Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.


LinuxSecurity.com Feature Extras:

Encryption: An Essential Yet Highly Controversial Component of Digital Security - If youve been keeping up with recent security news, you are most likely aware of the heated worldwide debate about encryption that is currently underway. Strong encryption is imperative to securing sensitive data and protecting individuals privacy online, yet governments around the world refuse to recognize this, and are continually aiming to break encryption in an effort to increase the power of their law enforcement agencies.

Linux: An OS Capable of Effectively Meeting the US Governments Security Needs Heading into 2020 - As Open Source has become increasingly mainstream and widely accepted for its numerous benefits, the use of Linux as a flexible, transparent and highly secure operating system has also increasingly become a prominent choice among corporations, educational institutions and government sectors alike. With national security concerns at an all time high heading into 2020, it appears that the implementation of Linux could effectively meet the United States governments critical security needs for application development and installations.


  Debian: DSA-4609-1: python-apt security update (Jan 23)
 

Two security issues were found in the Python interface to the apt package manager; package downloads from unsigned repositories were incorrectly rejected and the hash validation relied on MD5.

  Debian: DSA-4608-1: tiff security update (Jan 21)
 

Multiple integer overflows have been discovered in the libtiff library and the included tools. For the stable distribution (buster), these problems have been fixed in

  Debian: DSA-4607-1: openconnect security update (Jan 20)
 

Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP in openconnect, an open client for Cisco AnyConnect, Pulse and GlobalProtect VPN. A malicious HTTP server (after having accepted its identity certificate), can provide bogus chunk lengths for chunked HTTP

  Debian: DSA-4606-1: chromium security update (Jan 20)
   
  Debian: DSA-4605-1: openjdk-11 security update (Jan 19)
 

Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, incorrect implementation of Kerberos GSSAPI and TGS requests or incorrect TLS handshakes.

  Debian: DSA-4604-1: cacti security update (Jan 19)
 

Multiple issues have been found in cacti, a server monitoring system, potentially resulting in SQL code execution or information disclosure by authenticated users.

  Debian: DSA-4603-1: thunderbird security update (Jan 17)
 

Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code or information disclosure.

 
  Fedora 30: thunderbird-enigmail FEDORA-2020-dc41c28f86 (Jan 21)
 

update to enigmail 2.1.5 Includes a security fix for "Unsigned MIME parts displayed as signed"

  Fedora 31: e2fsprogs FEDORA-2020-a724cc7926 (Jan 20)
 

Fixes ----- A maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck. (Addresses CVE-2019-5094) E2fsck now checks to make sure the casefold flag is only set on directories, and only when the casefold feature is enabled. E2fsck will not disable the low dtime checks when using a backup superblock where the last mount time is zero. This fixes a

  Fedora 31: kernel FEDORA-2020-e328697628 (Jan 20)
 

Update to Linux v5.4.12 ---- Update to Linux v5.4.11

  Fedora 31: nss FEDORA-2020-72912bb14c (Jan 20)
 

Updates the nss package to upstream NSS 3.49. For details about new functionality and a list of bugs fixed in this release please see the upstream release notes *

  Fedora 30: kernel FEDORA-2020-c2d89d14d0 (Jan 20)
 

Update to Linux v5.4.12 ---- Update to Linux v5.4.11

  Fedora 31: glibc FEDORA-2020-1a3bdfde17 (Jan 20)
 

This update fixes a minor security vulnerability ([`LD_PREFER_MAP_32BIT_EXEC` not ignored in setuid binaries](https://bugzilla.redhat.com/show_bug.cgi?id=1774682) and addresses are long-standing bug where missing shared objects could cause crashes due to incorrectly handled `dlopen` failures (RHBZ#1395758). The latter fix also causes

  Fedora 30: chromium FEDORA-2020-4355ea258e (Jan 18)
 

Update to 79.0.3945.117. Fixes CVE-2020-6377. ---- Security fix for CVE-2019-13767. ---- Update to Chromium 79. Fixes the usual giant pile of bugs and security issues. This time, the list is: CVE-2019-13725 CVE-2019-13726 CVE-2019-13727 CVE-2019-13728 CVE-2019-13729 CVE-2019-13730 CVE-2019-13732 CVE-2019-13734 CVE-2019-13735 CVE-2019-13764 CVE-2019-13736 CVE-2019-13737

  Fedora 31: rubygem-rack FEDORA-2020-57fc0d0156 (Jan 18)
 

Update to Rack 2.0.8.

  Fedora 31: ImageMagick FEDORA-2020-f006145643 (Jan 17)
 

Security and bug fixes.

  Fedora 31: rubygem-rmagick FEDORA-2020-f006145643 (Jan 17)
 

Security and bug fixes.

  Fedora 31: xar FEDORA-2020-6490123c7c (Jan 17)
 

- Update to 1.6.1 - Change upstream - Exclude CVE-2010-0055 patch, includes in upstream - Exclude norpath patch, using sed - Pass FTBFS state #1676224 - General clean of the spec - Use Fedora guide lines in Source URL

  Fedora 31: gnulib FEDORA-2020-663f619e9c (Jan 17)
 

Security fix for [CVE-2018-17942] - Update on 2020-01-07 - CVE-2018-17942

  Fedora 31: python-django FEDORA-2020-adb4f0143a (Jan 17)
 

fix CVE-2019-19844 (rhbz#1788426)

  Fedora 31: jetty FEDORA-2020-4913d43d77 (Jan 17)
 

Security fix for CVE-2019-17632

  Fedora 30: phpMyAdmin FEDORA-2020-cb89758335 (Jan 16)
 

**Version 4.9.4** (2020-01-07) - issue #15724 Fix 2FA was disabled by a bug - issue [security] Fix SQL injection vulnerability on the user accounts page (PMASA-2020-1) ---- **Version 4.9.3** (2019-12-26) - issue #15570 Fix page contents go underneath of floating menubar in some cases - issue #15591 Fix php notice 'Undefined index: foreign_keys_data' on relations view when the user

  Fedora 30: gnulib FEDORA-2020-acac61cfd0 (Jan 16)
 

Security fix for [CVE-2018-17942] - Update on 2020-01-07 - CVE-2018-17942

  Fedora 31: thunderbird FEDORA-2020-01411d96d5 (Jan 16)
 

Update to latest upstream version

  Fedora 31: ocsinventory-agent FEDORA-2020-4c8a066b83 (Jan 16)
 

Per Upstream, a malicious CA could result in unexpected inventory access with the System CA patch. The risk is very low. That patch is now dropped.

 
  RedHat: RHSA-2020-0222:01 Important: ghostscript security update (Jan 23)
 

An update for ghostscript is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0218:01 Moderate: Ansible security and bug fix update (Jan 23)
 

An update for ansible is now available for Ansible Engine 2 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0215:01 Moderate: Ansible security and bug fix update (Jan 23)
 

An update for ansible is now available for Ansible Engine 2.9 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0216:01 Moderate: Ansible security and bug fix update (Jan 23)
 

An update for ansible is now available for Ansible Engine 2.8 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0217:01 Moderate: Ansible security and bug fix update (Jan 23)
 

An update for ansible is now available for Ansible Engine 2.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0214:01 Important: chromium-browser security update (Jan 23)
 

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0204:01 Important: kernel security and bug fix update (Jan 22)
 

An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0203:01 Important: libarchive security update (Jan 22)
 

An update for libarchive is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0202:01 Important: java-1.8.0-openjdk security update (Jan 22)
 

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0201:01 Important: python-reportlab security update (Jan 22)
 

An update for python-reportlab is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0199:01 Critical: openslp security update (Jan 22)
 

An update for openslp is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0172:01 Moderate: openvswitch2.12 security and bug fix (Jan 21)
 

An update for openvswitch2.12 is now available for Fast Datapath for RHEL 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0171:01 Moderate: openvswitch2.11 security and bug fix (Jan 21)
 

An update for openvswitch2.11 is now available for Fast Datapath for RHEL 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0196:01 Important: java-1.8.0-openjdk security update (Jan 21)
 

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0195:01 Important: python-reportlab security update (Jan 21)
 

An update for python-reportlab is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0197:01 Important: python-reportlab security update (Jan 21)
 

An update for python-reportlab is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0194:01 Important: apache-commons-beanutils security (Jan 21)
 

An update for apache-commons-beanutils is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0192:01 Moderate: Open Liberty 20.0.0.1 Runtime security (Jan 21)
 

A security update is now available for Open Liberty 20.0.0.1 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0179:01 Moderate: kernel security and bug fix update (Jan 21)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0168:01 Moderate: openvswitch2.12 security and bug fix (Jan 21)
 

An update for openvswitch2.12 is now available for Fast Datapath for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0178:01 Important: kernel security and enhancement update (Jan 21)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.

  RedHat: RHSA-2020-0174:01 Important: kernel-alt security and bug fix update (Jan 21)
 

An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0074:01 Low: OpenShift Container Platform 4.1 (Jan 21)
 

An update for openshift-enterprise-cli-container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0166:01 Moderate: openvswitch2.11 security and bug fix (Jan 21)
 

An update for openvswitch2.11 is now available for Fast Datapath for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0165:01 Moderate: openvswitch security and bug fix update (Jan 21)
 

An update for openvswitch is now available for Fast Datapath for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0160:01 Important: Red Hat JBoss Enterprise Application (Jan 20)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0161:01 Important: Red Hat JBoss Enterprise Application (Jan 20)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0157:01 Important: java-1.8.0-openjdk security update (Jan 20)
 

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0159:01 Important: Red Hat JBoss Enterprise Application (Jan 20)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0164:01 Important: Red Hat JBoss Enterprise Application (Jan 20)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 7.2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0134:01 Critical: .NET Core on Red Hat Enterprise Linux (Jan 16)
 

An update for rh-dotnet30-dotnet and rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0132:01 Moderate: Red Hat Process Automation Manager (Jan 16)
 

An update is now available for Red Hat Process Automation Manager. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0133:01 Moderate: Red Hat Decision Manager 7.6.0 Security (Jan 16)
 

An update is now available for Red Hat Decision Manager. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0130:01 Critical: .NET Core on Red Hat Enterprise Linux (Jan 16)
 

An update for dotnet3.0 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0124:01 Important: git security update (Jan 16)
 

An update for git is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0122:01 Important: java-11-openjdk security update (Jan 16)
 

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0128:01 Important: java-11-openjdk security update (Jan 16)
 

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0127:01 Important: thunderbird security update (Jan 16)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0120:01 Important: thunderbird security update (Jan 16)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0123:01 Important: thunderbird security update (Jan 16)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

 
  SUSE: 2020:0226-1 important: tomcat (Jan 24)
 

An update that solves three vulnerabilities and has one errata is now available.

  SUSE: 2020:0228-1 moderate: slurm (Jan 24)
 

An update that solves one vulnerability and has two fixes is now available.

  SUSE: 2020:0224-1 moderate: samba (Jan 23)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:0223-1 moderate: samba (Jan 23)
 

An update that solves three vulnerabilities and has one errata is now available.

  SUSE: 2020:0183-1 important: the Linux Kernel (Live Patch 0 for SLE 12 SP5) (Jan 22)
 

An update that solves 5 vulnerabilities and has three fixes is now available.

  SUSE: 2020:0213-1 important: java-11-openjdk (Jan 22)
 

An update that fixes 7 vulnerabilities is now available.

  SUSE: 2020:0204-1 important: the Linux Kernel (Live Patch 33 for SLE 12 SP1) (Jan 22)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:0159-1 important: tigervnc (Jan 22)
 

An update that solves 5 vulnerabilities and has one errata is now available.

  SUSE: 2020:0152-1 moderate: samba (Jan 21)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0146-1 moderate: Mesa (Jan 21)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0145-1 moderate: Mesa (Jan 21)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0142-1 important: MozillaThunderbird (Jan 20)
 

An update that fixes 7 vulnerabilities is now available.

  SUSE: 2020:0143-1 important: libvpx (Jan 20)
 

An update that fixes 5 vulnerabilities is now available.

  SUSE: 2020:0132-1 moderate: Mesa (Jan 20)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0139-1 important: libssh (Jan 20)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0130-1 important: libssh (Jan 20)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0129-1 important: libssh (Jan 20)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0140-1 important: java-11-openjdk (Jan 20)
 

An update that fixes 7 vulnerabilities is now available.

  SUSE: 2020:0131-1 important: libssh (Jan 20)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0121-1 moderate: LibreOffice (Jan 17)
 

An update that solves one vulnerability and has two fixes is now available.

  SUSE: 2020:0118-1 moderate: fontforge (Jan 16)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:0110-1 important: slurm (Jan 16)
 

An update that solves three vulnerabilities and has three fixes is now available.

  SUSE: 2020:0111-1 moderate: Mesa (Jan 16)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0112-1 important: tigervnc (Jan 16)
 

An update that fixes 5 vulnerabilities is now available.

  SUSE: 2020:0113-1 important: tigervnc (Jan 16)
 

An update that fixes 5 vulnerabilities is now available.

  SUSE: 2020:0114-1 important: python3 (Jan 16)
 

An update that solves 26 vulnerabilities and has 30 fixes is now available.

  SUSE: 2020:0115-1 moderate: shibboleth-sp (Jan 16)
 

An update that fixes one vulnerability is now available.

 
  Ubuntu: Ubuntu 19.04 (Disco Dingo) End of Life reached on January 23 2020 (Jan 23)
   
  Ubuntu 4230-2: ClamAV vulnerability (Jan 23)
 

ClamAV could be made to crash if it opened a specially crafted file.

  Ubuntu 4233-2: GnuTLS update (Jan 23)
 

USN-4233-1 marked SHA1 as untrusted in GnuTLS with no workaround.

  Ubuntu 4247-3: python-apt vulnerabilities (Jan 23)
 

Several security issues were fixed in python-apt.

  Ubuntu 4249-1: e2fsprogs vulnerability (Jan 23)
 

e2fsprogs could be made to execute arbitrary code if it was running in a crafted ext4 partition.

  Ubuntu 4247-2: python-apt regression (Jan 22)
 

USN-4247-1 introduced a regression in python-apt.

  Ubuntu 4246-1: zlib vulnerabilities (Jan 22)
 

Several security issues were fixed in zlib

  Ubuntu 4248-1: GraphicsMagick vulnerabilities (Jan 22)
 

Several security issues were fixed in GraphicsMagick.

  Ubuntu 4247-1: python-apt vulnerabilities (Jan 22)
 

Several security issues were fixed in python-apt.

  Ubuntu 4245-1: PySAML2 vulnerability (Jan 21)
 

PySAML2 could be made to bypass signature verification with arbitrary data.

  Ubuntu 4244-1: Samba vulnerabilities (Jan 21)
 

Several security issues were fixed in Samba.

  Ubuntu 4243-1: libbsd vulnerabilities (Jan 20)
 

Several security issues were fixed in libbsd.

  Ubuntu 4242-1: Sysstat vulnerabilities (Jan 20)
 

Several security issues were fixed in Sysstat.

  Ubuntu 4225-2: Linux kernel (HWE) vulnerabilities (Jan 18)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4241-1: Thunderbird vulnerabilities (Jan 16)
 

Several security issues were fixed in Thunderbird.

  Ubuntu 4240-1: Kamailio vulnerability (Jan 16)
 

kamailio could be made to crash if it opened a specially crafted file.

 
  Debian LTS: DLA-2074-1: python-apt security update (Jan 23)
 

Several issues have been found in python-apt, a python interface to libapt-pkg. CVE-2019-15795

  Debian LTS: DLA-2059-1: git security update (Jan 23)
 

Several vulnerabilities have been discovered in git, a fast, scalable, distributed revision control system.

  Debian LTS: DLA-2073-1: transfig security update (Jan 21)
 

Several issues have been found in transfig, a XFig figure files converter. CVE-2018-16140

  Debian LTS: DLA-2072-1: gpac security update (Jan 20)
 

Multiple issues were found in gpac, a multimedia framework featuring the MP4Box muxer. CVE-2018-21015

  Debian LTS: DLA-2071-1: thunderbird security update (Jan 20)
 

Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code or information disclosure.

  Debian LTS: DLA-2070-1: ruby-excon security update (Jan 19)
 

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests

  Debian LTS: DLA-2069-1: cacti security update (Jan 18)
 

It was discovered that there were a number of cross-site scripting vulnerabilities in cacti, a web interface for monitoring systems. For Debian 8 "Jessie", this issue has been fixed in cacti version

  Debian LTS: DLA-2068-1: linux security update (Jan 17)
 

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, or information leak.

 
  ArchLinux: 202001-5: chromium: multiple issues (Jan 17)
 

The package chromium before version 79.0.3945.130-1 is vulnerable to multiple issues including arbitrary code execution and insufficient validation.

 
  CentOS: CESA-2020-0124: Important CentOS 7 git (Jan 18)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0124

  CentOS: CESA-2020-0122: Important CentOS 7 java-11-openjdk (Jan 18)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0122

  CentOS: CESA-2020-0122: Important CentOS 6 java-11-openjdk (Jan 18)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0122

  CentOS: CESA-2020-0124: Important CentOS 6 git (Jan 18)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0124

  CentOS: CESA-2020-0120: Important CentOS 7 thunderbird (Jan 18)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0120

  CentOS: CESA-2020-0123: Important CentOS 6 thunderbird (Jan 18)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0123

 
  SciLinux: SLSA-2020-0199-1 Critical: openslp on SL6.x i386/x86_64 (Jan 22)
 

openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution (CVE-2019-5544) SL6 x86_64 openslp-2.0.0-4.el6_10.i686.rpm openslp-2.0.0-4.el6_10.x86_64.rpm openslp-debuginfo-2.0.0-4.el6_10.i686.rpm openslp-debuginfo-2.0.0-4.el6_10.x86_64.rpm openslp-devel-2.0.0-4.el6_10.i686.rpm openslp-devel-2.0.0-4.el6_10.x86_64.rpm o [More...]

  SciLinux: SLSA-2020-0203-1 Important: libarchive on SL7.x x86_64 (Jan 22)
 

libarchive: use-after-free in archive_read_format_rar_read_data when there is an error in the decompression of an archive entry (CVE-2019-18408) SL7 x86_64 libarchive-3.1.2-14.el7_7.i686.rpm libarchive-3.1.2-14.el7_7.x86_64.rpm libarchive-debuginfo-3.1.2-14.el7_7.i686.rpm libarchive-debuginfo-3.1.2-14.el7_7.x86_64.rpm bsdcpio-3.1.2-14.el7_7.x86_64.rpm bsdtar-3.1.2-14 [More...]

  SciLinux: SLSA-2020-0194-1 Important: apache-commons-beanutils on SL7.x (noarch) (Jan 22)
 

apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086) SL7 noarch apache-commons-beanutils-1.8.3-15.el7_7.noarch.rpm apache-commons-beanutils-javadoc-1.8.3-15.el7_7.noarch.rpm - Scientific Linux Development Team

  SciLinux: SLSA-2020-0197-1 Important: python-reportlab on SL6.x i386/x86_64 (Jan 22)
 

python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626) SL6 x86_64 python-reportlab-2.3-3.el6_10.1.x86_64.rpm python-reportlab-debuginfo-2.3-3.el6_10.1.x86_64.rpm i386 python-reportlab-2.3-3.el6_10.1.i686.rpm python-reportlab-debuginfo-2.3-3.el6_10.1.i686.rpm noarch python-reportlab-docs-2.3-3.el6_10.1.noarch.rpm - Scientific L [More...]

  SciLinux: SLSA-2020-0195-1 Important: python-reportlab on SL7.x x86_64 (Jan 22)
 

python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626) SL7 x86_64 python-reportlab-2.5-9.el7_7.1.x86_64.rpm python-reportlab-debuginfo-2.5-9.el7_7.1.x86_64.rpm python-reportlab-docs-2.5-9.el7_7.1.x86_64.rpm - Scientific Linux Development Team

  SciLinux: SLSA-2020-0196-1 Important: java-1.8.0-openjdk on SL7.x x86_64 (Jan 22)
 

OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization iss [More...]

  SciLinux: SLSA-2020-0157-1 Important: java-1.8.0-openjdk on SL6.x i386/x86_64 (Jan 21)
 

OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization iss [More...]

  SciLinux: SLSA-2020-0123-1 Important: thunderbird on SL6.x i386/x86_64 (Jan 17)
 

Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) * Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) * Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) * Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) * Mozilla: CSS sanitization does not escape HTML tags (CVE-2019- [More...]

  SciLinux: SLSA-2020-0120-1 Important: thunderbird on SL7.x x86_64 (Jan 17)
 

Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) * Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) * Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) * Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) * Mozilla: CSS sanitization does not escape HTML tags (CVE-2019- [More...]

  SciLinux: SLSA-2020-0124-1 Important: git on SL7.x x86_64 (Jan 16)
 

git: Remote code execution in recursive clones with nested submodules (CVE-2019-1387) SL7 x86_64 git-1.8.3.1-21.el7_7.x86_64.rpm git-daemon-1.8.3.1-21.el7_7.x86_64.rpm git-debuginfo-1.8.3.1-21.el7_7.x86_64.rpm git-gnome-keyring-1.8.3.1-21.el7_7.x86_64.rpm git-svn-1.8.3.1-21.el7_7.x86_64.rpm noarch emacs-git-1.8.3.1-21.el7_7.noarch.rpm emacs-git-el-1.8.3.1-21.el [More...]

  SciLinux: SLSA-2020-0122-1 Important: java-11-openjdk on SL7.x x86_64 (Jan 16)
 

OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization iss [More...]

 
  openSUSE: 2020:0096-1: moderate: libredwg (Jan 23)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2020:0095-1: moderate: libredwg (Jan 22)
 

An update that solves 17 vulnerabilities and has one errata is now available.

  openSUSE: 2020:0093-1: important: chromium (Jan 22)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2020:0094-1: important: MozillaThunderbird (Jan 22)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2020:0093-1: important: chromium (Jan 22)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2020:0089-1: moderate: fontforge (Jan 21)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0086-1: important: python3 (Jan 21)
 

An update that solves 26 vulnerabilities and has 30 fixes is now available.

  openSUSE: 2020:0087-1: important: tigervnc (Jan 21)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2020:0085-1: important: slurm (Jan 21)
 

An update that solves three vulnerabilities and has three fixes is now available.

  openSUSE: 2020:0084-1: moderate: Mesa (Jan 21)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0080-1: moderate: php7 (Jan 20)
 

An update that fixes four vulnerabilities is now available.

  openSUSE: 2020:0079-1: moderate: glusterfs (Jan 20)
 

An update that fixes 14 vulnerabilities is now available.

  openSUSE: 2020:0069-1: important: uftpd (Jan 18)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0068-1: moderate: libredwg (Jan 17)
 

An update that solves 17 vulnerabilities and has one errata is now available.

  openSUSE: 2020:0067-1: moderate: icingaweb2 (Jan 16)
 

An update that solves 5 vulnerabilities and has one errata is now available.

  openSUSE: 2020:0067-1: moderate: icingaweb2 (Jan 16)
 

An update that solves 5 vulnerabilities and has one errata is now available.

 
  Mageia 2020-0046: ffmpeg security update (Jan 22)
 

Updated ffmpeg packages fix security vulnerabilities: This update provides ffmpeg version 4.1.5, which fixes several bugs, and atleasst the follwing security vulnerabilities:

  Mageia 2020-0045: sox security update (Jan 22)
 

Updated sox packages fix security vulnerabilities: It was discovered that SoX incorrectly handled certain MP3 files. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-8354, CVE-2019-8355, CVE-2019-8356, CVE-2019-8357)

  Mageia 2020-0044: wireshark security update (Jan 19)
 

Updated wireshark packages fix security vulnerability: BT ATT dissector crash (CVE-2020-7045). References:

  Mageia 2020-0043: suricata security update (Jan 19)
 

Updated suricata packages fix security vulnerabilities: The suricata package has been updated to version 4.1.6, which fixes security issues and other bugs. See the upstream announcements for details.

  Mageia 2020-0042: tigervnc security update (Jan 19)
 

Updated tigervnc packages fix security vulnerabilities: The tigervnc package has been updated to version 1.10.1 to fix multiple unspecified security issues. These issues affect both the client and server and could theoretically allow an malicious peer to take control over the

  Mageia 2020-0041: kernel security update (Jan 17)
 

This update is based on upstream 5.4.12 and fixes atleast the following security vulnerabilities: Intel GPU Hardware prior to Gen11 does not clear EU state during a context switch. This can result in information leakage between

  Mageia 2020-0040: libjpeg security update (Jan 17)
 

The updated packages fix security vulnerabilities: A signed integer overflow and subsequent segfault that occurred when attempting to decompress images with more than 715827882 pixels using the 64-bit C version of TJBench.

  Mageia 2020-0039: e2fsprogs security update (Jan 17)
 

Updated e2fsprogs packages fix security vulnerability: A code execution vulnerability in the directory rehashing functionality (CVE-2019-5188).