Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Open-Source Security Projects: Choosing a Brandable .com Domain - LinuxSecurity would like to thank NameEstate.com for contributing this article. The importance of an open-source security project name cant be overstated. A name serves as a first impression. Its your first chance to tell people who you are and what you do. An impactful name is the best way to convey your value and what you can offer to clients. So, when it comes to open source security projects, finding a name that shows you are capable, trustworthy, and secure can determine your reach and success.

Encryption: An Essential Yet Highly Controversial Component of Digital Security - If youve been keeping up with recent security news, you are most likely aware of the heated worldwide debate about encryption that is currently underway. Strong encryption is imperative to securing sensitive data and protecting individuals privacy online, yet governments around the world refuse to recognize this, and are continually aiming to break encryption in an effort to increase the power of their law enforcement agencies.


Debian: DSA-4619-1: libxmlrpc3-java security update (Feb 6)

Guillaume Teissier reported that the XMLRPC client in libxmlrpc3-java, an XML-RPC implementation in Java, does perform deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious XMLRPC server can take advantage of

Debian: DSA-4618-1: libexif security update (Feb 6)

An out-of-bounds write vulnerability due to an integer overflow was reported in libexif, a library to parse EXIF files, which could result in denial of service, or potentially the execution of arbitrary code if specially crafted image files are processed.

Debian: DSA-4617-1: qtbase-opensource-src security update (Feb 3)

Two security issues were found in the Qt library, which could result in plugins and libraries being loaded from the current working directory, resulting in potential code execution.

Debian: DSA-4616-1: qemu security update (Feb 2)

Two security issues have been found in the SLiRP networking implementation of QEMU, a fast processor emulator, which could result in the execution of arbitrary code or denial of service.

Debian: DSA-4615-1: spamassassin security update (Feb 1)

Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Malicious rule or configuration files, possibly downloaded from an updates server, could execute arbitrary commands under multiple scenarios.

Debian: DSA-4614-1: sudo security update (Feb 1)

Joe Vennix discovered a stack-based buffer overflow vulnerability in sudo, a program designed to provide limited super user privileges to specific users, triggerable when configured with the "pwfeedback" option enabled. An unprivileged user can take advantage of this flaw to obtain

Debian: DSA-4613-1: libidn2 security update (Feb 1)

A heap-based buffer overflow vulnerability was discovered in the idn2_to_ascii_4i() function in libidn2, the GNU library for Internationalized Domain Names (IDNs), which could result in denial of service, or the execution of arbitrary code when processing a long

Debian: DSA-4612-1: prosody-modules security update (Jan 31)

It was discovered that the LDAP authentication modules for the Prosody Jabber/XMPP server incorrectly validated the XMPP address when checking whether a user has admin access.


Fedora 31: xar FEDORA-2020-edf53cd770 (Feb 6)

- Use Apple upstream instead of non-fresh Github one - New upstream in 1.8 dev branch with 417.1 subversion - Close CVE-2018-17093 - Close CVE-2018-17094 - Close CVE-2017-11124 - Close CVE-2017-11125 - Close CVE-2010-3798 - Use license macro - Add OpenSSL To Configuration

Fedora 31: upx FEDORA-2020-67590fbf08 (Feb 6)

3.96, multiple security fixes. ---- Patch for CVE-2019-20021

Fedora 30: glibc FEDORA-2020-c32e4b271c (Feb 5)

This update incorporates fixes from the upstream glibc 2.29 stable release branch, including a fix for a minor security vulnerability ([`LD_PREFER_MAP_32BIT_EXEC` not ignored in setuid binaries](https://bugzilla.redhat.com/show_bug.cgi?id=1774682)).

Fedora 31: java-11-openjdk FEDORA-2020-7e042e371a (Feb 3)

Update to the January 2020 CPU release 11.0.6. See: https://mail.openjdk.org/pipermail/jdk-updates-dev/2020-January/002374.html https://openjdk.org/groups/vulnerability/advisories/2020-01-14

Fedora 31: sox FEDORA-2020-1dfaa1963b (Feb 2)

Fixes **CVE-2017-18189**.

Fedora 30: xar FEDORA-2020-bbd24dd0cf (Feb 2)

- Use Apple upstream instead of non-fresh Github one - New upstream in 1.8 dev branch with 417.1 subversion - Close CVE-2018-17093 - Close CVE-2018-17094 - Close CVE-2017-11124 - Close CVE-2017-11125 - Close CVE-2010-3798 - Use license macro - Add OpenSSL To Configuration

Fedora 30: upx FEDORA-2020-20cf0743f5 (Feb 2)

3.96, multiple security fixes. ---- Patch for CVE-2019-20021

Fedora 30: openjpeg2 FEDORA-2020-6c8804daaa (Feb 1)

This update fixes CVE-2020-6851.

Fedora 30: mingw-openjpeg2 FEDORA-2020-6c8804daaa (Feb 1)

This update fixes CVE-2020-6851.

Fedora 30: e2fsprogs FEDORA-2020-01ed02451f (Feb 1)

Fix a potential out of bounds write when checking a maliciously corrupted file system. This is probably not exploitable on 64-bit platforms, but may be exploitable on 32-bit binaries depending on how the compiler lays out the stack variables. (Addresses CVE-2019-5188) A maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck. (Addresses

Fedora 31: java-1.8.0-openjdk FEDORA-2020-202cb87e26 (Feb 1)

January 2020 CPU security update. See https://mail.openjdk.org/pipermail/jdk8u-dev/2020-January/010979.html https://openjdk.org/groups/vulnerability/advisories/2020-01-14

Fedora 31: samba FEDORA-2020-6bd386c7eb (Feb 1)

Update to Samba 4.11.6 ---- Update to Samba 4.11.5 - Security fixes for CVE-2019-14902, CVE-2019-14907 and CVE-2019-19344

Fedora 30: webkit2gtk3 FEDORA-2020-f11a905fc2 (Jan 31)

* Fix issues while trying to play a video on NextCloud. * Make sure the GL video sink uses a valid WebKit shared GL context. * Fix vertical alignment of text containing arabic diacritics. * Fix build with icu 65.1. * Fix page loading errors with websites using HSTS. * Fix web process crash when displaying a KaTeX formula. * Fix several crashes and rendering issues. [WebKitGTK Security

Fedora 31: webkit2gtk3 FEDORA-2020-97e849ce46 (Jan 30)

* Fix issues while trying to play a video on NextCloud. * Make sure the GL video sink uses a valid WebKit shared GL context. * Fix vertical alignment of text containing arabic diacritics. * Fix build with icu 65.1. * Fix page loading errors with websites using HSTS. * Fix web process crash when displaying a KaTeX formula. * Fix several crashes and rendering issues. [WebKitGTK Security

Fedora 31: chromium FEDORA-2020-9382ceb2f8 (Jan 30)

Update to 79.0.3945.130. Fixes the following security issues: * CVE-2020-6378 * CVE-2020-6379 * CVE-2020-6380

Fedora 31: java-latest-openjdk FEDORA-2020-2ed6716c30 (Jan 30)

This is January 2020 OpenJDK security update for java-latest-openjdk packages. The sources are updated to the 13.0.2+8 tag.

Fedora 31: ansible FEDORA-2020-caf7f7d0d9 (Jan 30)

Update to bugfix release 2.9.3. See https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst

Fedora 31: links FEDORA-2020-3eef0246a7 (Jan 30)

Update to a new version. Security bug fixed: when links was connected to tor, it would send real dns requests outside the tor network when the displayed page contains .

Fedora 31: python-pillow FEDORA-2020-df444e464e (Jan 30)

Update to 6.2.2, fixes CVE-2020-5313, CVE-2020-5312, CVE-2020-5311, CVE-2020-5310.

Fedora 31: openjpeg2 FEDORA-2020-ab8553f302 (Jan 30)

This update fixes CVE-2020-6851.

Fedora 31: mingw-openjpeg2 FEDORA-2020-ab8553f302 (Jan 30)

This update fixes CVE-2020-6851.

Fedora 30: java-latest-openjdk FEDORA-2020-ebbf986d01 (Jan 30)

This is January 2020 OpenJDK security update for java-latest-openjdk packages. The sources are updated to the 13.0.2+8 tag.

Fedora 30: xen FEDORA-2020-2d9a75fadb (Jan 30)

arm: a CPU may speculate past the ERET instruction [XSA-312]

Fedora 30: thunderbird FEDORA-2020-d18d24c943 (Jan 30)

Update to latest upstream version

Fedora 30: nss FEDORA-2020-9254bf8b94 (Jan 30)

Updates the nss package to upstream NSS 3.49. For details about new functionality and a list of bugs fixed in this release please see the upstream release notes -


RedHat: RHSA-2020-0445:01 Important: Red Hat Single Sign-On 7.3.6 security (Feb 6)

A security update is now available for Red Hat Single Sign-On 7.3 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2020-0431:01 Important: ksh security update (Feb 5)

An update for ksh is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2020-0378:01 Important: ipa security and bug fix update (Feb 4)

An update for ipa is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2020-0375:01 Important: kernel-rt security and bug fix update (Feb 4)

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2020-0374:01 Important: kernel security and bug fix update (Feb 4)

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2020-0366:01 Important: qemu-kvm security, bug fix, (Feb 4)

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2020-0406:01 Important: containernetworking-plugins security (Feb 4)

An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2020-0339:01 Important: kernel security and bug fix update (Feb 4)

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2020-0335:01 Moderate: grub2 security update (Feb 4)

An update for grub2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

RedHat: RHSA-2020-0388:01 Important: sudo security update (Feb 4)

An update for sudo is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2020-0348:01 Important: container-tools:rhel8 security, bug fix, (Feb 4)

An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2020-0329:01 Moderate: go-toolset:rhel8 security update (Feb 4)

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2020-0328:01 Important: kernel-rt security and bug fix update (Feb 4)

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2020-0322:01 Critical: php:7.2 security update (Feb 3)

An update for the php:7.2 module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2020-0316:01 Important: git security update (Feb 3)

An update for git is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2020-0310:01 Important: rh-java-common-xmlrpc security update (Jan 30)

An update for rh-java-common-xmlrpc is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2020-0296:01 Important: openjpeg2 security update (Jan 30)

An update for openjpeg2 is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2020-0295:01 Critical: firefox security update (Jan 30)

An update for firefox is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

RedHat: RHSA-2020-0293:01 Important: SDL security update (Jan 30)

An update for SDL is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2020-0292:01 Important: thunderbird security update (Jan 30)

An update for thunderbird is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2020-0291:01 Important: fribidi security update (Jan 30)

An update for fribidi is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,


Slackware: 2020-031-01: sudo Security Update (Jan 31)

New sudo packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.


SUSE: 2020:0351-1 important: wicked (Feb 6)

An update that solves four vulnerabilities and has one errata is now available.

SUSE: 2020:0353-1 important: systemd (Feb 6)

An update that solves one vulnerability and has 13 fixes is now available.

SUSE: 2020:0352-1 moderate: php7 (Feb 6)

An update that fixes four vulnerabilities is now available.

SUSE: 2020:0348-1 moderate: nginx (Feb 6)

An update that fixes one vulnerability is now available.

SUSE: 2020:0347-1 important: wicked (Feb 6)

An update that fixes two vulnerabilities is now available.

SUSE: 2020:0346-1 important: libqt5-qtbase (Feb 6)

An update that solves one vulnerability and has one errata is now available.

SUSE: 2020:0349-1 important: libqt5-qtbase (Feb 6)

An update that fixes one vulnerability is now available.

SUSE: 2020:0334-1 important: xen (Feb 6)

An update that fixes 13 vulnerabilities is now available.

SUSE: 2020:0335-1 important: systemd (Feb 6)

An update that solves two vulnerabilities and has 12 fixes is now available.

SUSE: 2020:0331-1 important: systemd (Feb 5)

An update that solves one vulnerability and has 9 fixes is now available.

SUSE: 2020:0324-1 important: python-reportlab (Feb 5)

An update that fixes one vulnerability is now available.

SUSE: 2020:0320-1 important: terraform (Feb 4)

An update that fixes one vulnerability is now available.

SUSE: 2020:0318-1 important: libqt5-qtbase (Feb 4)

An update that fixes three vulnerabilities is now available.

SUSE: 2020:0317-1 important: libqt5-qtbase (Feb 4)

An update that fixes three vulnerabilities is now available.

SUSE: 2020:0319-1 important: libqt5-qtbase (Feb 4)

An update that fixes three vulnerabilities is now available.

SUSE: 2020:0311-1 critical: crowbar-core, crowbar-openstack, openstack-neutron-fwaas, rubygem-crowbar-client (Feb 3)

An update that fixes two vulnerabilities is now available.

SUSE: 2020:0302-1 important: python36 (Feb 3)

An update that solves 10 vulnerabilities and has 11 fixes is now available.

SUSE: 2020:0296-1 moderate: ceph (Jan 31)

An update that fixes two vulnerabilities is now available.

SUSE: 2020:0278-1 important: rmt-server (Jan 31)

An update that solves one vulnerability and has three fixes is now available.

SUSE: 2020:0267-1 moderate: php72 (Jan 30)

An update that fixes four vulnerabilities is now available.

SUSE: 2020:0266-1 important: tigervnc (Jan 30)

An update that solves 5 vulnerabilities and has three fixes is now available.

SUSE: 2020:0275-1 moderate: ImageMagick (Jan 30)

An update that solves two vulnerabilities and has one errata is now available.

SUSE: 2020:0264-1 important: wicked (Jan 30)

An update that fixes two vulnerabilities is now available.

SUSE: 2020:0265-1 moderate: e2fsprogs (Jan 30)

An update that fixes one vulnerability is now available.

SUSE: 2020:0263-1 important: wicked (Jan 30)

An update that fixes two vulnerabilities is now available.

SUSE: 2020:0262-1 moderate: glibc (Jan 30)

An update that solves one vulnerability and has four fixes is now available.

SUSE: 2020:0260-1 important: rmt-server (Jan 30)

An update that solves one vulnerability and has three fixes is now available.

SUSE: 2020:0261-1 important: java-1_8_0-openjdk (Jan 30)

An update that fixes 7 vulnerabilities is now available.


Ubuntu 4250-2: MariaDB vulnerability (Feb 6)

MariaDB clients could be made to crash if they received specially crafted input.

Ubuntu 4273-1: ReportLab vulnerability (Feb 6)

ReportLab could be made to run programs as your login if it opened a specially crafted file.

Ubuntu 4272-1: Pillow vulnerabilities (Feb 6)

Several security issues were fixed in Pillow.

Ubuntu 4271-1: Mesa vulnerability (Feb 6)

Mesa could be made to expose sensitive information.

Ubuntu 4270-1: Exiv2 vulnerability (Feb 5)

Exiv2 could be made to crash if it opened a specially crafted image.

Ubuntu 4267-1: ARM mbed TLS vulnerabilities (Feb 5)

Several security issues were fixed in mbedtls.

Ubuntu 4269-1: systemd vulnerabilities (Feb 5)

Several security issues were fixed in systemd.

Ubuntu 4268-1: OpenSMTPD vulnerability (Feb 5)

OpenSMTPD could be made to run programs as root if it received specially crafted input over the network.

Ubuntu 4263-2: Sudo vulnerability (Feb 5)

Sudo could allow unintended access to the administrator account.

Ubuntu 4265-2: SpamAssassin vulnerabilities (Feb 4)

Several security issues were fixed in SpamAssassin.

Ubuntu 4265-1: SpamAssassin vulnerabilities (Feb 4)

Several security issues were fixed in SpamAssassin.

Ubuntu 4264-1: Django vulnerability (Feb 4)

Django could be vulnerable to SQL injection attacks.

Ubuntu 4263-1: Sudo vulnerability (Feb 3)

Sudo could allow unintended access to the administrator account.

Ubuntu 0062-1: Linux kernel vulnerability (Feb 3)

Several security issues were fixed in the kernel.

Ubuntu 4262-1: OpenStack Keystone vulnerability (Jan 30)

OpenStack Keystone could be made to expose sensitive information over the network.


Debian LTS: DLA-2096-1: ruby-rack-cors security update (Feb 6)

This package allowed ../ directory traversal to access private resources because resource matching did not ensure that pathnames were in a canonical format.

Debian LTS: DLA-2095-1: storebackup security update (Feb 5)

storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation.

Debian LTS: DLA-2094-1: sudo security update (Feb 1)

A stack-based buffer overflow vulnerability in sudo, a program designed to provide limited super user privileges to specific users, triggerable when configured with the pwfeedback option enabled. An unprivileged user

Debian LTS: DLA-2093-1: firefox-esr security update (Feb 1)

An issue was found in the IonMonkey JIT compiler of the Mozilla Firefox web browser which could lead to arbitrary code execution. For Debian 8 "Jessie", this problem has been fixed in version

Debian LTS: DLA-2092-1: qtbase-opensource-src security update (Jan 31)

In Qt5's plugin loader code as found in qtbase-opensource-src, it was possible to (side-)load plugins from "the" local folder in addition to a system-widely defined library path.

Debian LTS: DLA-2091-1: libjackson-json-java security update (Jan 31)

Several vulnerabilities were fixed in libjackson-json-java. CVE-2017-7525

Debian LTS: DLA-2090-1: qemu security update (Jan 30)

tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanag es memory, as demonstrated by IRC DCC commands in EMU_IRC.

Debian LTS: DLA-2089-1: openjpeg2 security update (Jan 30)

opj_t1_clbl_decode_processor in openjp2/t1.c of OpenJPEG had a heap-based buffer overflow in the qmfbid==1 case, a similar but different issue than CVE-2020-6851.

Debian LTS: DLA-2088-1: libsolv security update (Jan 30)

repodata_schema2id in repodata.c in libsolv, a dependency solver library, had a heap-based buffer over-read via a last schema whose length could be less than the length of the input schema.

Debian LTS: DLA-2078-1: libxmlrpc3-java security update (Jan 30)

An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code.

Debian LTS: DLA-2087-1: suricata security update (Jan 30)

Two vulnerabilities have recently been discovered in the stream-tcp code of the intrusion detection and prevention tool Suricata.


ArchLinux: 202002-3: chromium: multiple issues (Feb 7)

The package chromium before version 80.0.3987.87-1 is vulnerable to multiple issues including arbitrary code execution, access restriction bypass, information disclosure, insufficient validation and content spoofing.

ArchLinux: 202002-2: sudo: privilege escalation (Feb 6)

The package sudo before version 1.8.31-1 is vulnerable to privilege escalation.

ArchLinux: 202002-2: sudo: privilege escalation (Feb 6)

The package sudo before version 1.8.31-1 is vulnerable to privilege escalation.

ArchLinux: 202002-1: python-django: sql injection (Feb 6)

The package python-django before version 3.0.3-1 is vulnerable to sql injection.

ArchLinux: 202001-7: salt: arbitrary command execution (Feb 4)

The package salt before version 2019.2.3-1 is vulnerable to arbitrary command execution.

ArchLinux: 202001-6: opensmtpd: arbitrary command execution (Jan 31)

The package opensmtpd before version 6.6.2p1-1 is vulnerable to arbitrary command execution.


CentOS: CESA-2019-2079: Moderate CentOS 7 xorg-x11-drv-ati (Feb 5)

Upstream details at : https://access.redhat.com/errata/RHSA-2019:2079

CentOS: CESA-2018-2916: Important CentOS 7 spamassassin (Feb 5)

Upstream details at : https://access.redhat.com/errata/RHSA-2018:2916

CentOS: CESA-2020-0366: Important CentOS 7 qemu-kvm (Feb 5)

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0366

CentOS: CESA-2020-0375: Important CentOS 7 kernel (Feb 5)

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0375

CentOS: CESA-2020-0316: Important CentOS 6 git (Feb 3)

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0316


SciLinux: SLSA-2020-0374-1 Important: kernel on SL7.x x86_64 (Feb 6)

kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816) * kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c (CVE-2019-14895) * kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901) * kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c [More...]

SciLinux: SLSA-2020-0378-1 Important: ipa on SL7.x x86_64 (Feb 5)

ipa: Denial of service in IPA server due to wrong use of ber_scanf() (CVE-2019-14867) * ipa: Batch API logging user passwords to /var/log/httpd/error_log (CVE-2019-10195) SL7 x86_64 ipa-client-4.6.5-11.el7_7.4.x86_64.rpm ipa-debuginfo-4.6.5-11.el7_7.4.x86_64.rpm ipa-server-4.6.5-11.el7_7.4.x86_64.rpm ipa-server-trust-ad-4.6.5-11.el7_7.4.x86_64.rpm noarch ipa-client-co [More...]

SciLinux: SLSA-2020-0366-1 Important: qemu-kvm on SL7.x x86_64 (Feb 5)

hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) SL7 x86_64 qemu-img-1.5.3-167.el7_7.4.x86_64.rpm qemu-kvm-1.5.3-167.el7_7.4.x86_64.rpm qemu-kvm-common-1.5.3-167.el7_7.4.x86_64.rpm qemu-kvm-debuginfo-1.5.3-167.el7_7.4.x86_64.rpm qemu-kvm-tools-1.5.3-167.el7_7.4.x86_64.rpm - Scien [More...]

SciLinux: SLSA-2020-0316-1 Important: git on SL6.x i386/x86_64 (Feb 3)

git: arbitrary code execution via .gitmodules (CVE-2018-17456) SL6 x86_64 git-1.7.1-10.el6_10.x86_64.rpm git-daemon-1.7.1-10.el6_10.x86_64.rpm git-debuginfo-1.7.1-10.el6_10.x86_64.rpm i386 git-1.7.1-10.el6_10.i686.rpm git-daemon-1.7.1-10.el6_10.i686.rpm git-debuginfo-1.7.1-10.el6_10.i686.rpm noarch emacs-git-1.7.1-10.el6_10.noarch.rpm emacs-git-el-1.7.1- [More...]

SciLinux: SLSA-2020-0262-1 Important: openjpeg2 on SL7.x x86_64 (Jan 30)

openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor() (CVE-2020-6851) SL7 x86_64 openjpeg2-2.3.1-2.el7_7.i686.rpm openjpeg2-2.3.1-2.el7_7.x86_64.rpm openjpeg2-debuginfo-2.3.1-2.el7_7.i686.rpm openjpeg2-debuginfo-2.3.1-2.el7_7.x86_64.rpm openjpeg2-devel-2.3.1-2.el7_7.i686.rpm openjpeg2-devel-2.3.1-2.el7_7.x86_64.rpm openjpeg2-tools-2.3.1-2.el7_7. [More...]


openSUSE: 2020:0179-1: moderate: ucl (Feb 6)

An update that fixes one vulnerability is now available.

openSUSE: 2020:0180-1: moderate: upx (Feb 6)

An update that fixes 5 vulnerabilities is now available.

openSUSE: 2020:0170-1: moderate: ImageMagick (Feb 5)

An update that solves two vulnerabilities and has one errata is now available.

openSUSE: 2020:0165-1: important: wicked (Feb 4)

An update that fixes two vulnerabilities is now available.

openSUSE: 2020:0166-1: moderate: e2fsprogs (Feb 4)

An update that fixes one vulnerability is now available.

openSUSE: 2020:0163-1: moderate: upx (Feb 4)

An update that fixes 5 vulnerabilities is now available.

openSUSE: 2020:0160-1: important: python-reportlab (Feb 4)

An update that fixes one vulnerability is now available.

openSUSE: 2020:0162-1: moderate: ucl (Feb 4)

An update that fixes one vulnerability is now available.

openSUSE: 2020:0156-1: moderate: mailman (Feb 4)

An update that fixes one vulnerability is now available.


Mageia 2020-0074: openjpeg2 security update (Feb 4)

opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different issue than CVE-2020-6851. (CVE-2020-8112) References:

Mageia 2020-0073: kernel security update (Feb 4)

This update is based on upstream 5.4.17 and fixes atleast the following security vulnerabilities: In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest.

Mageia 2020-0072: mariadb security update (Jan 30)

Updated MariaDB packages fix security vulnerabilities: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized

Mageia 2020-0071: openjpeg2 security update (Jan 30)

Updated openjpeg2 packages fix security vulnerability: OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in libopenjp2.so (CVE-2020-6851).

Mageia 2020-0070: sqlite3 security update (Jan 30)

Updated sqlite3 packages fix security vulnerabilities: An out of bounds write flaw (CVE-2019-13734), insufficient data validation flaw (CVE-2019-13750), uninitialized use flaw (CVE-2019-13751), and out of bounds read flaws (CVE-2019-13752, CVE-2019-13753) in SQLite before 3.31.0.

Mageia 2020-0069: java-1.8.0-openjdk security update (Jan 30)

The updated packages fix security vulnerabilities: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590)

Mageia 2020-0068: gdal security update (Jan 30)

Updated gdal packages fix security vulnerability: Double free vulnerability in OGRExpatRealloc (CVE-2019-17545). Also, the gdalinfo command, which had been built incorrectly,