continue reading to learn about other significant advisories issued this week. Stay healthy, safe and secure - both on and offline!


LinuxSecurity.com Feature Extras:

IoT Security Vulnerabilities are Ubiquitous: How To Secure Your Router and Your Linux System Now - The Internet of Things (IoT) is rapidly growing, connecting more devices each day. It is projected that by 2025, the world will have an astounding 64 billion IoT devices .

The Ultimate Guide to Using Data Encryption on Linux - Data encryption has never been more important. New data protection and privacy regulations, such as GDPR, mean that companies storing unencrypted customer information are vulnerable to paying heavy fines. The public is now more aware of the importance of encryption, with massive data breaches impacting companies like Facebook receiving major media coverage.


  Debian: DSA-4746-1: net-snmp security update (Aug 15)
 

Several vulnerabilities were discovered in net-snmp, a suite of Simple Network Management Protocol applications, which could lead to privilege escalation.

  Fedora 32: curl 2020-da832cb434 (Aug 20)
 

- fix expired pointer dereference via multi API with `CURLOPT_CONNECT_ONLY` option set (CVE-2020-8231)

  Fedora 32: mod_http2 2020-8122a8daa2 (Aug 20)
 

This update includes the latest stable release of `mod_http2`, fixing various bugs. Two security vulnerabilities are addressed in this update: * **CVE-2020-11993**: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11993 * **CVE-2020-9490**:

  Fedora 32: sqlite 2020-d0f892b069 (Aug 19)
 

Rebased to version 3.33.0

  Fedora 32: swtpm 2020-b9f747c024 (Aug 19)
 

Update to v0.3.4 release

  Fedora 32: rubygem-kramdown 2020-f6eee9a2d3 (Aug 19)
 

A security flaw was found on ruby kramdown which may lead to unintended code execution. This vulnerability is now assigned as CVE-2020-14001 . This new rpm should fix this issue.

  Fedora 32: roundcubemail 2020-d0f8f20cfc (Aug 19)
 

**RELEASE 1.4.8** - **Security**: Fix potential XSS issue in HTML editor of the identity signature input (#7507) - Managesieve: Fix too-small input field in Elastic when using custom headers (#7498) - Fix support for an error as a string in message_before_send hook (#7475) - Elastic: Fix redundant scrollbar in plain text editor on mail reply (#7500) - Elastic: Fix deleted and replied+forwarded

  Fedora 31: swtpm 2020-18f0766606 (Aug 19)
 

Update to v0.3.4 release

  Fedora 31: ansible 2020-1e6eeadbb4 (Aug 19)
 

Update to 2.9.12 upstream bugfix and security update

  Fedora 31: roundcubemail 2020-b1e023936e (Aug 19)
 

**RELEASE 1.4.8** - **Security**: Fix potential XSS issue in HTML editor of the identity signature input (#7507) - Managesieve: Fix too-small input field in Elastic when using custom headers (#7498) - Fix support for an error as a string in message_before_send hook (#7475) - Elastic: Fix redundant scrollbar in plain text editor on mail reply (#7500) - Elastic: Fix deleted and replied+forwarded

  Fedora 31: rubygem-kramdown 2020-5c70d97eca (Aug 19)
 

A security flaw was found on ruby kramdown which may lead to unintended code execution. THis vulnerability is now assigned as CVE-2020-14001 . This new rpm should fix this issue.

  Fedora 31: libmetalink 2020-2a9b45c1f5 (Aug 19)
 

Patched null ptr dereference

  Fedora 31: LibRaw 2020-c6fa12cfb1 (Aug 18)
 

Fix CVE-2020-15503

  Fedora 31: libetpan 2020-44e52ef729 (Aug 18)
 

A security flaw was found on libetpan which may allow malicious attacker to inject additional responses or mimic whole sessions. This vulnerability is now assined as CVE-2020-15953. This new rpm should fix this issue.

  Fedora 31: php 2020-8e36afc743 (Aug 18)
 

**PHP version 7.3.21** (06 Aug 2020) **Apache:** * Fixed bug php#79030 (Upgrade apache2handler's php_apache_sapi_get_request_time to return usec). (Herbert256) **Core:** * Fixed bug php#79877 (getimagesize function silently truncates after a null byte) (cmb) * Fixed bug php#79778 (Assertion failure if dumping closure with unresolved static variable). (Nikita) * Fixed bug php#79792

  Fedora 32: libetpan 2020-13ae5f7221 (Aug 18)
 

A security flaw was found on libetpan which may allow malicious attacker to inject additional responses or mimic whole sessions. This vulnerability is now assined as CVE-2020-15953. This new rpm should fix this issue.

  Fedora 32: php 2020-96124cc236 (Aug 18)
 

**PHP version 7.4.9** (06 Aug 2020) **Apache:** * Fixed bug php#79030 (Upgrade apache2handler's php_apache_sapi_get_request_time to return usec). (Herbert256) **Core:** * Fixed bug php#79740 (serialize() and unserialize() methods can not be called statically). (Nikita) * Fixed bug php#79783 (Segfault in php_str_replace_common). (Nikita) * Fixed bug php#79778 (Assertion failure if

  Fedora 31: kernel 2020-2cd6393548 (Aug 17)
 

The 5.7.15 stable kernel release contains a number of important fixes across the tree. ---- The 5.7.14 stable kernel update contains a number of important fixes across the tree. ---- The 5.7.12 stable kernel update contains a number of important fixes across the tree.

  Fedora 31: wob 2020-4def6ebb77 (Aug 17)
 

new version ---- fix error in changelog

  Fedora 32: wob 2020-54010774d1 (Aug 17)
 

new version ---- fix error in changelog

  Fedora 32: LibRaw 2020-ed284fd64b (Aug 17)
 

Fix CVE-2020-15503

  Fedora 31: firefox 2020-449743fcc1 (Aug 16)
 

- VA-API under Wayland should work as expected now, added fix for mozbz#1656436. ---- - Fixed VA-API video playback (https://bugzilla.mozilla.org/show_bug.cgi?id=1645671) ---- - New upstream update - 79.0

  Fedora 32: nss 2020-481c7e285d (Aug 15)
 

Updates the nss package to upstream NSS 3.55. For details about new functionality and a list of bugs fixed in this release please see the upstream release notes -

  Fedora 32: qt 2020-b8091188d0 (Aug 15)
 

Security fix for CVE-2020-17507

  Fedora 32: thunderbird 2020-a4157703ce (Aug 14)
 

Update to latest upstream stable version.

  Fedora 31: lilypond 2020-7cd08d85ce (Aug 13)
 

Patch for CVE-2020-17353

  Fedora 31: python3 2020-d808fdd597 (Aug 13)
 

Security fix for CVE-2019-20907, CVE-2020-14422. Provide a versioned pathfix3.7.py command.

  Fedora 32: lilypond 2020-328534eeba (Aug 13)
 

Patch for CVE-2020-17353

  Gentoo: GLSA-202008-08: Mozilla Network Security Service (NSS): Multiple vulnerabilities (Aug 19)
 

NSS has multiple information disclosure vulnerabilities when handling secret key material.

  RedHat: RHSA-2020-3525:01 Moderate: Red Hat Quay v3.3.1 security update (Aug 19)
 

An update is now available for Red Hat Quay 3.3 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3518:01 Important: rh-mysql80-mysql security update (Aug 19)
 

An update for rh-mysql80-mysql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3504:01 Moderate: Red Hat Ceph Storage 3.3 security and (Aug 18)
 

Updated packages that fixes one security issue and multiple bugs are now available for Red Hat Ceph Storage 3.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-3505:01 Moderate: Red Hat Ceph Storage 3.3 Security update (Aug 18)
 

An update is now available for Red Hat Ceph Storage 3.3 on Ubuntu 16.04. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-3501:01 Important: Red Hat Single Sign-On 7.4.2 security (Aug 18)
 

A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3496:01 Important: Red Hat Single Sign-On 7.4.2 security (Aug 18)
 

New Red Hat Single Sign-On 7.4.2 packages are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3495:01 Important: Red Hat Single Sign-On 7.4.2 security (Aug 18)
 

New Red Hat Single Sign-On 7.4.2 packages are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3497:01 Important: Red Hat Single Sign-On 7.4.2 security (Aug 18)
 

New Red Hat Single Sign-On 7.4.2 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3475:01 Important: bind security update (Aug 18)
 

An update for bind is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3474:01 Moderate: bash security update (Aug 18)
 

An update for bash is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-3470:01 Important: bind security update (Aug 18)
 

An update for bind is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.

  RedHat: RHSA-2020-3471:01 Important: bind security update (Aug 18)
 

An update for bind is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3453:01 Important: OpenShift Container Platform 4.5.6 (Aug 18)
 

An update for jenkins-2-plugins and python-rsa is now available for Red Hat OpenShift Container Platform 4.5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3463:01 Important: Red Hat JBoss Enterprise Application (Aug 17)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3462:01 Important: Red Hat JBoss Enterprise Application (Aug 17)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3461:01 Important: Red Hat JBoss Enterprise Application (Aug 17)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3464:01 Important: Red Hat JBoss Enterprise Application (Aug 17)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 7.3. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3456:01 Important: libvncserver security update (Aug 17)
 

An update for libvncserver is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  Slackware: 2020-232-01: curl Security Update (Aug 19)
 

New curl packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.

  SUSE: 2020:2283-1 moderate: libreoffice (Aug 20)
 

An update that solves two vulnerabilities and has 6 fixes is now available.

  SUSE: 2020:2276-1 moderate: python (Aug 19)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2275-1 moderate: python (Aug 19)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2277-1 moderate: python3 (Aug 19)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2274-1 important: dovecot22 (Aug 19)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:2271-1 important: postgresql12 (Aug 18)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:2272-1 important: freerdp (Aug 18)
 

An update that fixes 46 vulnerabilities is now available.

  SUSE: 2020:2269-1 important: libvirt (Aug 18)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:2266-1 important: dovecot23 (Aug 18)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:2265-1 important: postgresql12 (Aug 18)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:14456-1 moderate: MozillaFirefox (Aug 18)
 

An update that fixes 10 vulnerabilities is now available.

  SUSE: 2020:14454-1 moderate: python-azure-agent (Aug 18)
 

An update that solves one vulnerability and has 11 fixes is now available.

  SUSE: 2020:2267-1 important: dovecot23 (Aug 18)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:2259-1 moderate: fwupd (Aug 18)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:2264-1 important: postgresql10 (Aug 18)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:2258-1 moderate: fwupd (Aug 18)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:2251-1 moderate: zabbix (Aug 17)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2237-1 important: libvirt (Aug 14)
 

An update that solves one vulnerability and has four fixes is now available.

  SUSE: 2020:2238-1 moderate: perl-PlRPC (Aug 14)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2233-1 important: libvirt (Aug 13)
 

An update that solves one vulnerability and has three fixes is now available.

  SUSE: 2020:2235-1 moderate: libreoffice (Aug 13)
 

An update that solves two vulnerabilities and has 6 fixes is now available.

  SUSE: 2020:2234-1 important: xen (Aug 13)
 

An update that fixes 5 vulnerabilities is now available.

  SUSE: 2020:2232-1 important: webkit2gtk3 (Aug 13)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2020:2225-1 moderate: xerces-c (Aug 13)
 

An update that fixes one vulnerability is now available.

  Ubuntu 4466-2: curl vulnerability (Aug 20)
 

curl could be made to expose sensitive information over the network.

  Ubuntu 4467-1: QEMU vulnerabilities (Aug 19)
 

Several security issues were fixed in QEMU.

  Ubuntu 4466-1: curl vulnerability (Aug 19)
 

curl could be made to expose sensitive information over the network.

  Ubuntu 4465-1: linux kernel vulnerabilities (Aug 18)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4464-1: GNOME Shell vulnerability (Aug 18)
 

The system could be made to expose sensitive information.

  Ubuntu 4463-1: Linux kernel vulnerabilities (Aug 18)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4462-1: Linux kernel vulnerability (Aug 18)
 

The system could be made to crash under certain conditions.

  Ubuntu 4461-1: Ark vulnerability (Aug 18)
 

Ark could be made to write files as your login if it opened a specially crafted file.

  Ubuntu 4460-1: Oniguruma vulnerabilities (Aug 17)
 

Several security issues were fixed in Oniguruma.

  Ubuntu 4457-2: Software Properties vulnerability (Aug 17)
 

Software Properties could be made to manipulate the display.

  Ubuntu 4456-2: Dovecot vulnerabilities (Aug 17)
 

Several security issues were fixed in Dovecot.

  Ubuntu 4459-1: Salt vulnerabilities (Aug 14)
 

Several security issues were fixed in Salt.

  Ubuntu 4458-1: Apache HTTP Server vulnerabilities (Aug 13)
 

Several security issues were fixed in Apache HTTP Server.

  Debian LTS: DLA-2335-1: ghostscript security update (Aug 20)
 

Multiple vulnerabilities were found in ghostscript, an interpreter for the PostScript language and for PDF, allowing an attacker to escalate privileges and cause denial of service via crafted PS/EPS/PDF files.

  Debian LTS: DLA-2333-1: imagemagick security update (Aug 18)
 

Several security vulnerabilities were fixed in Imagemagick. Various memory handling problems and cases of missing or incomplete input sanitizing may result in denial of service, memory or CPU exhaustion, information disclosure or potentially the execution of arbitrary code

  Debian LTS: DLA-2332-1: sane-backends security update (Aug 17)
 

Kevin Backhouse discovered multiple vulnerabilies in the epson2 and epsonds backends of SANE, a library for scanners. A malicious remote device could exploit these to trigger information disclosure, denial of service and possibly remote code execution.

  Debian LTS: DLA-2331-1: posgresql-9.6 security update (Aug 17)
 

Andres Freund found an issue in the PostgreSQL database system where an uncontrolled search path could allow users to run arbitrary SQL functions with elevated priviledges when a superuser runs certain `CREATE EXTENSION' statements.

  Debian LTS: DLA-2330-1: jruby security update (Aug 16)
 

Several vulnerabilities were fixed in JRuby, a 100% pure-Java implementation of Ruby. CVE-2017-17742

  Debian LTS: DLA-2329-1: libetpan security update (Aug 16)
 

In libEtPan, a mail library, a STARTTLS response injection was discovered that affects IMAP, SMTP, and POP3. For Debian 9 stretch, this problem has been fixed in version

  Debian LTS: DLA-2327-1: lucene-solr security update (Aug 15)
 

A security vulnerability was discovered in lucene-solr, an enterprise search server. The DataImportHandler, an optional but popular module to pull in data

  Debian LTS: DLA-2328-1: dovecot security update (Aug 15)
 

Several vulnerabilities have been discovered in the Dovecot email server. CVE-2020-12100

  Debian LTS: DLA-2326-1: htmlunit security update (Aug 15)
 

In HtmlUnit, a GUI-Less browser for Java programs, malicious JavaScript code was able to execute arbitrary Java code on the application. For Debian 9 stretch, this problem has been fixed in version

  Debian LTS: DLA-2278-2: squid3 regression update (Aug 13)
 

The update of squid3 released as DLA-2278-1 contained an incomplete fix for CVE-2019-12523 that prevented services which rely on the icap or ecap protocol to function properly. Updated squid3 packages are now available to correct this issue.

  Debian LTS: DLA-2325-1: openjdk-8 security update (Aug 13)
 

Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, bypass of access/sandbox restrictions or information disclosure.

  openSUSE: 2020:1236-1: important: the Linux Kernel (Aug 21)
 

An update that solves 7 vulnerabilities and has 109 fixes is now available.

  openSUSE: 2020:1231-1: moderate: hylafax+ (Aug 18)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:1230-1: moderate: balsa (Aug 18)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1228-1: moderate: postgresql, postgresql96, postgresql10, postgresql12 (Aug 17)
 

An update that solves two vulnerabilities and has two fixes is now available.

  openSUSE: 2020:1227-1: moderate: postgresql96, postgresql10 and postgresql12 (Aug 17)
 

An update that solves 7 vulnerabilities and has two fixes is now available.

  openSUSE: 2020:1222-1: moderate: libreoffice (Aug 16)
 

An update that solves two vulnerabilities and has 6 fixes is now available.

  openSUSE: 2020:1214-1: important: chromium (Aug 15)
 

An update that fixes 14 vulnerabilities is now available.

  openSUSE: 2020:1210-1: moderate: hylafax+ (Aug 14)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:1209-1: moderate: hylafax+ (Aug 14)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:1199-1: moderate: wireshark (Aug 14)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2020:1200-1: important: xrdp (Aug 14)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1208-1: moderate: firejail (Aug 14)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:1207-1: moderate: balsa (Aug 14)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1206-1: important: chromium (Aug 14)
 

An update that fixes 14 vulnerabilities is now available.

  openSUSE: 2020:1204-1: moderate: perl-XML-Twig (Aug 14)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1205-1: important: MozillaThunderbird (Aug 14)
 

An update that fixes four vulnerabilities is now available.

  openSUSE: 2020:1198-1: important: libX11 (Aug 14)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1196-1: important: xen (Aug 13)
 

An update that contains security fixes can now be installed.

  Mageia 2020-0340: ngircd security update (Aug 20)
 

The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function. (CVE-2020-14148) References:

  Mageia 2020-0339: roundcubemail security update (Aug 18)
 

Fix potential XSS issue in HTML editor of the identity signature input Fix cross-site scripting (XSS) via HTML messages with malicious svg content [CVE-2020-16145] Fix cross-site scripting (XSS) via HTML messages with malicious math content References:

  Mageia 2020-0338: freerdp security update (Aug 18)
 

Integer overflow due to missing input sanitation in rdpegfx channel. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a memcpy) (CVE-2020-15103).

  Mageia 2020-0337: jasper security update (Aug 18)
 

The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows remote attackers to cause a denial of service (invalid read) via a crafted image (CVE-2017-6851). Heap-based buffer overflow in the jpc_dec_decodepkt function in jpc_t2dec.c in

  Mageia 2020-0336: python-rstlib security update (Aug 18)
 

Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used and thus permissions are not preserved upon editing. An adversary with prior access to /etc/target/saveconfig.json could access a later version, resulting in a loss of integrity depending on their permission settings

  Mageia 2020-0335: x11-server security update (Aug 18)
 

Allocation for pixmap data in AllocatePixmap() does not initialize the memory in xserver, it leads to leak uninitialize heap memory to clients. When the X server runs with elevated privileges. This flaw can lead to ASLR bypass, which when combined with other flaws (known/unknown) could lead to lead to privilege elevation in the client (CVE-2020-14347).

  Mageia 2020-0334: libx11 security update (Aug 18)
 

The X Input Method (XIM) client implementation in libX11 has some integer overflows and signed/unsigned comparison issues that can lead to heap corruption when handling malformed messages from an input method (CVE-2020-14344).

  Mageia 2020-0333: kernel security update (Aug 18)
 

This provides an update to kernel 5.7 series, currently based on upstream 5.7.14 adding support for new hardware and features, and fixes at least the following security issues: An issue was discovered in the Linux kernel through 5.3.9. There is a

  Mageia 2020-0332: squid security update (Aug 18)
 

Due to use of a potentially dangerous function Squid and the default certificate validation helper are vulnerable to a Denial of Service attack when processing TLS certificates. This attack is limited to Squid built with OpenSSL features and opening peer or server connections for HTTPS traffic and SSL-Bump server handshakes (CVE-2020-14058).

  Mageia 2020-0331: tomcat security update (Aug 18)
 

A specially crafted sequence of HTTP/2 requests could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive (CVE-2020-11996).

  Mageia 2020-0330: dovecot security update (Aug 18)
 

CVE-2020-12100: Receiving mail with deeply nested MIME parts leads to resource exhaustion as Dovecot attempts to parse it. CVE-2020-12673: Dovecot's NTLM implementation does not correctly check message buffer size, which leads to reading past allocation which can lead to crash. CVE-2020-12674: Dovecot's RPA mechanism implementation accepts zero-length

  Mageia 2020-0329: radare2 security update (Aug 18)
 

In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory (CVE-2020-15121).

  Mageia 2020-0328: firejail security update (Aug 18)
 

It was reported that firejail does not respect the end-of-options separator ("--"), allowing an attacker with control over the command line options of the sandboxed application, to write data to a specified file (CVE-2020-17367). It was reported that firejail when redirecting output via --output or

  Mageia 2020-0327: apache security update (Aug 18)
 

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers (CVE-2020-9490).

  Mageia 2020-0326: targetcli security update (Aug 18)
 

An access flaw was found in targetcli, where the /etc/target and underneath backup directory/files were world-readable. This flaw allows a local attacker to access potentially sensitive information such as authentication credentials from the /etc/target/saveconfig.json and backup files. The highest threat from this vulnerability is to confidentiality (CVE-2020-13867).

  Mageia 2020-0325: golang security update (Aug 18)
 

Servers where the Handler concurrently reads the request body and writes a response can encounter a data race and crash. The httputil.ReverseProxy Handler is affected (CVE-2020-15586). Certain invalid inputs to ReadUvarint or ReadVarint could cause those functions

  Mageia 2020-0324: libssh security update (Aug 18)
 

The code in src/sftpserver.c did not verify the validity of certain pointers and expected them to be valid. A NULL pointer dereference could have been occurred that typically causes a crash and thus a denial-of-service (CVE-2020-16135).

  Mageia 2020-0323: ark security update (Aug 18)
 

A maliciously crafted archive with "../" in the file paths would install files anywhere in the user's home directory upon extraction (CVE-2020-16116). References: - https://bugs.mageia.org/show_bug.cgi?id=27023

  Mageia 2020-0322: clamav security update (Aug 18)
 

A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that

  Mageia 2020-0321: claws-mail security update (Aug 18)
 

common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled (CVE-2020-15917). References: - https://bugs.mageia.org/show_bug.cgi?id=27040

  Mageia 2020-0320: thunderbird security update (Aug 18)
 

Potential leak of redirect targets when loading scripts in a worker. (CVE-2020-15652) WebRTC data channel leaks internal address to peer. (CVE-2020-6514)

  Mageia 2020-0319: postgresql-jdbc security update (Aug 18)
 

XML external entity (XXE) vulnerability in PgSQLXML (CVE-2020-13692). References: - https://bugs.mageia.org/show_bug.cgi?id=27017 - https://access.redhat.com/errata/RHSA-2020:3176

  Mageia 2020-0318: firefox security update (Aug 18)
 

WebRTC used the memory address of a class instance as a connection identifier. Unfortunately, this value is often transmitted to the peer, which allows bypassing ASLR (CVE-2020-6514). Crafted media files could lead to a race in texture caches, resulting in a

  Mageia 2020-0317: webkit2 security update (Aug 16)
 

Updated webkit2 packages fix security vulnerabilities: The webkit2 package has been updated to version 2.28.3, fixing several security issues and other bugs.

  Mageia 2020-0316: znc security update (Aug 16)
 

The znc package has been updated to version 1.8.1, containing several bugfixes and enhancements. See the upstream change logs for details. References: - https://bugs.mageia.org/show_bug.cgi?id=26886

  Mageia 2020-0315: mumble security update (Aug 16)
 

Updated mumble package fixes security vulnerability: OCB2 is known to be broken under certain conditions: https://eprint.iacr.org/2019/311

  Mageia 2020-0314: glib-networking security update (Aug 16)
 

The updated packages fix a security vulnerability: In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected