Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Linux Kernel Security in a Nutshell: How to Secure Your Linux System - The Linux kernel is the core component of the Linux operating system, maintaining complete control over everything in the system. It is the interface between applications and data processing at the hardware level, connecting the system hardware to the application software. The kernel manages input/output requests from software, memory, processes, peripherals and security, among other hefty responsibilities. Needless to say, the Linux kernel is pretty important.

Servers Running Linux May Get Riskier for Enterprises Next Year - The LinuxSecurity team thanksHoracio Zambrano for contributing this article. Enterprises using Linux for their cloud or data center servers may be faced with a larger threat from advanced security attackers in the near future. Based on the Linux Foundations estimates back in 2014, 75% of enterprises reported using Linux for the cloud and 79% for application deployments.


Debian: DSA-4581-1: git security update (Dec 10)

Several vulnerabilities have been discovered in git, a fast, scalable, distributed revision control system. CVE-2019-1348

Debian: DSA-4580-1: firefox-esr security update (Dec 9)

Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code.

Debian: DSA-4579-1: nss security update (Dec 6)

Two vulnerabilities were discovered in NSS, a set of cryptographic libraries, which may result in denial of service and potentially the execution of arbitrary code.


Fedora 30: knot-resolver FEDORA-2019-44ccfa9b29 (Dec 12)

- update to upstream version 4.3.0 - fixes CVE-2019-19331 - root.keys is moved to /var/lib/knot-resolver - knot-resolver no longer requires write permission to /etc/knot-resolver/

Fedora 30: xen FEDORA-2019-3d7105bd2a (Dec 12)

Device quarantine for alternate pci assignment methods [XSA-306]

Fedora 31: knot-resolver FEDORA-2019-866dc03603 (Dec 12)

- update to upstream version 4.3.0 - fixes CVE-2019-19331 - root.keys is moved to /var/lib/knot-resolver - knot-resolver no longer requires write permission to /etc/knot-resolver/

Fedora 31: samba FEDORA-2019-be98a08835 (Dec 11)

Update to Samba 4.11.3 - Security fixes for CVE-2019-14861, CVE-2019-14870 ---- Restart winbindd on samba-winbind package upgrade

Fedora 30: nss FEDORA-2019-8fbc65ef9e (Dec 10)

Fix intermittent SEC_ERROR_UNKNOWN_ISSUER (#1752303, #1648617) ---- Updates the nss package to upstream NSS 3.47.1. For details about new functionality and a list of bugs fixed in this release please see the upstream release notes -

Fedora 30: libuv FEDORA-2019-1686ae9b59 (Dec 9)

Update to Node.js upstream release 12.13.1 Also fixes an issue where running `npm -g` was risky on RPM-installed systems. Fedora's packaged NPM will now install global content in /usr/local instead of /usr where it could conflict with RPM-provided versions.

Fedora 30: xpdf FEDORA-2019-b890d4aad2 (Dec 9)

Apply upstream fix for CVE-2019-17064.

Fedora 30: librabbitmq FEDORA-2019-dd7c8f5435 (Dec 9)

**Added:** * amqp_ssl_socket_get_context can be used to get the current OpenSSL CTX* associated with a connection. **Changed:** * openssl: missing OpenSSL config is ignored as an OpenSSL init error (#523) * AMQP_DEFAULT_MAX_CHANNELS is now set to 2047 to follow current default channel limit in the RabbitMQ broker. (#513) **Fixed:** * add additional input

Fedora 31: xpdf FEDORA-2019-224d8cb07a (Dec 9)

Apply upstream fix for CVE-2019-17064.

Fedora 31: librabbitmq FEDORA-2019-8730b65158 (Dec 9)

**Added:** * amqp_ssl_socket_get_context can be used to get the current OpenSSL CTX* associated with a connection. **Changed:** * openssl: missing OpenSSL config is ignored as an OpenSSL init error (#523) * AMQP_DEFAULT_MAX_CHANNELS is now set to 2047 to follow current default channel limit in the RabbitMQ broker. (#513) **Fixed:** * add additional input

Fedora 30: libidn2 FEDORA-2019-160303ebeb (Dec 8)

Libidn 2.3.0 (released 2019-11-14) has assigned CVE-2019-12290 which was fixed by the roundtrip feature introduced in 2.2.0 (commit 241e8f48) * Update the data tables from Unicode 6.3.0 to Unicode 11.0 * Turn `_idn2_punycode_encode`, `_idn2_punycode_decode` into compat symbols (Fixes #74)

Fedora 31: proftpd FEDORA-2019-bfacf1e958 (Dec 7)

This update addresses a number of bugs affecting processing of CRLs in mod_tls, including possible null pointer dereferences and missing some checks. Thanks to Lionel Debroux for reporting them.

Fedora 30: proftpd FEDORA-2019-65a983b8b6 (Dec 7)

This update addresses a number of bugs affecting processing of CRLs in mod_tls, including possible null pointer dereferences and missing some checks. Thanks to Lionel Debroux for reporting them.

Fedora 30: oniguruma FEDORA-2019-73197ff9a0 (Dec 7)

Address CVE-2019-19204 CVE-2019-19203 CVE-2019-19012. Fixes are backported.

Fedora 31: rabbitmq-server FEDORA-2019-6497f51791 (Dec 6)

* RabbitMQ ver. 3.7.22 * CVE-2019-11281 * CVE-2019-11287

Fedora 31: community-mysql FEDORA-2019-08c700185f (Dec 6)

**MySQL 8.0.18** Release notes: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-18.html Security Advisory: https://www.oracle.com/security-alerts/cpuoct2019.html

Fedora 30: kernel FEDORA-2019-124a241044 (Dec 6)

The 5.3.14 update contains a number of important fixes across the tree

Fedora 30: rabbitmq-server FEDORA-2019-74d2feb5be (Dec 6)

* RabbitMQ ver. 3.7.22 * CVE-2019-11281 * CVE-2019-11287

Fedora 30: community-mysql FEDORA-2019-40ed49f449 (Dec 6)

**MySQL 8.0.18** Release notes: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-18.html Security Advisory: https://www.oracle.com/security-alerts/cpuoct2019.html

Fedora 30: chromium FEDORA-2019-00d5e55259 (Dec 6)

Fixes CVE-2019-13723 & CVE-2019-13724

Fedora 31: kernel FEDORA-2019-b86a7bdba0 (Dec 6)

The 5.3.14 update contains a number of important fixes across the tree

Fedora 31: libuv FEDORA-2019-7443ebda4b (Dec 6)

Update to Node.js upstream release 12.13.1 Also fixes an issue where running `npm -g` was risky on RPM-installed systems. Fedora's packaged NPM will now install global content in /usr/local instead of /usr where it could conflict with RPM-provided versions.

Fedora 31: nodejs FEDORA-2019-7443ebda4b (Dec 6)

Update to Node.js upstream release 12.13.1 Also fixes an issue where running `npm -g` was risky on RPM-installed systems. Fedora's packaged NPM will now install global content in /usr/local instead of /usr where it could conflict with RPM-provided versions.


RedHat: RHSA-2019-4201:01 Moderate: CloudForms 5.0.1 security, (Dec 12)

An update is now available for CloudForms Management Engine 5.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

RedHat: RHSA-2019-4222:01 Critical: Red Hat OpenShift Service Mesh 1.0.3 (Dec 11)

Red Hat OpenShift Service Mesh 1.0.3. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

RedHat: RHSA-2019-4205:01 Important: thunderbird security update (Dec 11)

An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2019-4096:01 Moderate: OpenShift Container Platform 4.2 (Dec 11)

An update for openshift-external-storage is now available for Red Hat OpenShift Container Platform 4.2. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2019-4097:01 Important: OpenShift Container Platform 4.2 (Dec 11)

An update for jenkins-2-plugins is now available for Red Hat OpenShift Container Platform 4.2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2019-4101:01 Moderate: OpenShift Container Platform 4.2 (Dec 11)

An update for openshift-enterprise-builder-container is now available for Red Hat OpenShift Container Platform 4.2. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2019-4098:01 Moderate: OpenShift Container Platform 4.2 (Dec 11)

An update for ose-cluster-kube-controller-manager-operator-container is now available for Red Hat OpenShift Container Platform 4.2. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2019-4099:01 Moderate: OpenShift Container Platform 4.2 (Dec 10)

An update for csi-provisioner-container is now available for Red Hat OpenShift Container Platform 4.2. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2019-4195:01 Important: thunderbird security update (Dec 10)

An update for thunderbird is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2019-4190:01 Important: nss, nss-softokn, (Dec 10)

An update for nss, nss-softokn, and nss-util is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2019-4192:01 Important: rh-maven35-jackson-databind security (Dec 10)

An update for rh-maven35-jackson-databind is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2019-4191:01 Important: sudo security update (Dec 10)

An update for sudo is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2019-4168:01 Important: kernel security and bug fix update (Dec 10)

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2019-4171:01 Important: kpatch-patch security update (Dec 10)

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2019-4152:01 Important: nss-softokn security update (Dec 10)

An update for nss-softokn is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2019-4154:01 Important: kernel-alt security, bug fix, (Dec 10)

An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2019-4148:01 Important: thunderbird security update (Dec 10)

An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2019-4159:01 Important: kernel security and bug fix update (Dec 10)

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.

RedHat: RHSA-2019-4164:01 Important: kernel security and bug fix update (Dec 10)

An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.

RedHat: RHSA-2019-4126:01 Moderate: httpd24-httpd security, bug fix, (Dec 10)

An update for httpd24, httpd24-httpd, and httpd24-nghttp2 is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2019-4117:01 Moderate: Open Liberty 19.0.0.12 Runtime security (Dec 9)

A security update is now available for Open Liberty 19.0.0.12 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2019-4114:01 Important: nss security update (Dec 9)

An update for nss is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2019-4115:01 Moderate: java-1.8.0-ibm security update (Dec 9)

An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2019-4113:01 Moderate: java-1.8.0-ibm security update (Dec 9)

An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2019-4111:01 Critical: firefox security update (Dec 5)

An update for firefox is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

RedHat: RHSA-2019-4107:01 Critical: firefox security update (Dec 5)

An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

RedHat: RHSA-2019-4108:01 Critical: firefox security update (Dec 5)

An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

RedHat: RHSA-2019-4110:01 Moderate: java-1.7.1-ibm security update (Dec 5)

An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2019-4109:01 Moderate: java-1.7.1-ibm security update (Dec 5)

An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which


SUSE: 2019:3288-1 important: haproxy (Dec 12)

An update that fixes one vulnerability is now available.

SUSE: 2019:14249-1 important: openssl (Dec 12)

An update that fixes one vulnerability is now available.

SUSE: 2019:14246-1 important: Mozilla Firefox (Dec 11)

An update that fixes 118 vulnerabilities is now available.

SUSE: 2019:3260-1 important: the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Dec 11)

An update that fixes three vulnerabilities is now available.

SUSE: 2019:3263-1 important: the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Dec 11)

An update that solves two vulnerabilities and has one errata is now available.

SUSE: 2019:3249-1 important: the Linux Kernel (Live Patch 11 for SLE 15) (Dec 11)

An update that solves three vulnerabilities and has one errata is now available.

SUSE: 2019:3258-1 important: the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Dec 11)

An update that fixes four vulnerabilities is now available.

SUSE: 2019:3261-1 important: the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Dec 11)

An update that solves three vulnerabilities and has one errata is now available.

SUSE: 2019:3248-1 important: the Linux Kernel (Live Patch 10 for SLE 15) (Dec 11)

An update that fixes two vulnerabilities is now available.

SUSE: 2019:3255-1 important: the Linux Kernel (Live Patch 8 for SLE 12 SP4) (Dec 11)

An update that solves one vulnerability and has one errata is now available.

SUSE: 2019:3247-1 important: the Linux Kernel (Live Patch 9 for SLE 15) (Dec 11)

An update that fixes three vulnerabilities is now available.

SUSE: 2019:3266-1 important: strongswan (Dec 11)

An update that solves 5 vulnerabilities and has one errata is now available.

SUSE: 2019:3267-1 important: libssh (Dec 11)

An update that fixes one vulnerability is now available.

SUSE: 2019:3246-1 important: the Linux Kernel (Live Patch 8 for SLE 15) (Dec 11)

An update that fixes four vulnerabilities is now available.

SUSE: 2019:3252-1 important: the Linux Kernel (Live Patch 0 for SLE 12 SP4) (Dec 11)

An update that fixes 5 vulnerabilities is now available.

SUSE: 2019:3230-1 important: the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Dec 10)

An update that solves three vulnerabilities and has one errata is now available.

SUSE: 2019:3212-1 moderate: postgresql (Dec 10)

An update that contains security fixes can now be installed.

SUSE: 2019:3213-1 moderate: apache2-mod_perl (Dec 10)

An update that solves one vulnerability and has one errata is now available.

SUSE: 2019:3216-1 important: the Linux Kernel (Live Patch 14 for SLE 15) (Dec 10)

An update that solves one vulnerability and has one errata is now available.

SUSE: 2019:3238-1 important: java-1_8_0-openjdk (Dec 10)

An update that fixes 17 vulnerabilities is now available.

SUSE: 2019:3224-1 important: the Linux Kernel (Live Patch 3 for SLE 12 SP4) (Dec 10)

An update that fixes three vulnerabilities is now available.

SUSE: 2019:3228-1 important: the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Dec 10)

An update that solves four vulnerabilities and has one errata is now available.

SUSE: 2019:3237-1 important: the Linux Kernel (Live Patch 37 for SLE 12 SP1) (Dec 10)

An update that fixes two vulnerabilities is now available.

SUSE: 2019:3232-1 important: the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Dec 10)

An update that fixes three vulnerabilities is now available.

SUSE: 2019:3215-1 important: the Linux Kernel (Live Patch 7 for SLE 12 SP4) (Dec 10)

An update that solves two vulnerabilities and has one errata is now available.

SUSE: 2019:3223-1 important: the Linux Kernel (Live Patch 2 for SLE 12 SP4) (Dec 10)

An update that fixes four vulnerabilities is now available.

SUSE: 2019:3233-1 important: the Linux Kernel (Live Patch 33 for SLE 12 SP1) (Dec 10)

An update that fixes two vulnerabilities is now available.

SUSE: 2019:3225-1 important: the Linux Kernel (Live Patch 4 for SLE 12 SP4) (Dec 10)

An update that fixes two vulnerabilities is now available.

SUSE: 2019:14237-1 moderate: permissions (Dec 5)

An update that solves one vulnerability and has one errata is now available.

SUSE: 2019:3188-1 moderate: dnsmasq (Dec 5)

An update that solves two vulnerabilities and has three fixes is now available.

SUSE: 2019:3183-1 moderate: permissions (Dec 5)

An update that solves two vulnerabilities and has three fixes is now available.

SUSE: 2019:3182-1 moderate: permissions (Dec 5)

An update that solves two vulnerabilities and has one errata is now available.

SUSE: 2019:3190-1 moderate: munge (Dec 5)

An update that fixes one vulnerability is now available.

SUSE: 2019:3179-1 moderate: dpdk (Dec 5)

An update that solves one vulnerability and has four fixes is now available.

SUSE: 2019:3192-1 moderate: opencv (Dec 5)

An update that solves three vulnerabilities and has one errata is now available.

SUSE: 2019:3176-1 important: clamav (Dec 5)

An update that fixes one vulnerability is now available.

SUSE: 2019:3191-1 moderate: cloud-init (Dec 5)

An update that solves one vulnerability and has 6 fixes is now available.

SUSE: 2019:3180-1 moderate: permissions (Dec 5)

An update that solves two vulnerabilities and has one errata is now available.

SUSE: 2019:3177-1 important: clamav (Dec 5)

An update that fixes one vulnerability is now available.

SUSE: 2019:14236-1 important: clamav (Dec 5)

An update that fixes one vulnerability is now available.

SUSE: 2019:3189-1 moderate: dnsmasq (Dec 5)

An update that solves two vulnerabilities and has three fixes is now available.

SUSE: 2019:3184-1 important: ffmpeg (Dec 5)

An update that fixes four vulnerabilities is now available.


Ubuntu 4214-2: RabbitMQ vulnerability (Dec 11)

RabbitMQ could be made to execute arbitrary code if it received a specially crafted input.

Ubuntu 4217-2: Samba vulnerabilities (Dec 11)

Several security issues were fixed in Samba.

Ubuntu 4221-1: libpcap vulnerability (Dec 10)

Applications using libpcap could be made to crash if given specially crafted data.

Ubuntu 4202-2: Thunderbird regression (Dec 10)

USN-4202-1 caused a regression in Thunderbird.

Ubuntu 4220-1: Git vulnerabilities (Dec 10)

Several security issues were fixed in Git.

Ubuntu 4219-1: libssh vulnerability (Dec 10)

libssh could be made to run programs under certain conditions.

Ubuntu 4218-1: GNU C vulnerability (Dec 10)

GNU C could be made to execute arbitrary code or cause a crash if it received a specially crafted input.

Ubuntu 4217-1: Samba vulnerabilities (Dec 10)

Several security issues were fixed in Samba.

Ubuntu 4216-1: Firefox vulnerabilities (Dec 9)

Firefox could be made to crash or run programs as your login if it opened a malicious website.

Ubuntu 4215-1: NSS vulnerability (Dec 9)

NSS could be made to crash if it received a specially crafted certificate.

Ubuntu 4214-1: RabbitMQ vulnerability (Dec 5)

RabbitMQ could be made to execute arbitrary code if it received a specially crafted input.


Debian LTS: DLA-2032-1: cacti security update (Dec 11)

It was discovered that there was unsafe deserialisation issue in cacti, server monitoring system system. Unsafe deserialisation of objects which can lead to abuse of the

Debian LTS: DLA-2030-1: jackson-databind security update (Dec 10)

More deserialization flaws were discovered in jackson-databind which could allow an unauthenticated user to perform remote code execution. The issue was resolved by extending the blacklist and blocking more classes from polymorphic deserialization.

Debian LTS: DLA-2031-1: freeimage security update (Dec 10)

It was found that freeimage, a graphics library, was affected by the following two security issues: CVE-2019-12211

Debian LTS: DLA-2028-1: squid3 security update (Dec 10)

It was found that Squid, a high-performance proxy caching server for web clients, has been affected by the following security vulnerabilities.

Debian LTS: DLA-2029-1: firefox-esr security update (Dec 10)

Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code.

Debian LTS: DLA-2027-1: jruby security update (Dec 10)

Several security vulnerabilities were found in Ruby that also affected Debian's JRuby package, a pure-Java implementation of Ruby. Attackers were able to call arbitrary Ruby methods, cause a denial-of-service or inject input into HTTP response headers when using the WEBrick module.

Debian LTS: DLA-2026-1: htmldoc security update (Dec 9)

In HTMLDOC, there was a one-byte underflow in htmldoc/ps-pdf.cxx caused by a floating point math difference between GCC and Clang.

Debian LTS: DLA-2025-1: openslp-dfsg security update (Dec 8)

The OpenSLP package had two open security issues: CVE-2017-17833

Debian LTS: DLA-2024-1: phpmyadmin security update (Dec 8)

phpMyAdmin before 4.9.2 does not escape certain Git information, related to libraries/display_git_revision.lib.php and libraries/Footer.class.php.

Debian LTS: DLA-2023-1: openjdk-7 security update (Dec 7)

Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in denial of service, sandbox bypass, information disclosure or the execution of arbitrary code.

Debian LTS: DLA-2022-1: librabbitmq security update (Dec 6)

It was discovered that there was an integer overflow vulnerability in librabbitmq, a library for robust messaging between applications and servers.

Debian LTS: DLA-2021-1: libav security update (Dec 5)

Several security issues were fixed in libav, a multimedia library for processing audio and video files.


ArchLinux: 201912-3: crypto++: private key recovery (Dec 11)

The package crypto++ before version 8.2.0-2 is vulnerable to private key recovery.

ArchLinux: 201912-2: thunderbird: arbitrary code execution (Dec 11)

The package thunderbird before version 68.3.0-1 is vulnerable to arbitrary code execution.

ArchLinux: 201912-1: firefox: multiple issues (Dec 5)

The package firefox before version 71.0-1 is vulnerable to multiple issues including arbitrary code execution, denial of service, information disclosure and privilege escalation.


CentOS: CESA-2019-4152: Important CentOS 6 nss-softokn (Dec 11)

Upstream details at : https://access.redhat.com/errata/RHSA-2019:4152

CentOS: CESA-2019-4108: Critical CentOS 6 firefox (Dec 11)

Upstream details at : https://access.redhat.com/errata/RHSA-2019:4108

CentOS: CESA-2019-4024: Important CentOS 7 SDL (Dec 6)

Upstream details at : https://access.redhat.com/errata/RHSA-2019:4024


SciLinux: SLSA-2019-4205-1 Important: thunderbird on SL6.x i386/x86_64 (Dec 11)

This update upgrades Thunderbird to version 68.3.0. * Mozilla: Use-after-free in worker destruction (CVE-2019-17008) * Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) * Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) * Mozilla: Use-after-free when ret [More...]

SciLinux: SLSA-2019-4152-1 Important: nss-softokn on SL6.x i386/x86_64 (Dec 11)

nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) SL6 x86_64 nss-softokn-3.44.0-6.el6_10.i686.rpm nss-softokn-3.44.0-6.el6_10.x86_64.rpm nss-softokn-debuginfo-3.44.0-6.el6_10.i686.rpm nss-softokn-debuginfo-3.44.0-6.el6_10.x86_64.rpm nss-softokn-freebl-3.44.0-6.el6_10.i686.rpm nss-softokn-freebl-3 [More...]

SciLinux: SLSA-2019-4190-1 Important: nss, nss-softokn, nss-util on SL7.x x86_64 (Dec 11)

nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729) SL7 x86_64 nss-3.44.0-7.el7_7.i686.rpm nss-3.44.0-7.el7_7.x86_64.rpm nss-debuginfo-3.44.0-7.el7_7.i686.rpm nss-debuginfo-3.44.0-7.el7_7.x86_64.rpm nss-so [More...]

SciLinux: SLSA-2019-4148-1 Important: thunderbird on SL7.x x86_64 (Dec 11)

This update upgrades Thunderbird to version 68.3.0. * Mozilla: Use-after-free in worker destruction (CVE-2019-17008) * Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) * Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) * Mozilla: Use-after-free when ret [More...]

SciLinux: SLSA-2019-4107-1 Critical: firefox on SL7.x x86_64 (Dec 6)

Mozilla: Use-after-free in worker destruction (CVE-2019-17008) * Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) * Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) * Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-1 [More...]

SciLinux: SLSA-2019-3979-1 Important: kernel on SL7.x x86_64 (Dec 6)

Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821) * kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation (CVE-2019-15239) Bug Fix(es): * On SL 7.7 kernel SCSI VPD information for NVMe drives is missing (breaks InfoScale) * SL7 fnic spamming logs: Current vnic speed set to : 40000 * kernel build: parallelize redhat/mod-sig [More...]

SciLinux: SLSA-2019-4108-1 Critical: firefox on SL6.x i386/x86_64 (Dec 6)

Mozilla: Use-after-free in worker destruction (CVE-2019-17008) * Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) * Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) * Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-1 [More...]


openSUSE: 2019:2668-1: important: clamav (Dec 11)

An update that fixes one vulnerability is now available.

openSUSE: 2019:2669-1: moderate: dnsmasq (Dec 11)

An update that solves two vulnerabilities and has three fixes is now available.

openSUSE: 2019:2670-1: moderate: munge (Dec 11)

An update that fixes one vulnerability is now available.

openSUSE: 2019:2671-1: moderate: opencv (Dec 11)

An update that solves three vulnerabilities and has one errata is now available.

openSUSE: 2019:2672-1: moderate: permissions (Dec 11)

An update that solves two vulnerabilities and has one errata is now available.

openSUSE: 2019:2667-1: moderate: shadowsocks-libev (Dec 11)

An update that fixes two vulnerabilities is now available.

openSUSE: 2019:2664-1: important: opera (Dec 10)

An update that fixes two vulnerabilities is now available.

openSUSE: 2019:2654-1: moderate: calamares (Dec 9)

An update that solves one vulnerability and has one errata is now available.

openSUSE: 2019:2655-1: moderate: calamares (Dec 9)

An update that solves one vulnerability and has one errata is now available.


Mageia 2019-0377: thunderbird security update (Dec 8)

Updated thunderbird packages fix security vulnerabilities: Stack corruption due to incorrect number of arguments in WebRTC code. (CVE-2019-13722)

Mageia 2019-0376: firefox security update (Dec 8)

Updated firefox packages fix security vulnerabilities: Stack corruption due to incorrect number of arguments in WebRTC code. (CVE-2019-13722)

Mageia 2019-0375: lz4 security update (Dec 8)

Updated lz4 packages fix security vulnerability: Heap-based buffer overflow in LZ4_write32 (CVE-2019-17543). References:

Mageia 2019-0374: nss security update (Dec 8)

Updated nss packages fix security vulnerability: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745).

Mageia 2019-0373: openexr security update (Dec 8)

The updated packages fix a security vulnerability: Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file that is accessed with the ImfOpenInputFile function in

Mageia 2019-0372: graphicsmagick security update (Dec 6)

The updated packages fix a security vulnerability: ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage. (CVE-2019-16709)

Mageia 2019-0371: sysstat security update (Dec 6)

Updated sysstat package fixes security vulnerability: Memory corruption due to an integer overflow (CVE-2019-16167). References:

Mageia 2019-0370: python-psutil security update (Dec 6)

Updated python-psutil packages fix security vulnerability: Riccardo Schirone discovered that psutil incorrectly handled certain reference counting operations. An attacker could use this issue to cause psutil to crash, resulting in a denial of service, or possibly execute

Mageia 2019-0369: libvpx security update (Dec 6)

Updated libvpx packages fix security vulnerabilities: It was discovered that libvpx did not properly handle certain malformed WebM media files. If an application using libvpx opened a specially crafted WebM file, a remote attacker could cause a denial of service, or possibly

Mageia 2019-0368: libvncserver security update (Dec 6)

Updated libvncserver packages fix security vulnerability: LibVNC contained a memory leak in VNC server code, which allowed an attacker to read stack memory and could be abused for information disclosure. Combined with another vulnerability, it could be used to

Mageia 2019-0367: tnef security update (Dec 6)

Updated tnef package fixes security vulnerability: In tnef, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based

Mageia 2019-0366: libtiff security update (Dec 6)

The updated packages fix a security vulnerability: tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a

Mageia 2019-0365: openjpeg2 security update (Dec 6)

The updated packages fix a security vulnerability: In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This

Mageia 2019-0364: sdl2_image security update (Dec 6)

Updated sdl2_image packages fix security vulnerabilities: An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide

Mageia 2019-0363: SDL_image security update (Dec 6)

The updated packages fix security vulnerabilities: An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image-2.0.3. A specially crafted XCF image can cause a heap overflow, resulting in code execution. An attacker

Mageia 2019-0362: libcryptopp security update (Dec 6)

The updated packages fix a security vulnerability: Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations,

Mageia 2019-0361: clamav security update (Dec 6)

The updated packages fix two packaging problems and a security vulnerability: A Denial-of-Service (DoS) vulnerability may occur when scanning a specially crafted email file as a result of excessively long scan times.

Mageia 2019-0360: python-twisted security update (Dec 6)

Updated python-twisted packages fix security vulnerabilities: Improper sanitization of URIs or HTTP which could allow attackers to perform CRLF attacks (CVE-2019-12387).

Mageia 2019-0359: libtasn1 security update (Dec 6)

Updated libtasn1 packages fix security vulnerability: Denial of service in asn1Parser (CVE-2018-1000654). References:

Mageia 2019-0358: ansible security update (Dec 6)

Updated ansible package fixes security vulnerability: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864).

Mageia 2019-0357: phpmyadmin security update (Dec 6)

An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/ table name can be used to trigger a SQL injection attack through the designer feature (CVE-2019-18622). References:

[updates-announce] MGASA-2019-0356: Updated QT stack fix security vulnerability (Dec 6)

This update provides the 5.12.6 QT stack maintenance release and fixes the following security issue: An out-of-bounds memory access in the generateDirectionalRuns() function in qtextengine.cpp in Qt qtbase 5.11.x and 5.12.x before 5.12.5 allows

Mageia 2019-0355: evince security update (Dec 6)

The updated packages fix a security vulnerability: The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory

Mageia 2019-0354: openssl security update (Dec 6)

The updated packages fix security vulnerabilities: ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length

Mageia 2019-0353: icu security update (Dec 6)

The updated packages fix a security vulnerability: International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp. (CVE-2018-18928)