Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Open-Source AI Projects For Linux - It seems like artificial intelligence (AI) has made its way into nearly every facet of modern life. Programs like the Amazon Alexa, Apples Siri and Microsofts Cortana are used by millions of people around the world. By the year 2022, over 50 percent of the online searches performed will be done with AI and the power of the human voice.

Five Open-Source Projects AI Enthusiasts Might Want to Know About - Linux is arguably software developers favorite OS. Over 14,000 contributors have invested countless hours in developing the Linux Kernel. With Linux becoming increasingly popular due to its security and flexibility, developers who are interested in artificial intelligence (AI) may want to explore the possibilities within the Linux environment.


  Fedora 31: sudo FEDORA-2020-8b563bc5f4 (Mar 5)
 

- update to latest development version 1.9.0b1 - added sudo_logsrvd and sudo_sendlog to files and their appropriate man pages Resolves: rhbz#1787823 - Stack based buffer overflow in when pwfeedback is enabled Resolves: rhbz#1796945 - fixes: CVE-2019-18634 - By using ! character in the shadow file instead of a password hash can access to a run as all sudoer account Resolves: rhbz#1786709 -


  RedHat: RHSA-2020-0652:01 Moderate: OpenShift Container Platform 4.2.21 (Mar 5)
 

An update for ose-installer-artifacts-container and ose-installer-container is now available for Red Hat OpenShift Container Platform 4.2. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-0734:01 Moderate: Red Hat OpenShift Service Mesh 1.0.9 (Mar 5)
 

Red Hat OpenShift Service Mesh 1.0.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0731:01 Important: virt:8.1 and virt-devel:8.1 security (Mar 5)
 

An update for the virt:8.1 and virt-devel:8.1 modules is now available for Advanced Virtualization for RHEL 8.1.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0730:01 Important: qemu-kvm-rhev security, bug fix, (Mar 5)
 

An update for qemu-kvm-rhev is now available for Red Hat Virtualization Engine 4.2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0726:01 Important: sudo security update (Mar 5)
 

An update for sudo is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0729:01 Important: Red Hat Data Grid 7.3.5 security update (Mar 5)
 

An update for Red Hat Data Grid is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0728:01 Moderate: Red Hat Data Grid 7.3.4 security update (Mar 5)
 

An update for Red Hat Data Grid is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-0727:01 Important: Red Hat Data Grid 7.3.3 security update (Mar 5)
 

An update for Red Hat Data Grid is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-0720:01 Low: python-waitress security update (Mar 5)
 

An update for python-waitress is now available for Red Hat OpenStack Platform 15 (Stein). Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-0721:01 Moderate: openstack-octavia security update (Mar 5)
 

An update for openstack-octavia is now available for Red Hat OpenStack Platform 15 (Stein). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which


  SUSE: 2020:0601-1 moderate: gimp (Mar 6)
 

An update that solves three vulnerabilities and has one errata is now available.

  SUSE: 2020:0604-1 moderate: librsvg (Mar 6)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:0605-1 moderate: the Linux Kernel (Mar 6)
 

An update that solves 11 vulnerabilities and has 57 fixes is now available.

  SUSE: 2020:0598-1 moderate: tomcat (Mar 5)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2020:0594-1 moderate: gd (Mar 5)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:0589-1 postgresql10 (Mar 5)
 

An update that fixes one vulnerability is now available.


  Debian LTS: DLA-2134-1: pdfresurrect security update (Mar 5)
 

It was discovered that there was an out-of-bounds write vulnerability in pdfresurrect, a tool for extracting or scrubbing versioning data from PDF documents.


  ArchLinux: 202003-2: opensc: denial of service (Mar 5)
 

The package opensc before version 0.20.0-1 is vulnerable to denial of service.

  ArchLinux: 202003-1: chromium: access restriction bypass (Mar 5)
 

The package chromium before version 80.0.3987.132-1 is vulnerable to access restriction bypass.

  ArchLinux: 202002-13: opensmtpd: arbitrary command execution (Mar 5)
 

The package opensmtpd before version 6.6.4p1-1 is vulnerable to arbitrary command execution.

  ArchLinux: 202002-12: weechat: multiple issues (Mar 5)
 

The package weechat before version 2.7.1-1 is vulnerable to multiple issues including arbitrary code execution and denial of service.


  SciLinux: SLSA-2020-0726-1 Important: sudo on SL6.x i386/x86_64 (Mar 6)
 

sudo: Stack based buffer overflow when pwfeedback is enabled (CVE-2019-18634) SL6 x86_64 sudo-1.8.6p3-29.el6_10.3.x86_64.rpm sudo-debuginfo-1.8.6p3-29.el6_10.3.x86_64.rpm sudo-debuginfo-1.8.6p3-29.el6_10.3.i686.rpm sudo-devel-1.8.6p3-29.el6_10.3.i686.rpm sudo-devel-1.8.6p3-29.el6_10.3.x86_64.rpm i386 sudo-1.8.6p3-29.el6_10.3.i686.rpm sudo-debuginfo-1.8.6p3-29.e [More...]

  SciLinux: SLSA-2020-0702-1 Important: xerces-c on SL6.x i386/x86_64 (Mar 5)
 

xerces-c: XML parser contains a use-after-free error triggered during the scanning of external DTDs (CVE-2018-1311) SL6 x86_64 xerces-c-3.0.1-21.el6_10.i686.rpm xerces-c-3.0.1-21.el6_10.x86_64.rpm xerces-c-debuginfo-3.0.1-21.el6_10.i686.rpm xerces-c-debuginfo-3.0.1-21.el6_10.x86_64.rpm xerces-c-devel-3.0.1-21.el6_10.i686.rpm xerces-c-devel-3.0.1-21.el6_10.x86_64.rpm [More...]

  SciLinux: SLSA-2020-0704-1 Important: xerces-c on SL7.x x86_64 (Mar 5)
 

xerces-c: XML parser contains a use-after-free error triggered during the scanning of external DTDs (CVE-2018-1311) SL7 x86_64 xerces-c-3.1.1-10.el7_7.i686.rpm xerces-c-3.1.1-10.el7_7.x86_64.rpm xerces-c-debuginfo-3.1.1-10.el7_7.i686.rpm xerces-c-debuginfo-3.1.1-10.el7_7.x86_64.rpm xerces-c-devel-3.1.1-10.el7_7.i686.rpm xerces-c-devel-3.1.1-10.el7_7.x86_64.rpm noar [More...]

  SciLinux: SLSA-2020-0703-1 Important: http-parser on SL7.x x86_64 (Mar 5)
 

nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605) SL7 x86_64 http-parser-2.7.1-8.el7_7.2.i686.rpm http-parser-2.7.1-8.el7_7.2.x86_64.rpm http-parser-debuginfo-2.7.1-8.el7_7.2.i686.rpm http-parser-debuginfo-2.7.1-8.el7_7.2.x86_64.rpm http-parser-devel-2.7.1-8.el7_7.2.i686.rpm http-parser-devel-2.7.1-8.el7_7.2.x86_64.rpm - Scient [More...]


  openSUSE: 2020:0308-1: important: python-bleach (Mar 7)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0307-1: moderate: squid (Mar 6)
 

An update that fixes four vulnerabilities is now available.

  openSUSE: 2020:0305-1: important: openfortivpn (Mar 5)
 

An update that fixes three vulnerabilities is now available.


  Mageia 2020-0129: apache-mod_auth_openidc security update (Mar 6)
 

The updated package fixes a security vulnerability: A flaw was found in mod_auth_openidc before version 2.4.1. An open redirect issue exists in URLs with a slash and backslash at the beginning. (CVE-2019-20479)

  Mageia 2020-0128: pure-ftpd security update (Mar 6)
 

Updated pure-ftpd packages fix security vulnerabilities: An issue was discovered in Pure-FTPd 1.0.49. An uninitialized pointer vulnerability has been detected in the diraliases linked list. When the *lookup_alias(const char alias) or print_aliases(void) function is called,

  Mageia 2020-0127: libarchive security update (Mar 6)
 

The updated packages fix several issues including security vulnerabilities: In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive. (CVE-2019-19221)

  Mageia 2020-0126: dojo security update (Mar 6)
 

Updated dojo package fixes security vulnerability: dojox was vulnerable to Cross-site Scripting. This was due to dojox.xmpp.util.xmlEncode only encoding the first occurrence of each character, not all of them (CVE-2019-10785).

  Mageia 2020-0125: python-bleach security update (Mar 6)
 

The updated packages fix a security vulnerability: Mutation XSS in bleach.clean when noscript and raw tag whitelisted. (CVE-2020-6802)

  Mageia 2020-0124: pcre security update (Mar 6)
 

Updated pcre packages fix security vulnerabilities: The pcre package has been updated to version 8.44, fixing an integer overflow and NULL pointer dereference, as well as other bugs. See the upstream changelog for details.

  Mageia 2020-0123: chromium-browser-stable security update (Mar 6)
 

Chromium-browser 80.0.3987.122 fixes security issues: Multiple flaws were found in the way Chromium 79.0.3945.130 processes various types of web content, where loading a web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose

  Mageia 2020-0122: weechat security update (Mar 6)
 

Updated weechat packages fix security vulnerability: irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other

  Mageia 2020-0121: ruby-rake security update (Mar 6)
 

Updated ruby-rake package fixes security vulnerability: There is an OS command injection vulnerability in Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character (CVE-2020-8130).

  Mageia 2020-0120: proftpd security update (Mar 6)
 

Updated proftpd packages fix security vulnerability: Antonio Morales discovered an use-after-free flaw in the memory pool allocator in ProFTPD. Interrupting current data transfers can corrupt the ProFTPD memory pool, leading to denial of service, or potentially

  Mageia 2020-0119: php security update (Mar 6)
 

Updated php packages fix bugs and security vulnerabilities: Core: - Fixed bug #71876 (Memory corruption htmlspecialchars(): charset `*' not supported).

  Mageia 2020-0118: glib2.0 security update (Mar 6)
 

The updated packages fix a security vulnerability: GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled.

  Mageia 2020-0117: libsolv security update (Mar 6)
 

Updated libsolv packages fix security vulnerability: An out-of-bounds read was discovered in libsolv when the last schema has a length that is less than the length of the input schema. A remote attacker may abuse this flaw to crash an application that uses libsolv

  Mageia 2020-0116: transfig security update (Mar 6)
 

The updated package fixes security vulnerabilities: Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c. (CVE-2019-14275)

  Mageia 2020-0115: firejail security update (Mar 6)
 

Updated firejail package fixes security vulnerabilities: Firejail before 0.9.60 allows truncation (resizing to length 0) of the firejail binary on the host by running exploit code inside a firejail sandbox and having the sandbox terminated. To succeed, certain conditions

  Mageia 2020-0114: ilmbase security update (Mar 6)
 

The updated packages fix a security vulnerability: OpenEXR 2.3.0 has a memory leak in ThreadPool in IlmBase/IlmThread/ IlmThreadPool.cpp, as demonstrated by exrmultiview. (CVE-2018-18443)

  Mageia 2020-0113: xen security update (Mar 6)
 

- Updated from 4.12.0 to 4.12.1 - Device quarantine for alternate pci assignment methods [XSA-306] - x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135] - VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (rhbz#1771368)

  Mageia 2020-0112: binutils security update (Mar 6)
 

This update provides the binutils 2.33.1 and fixes atleast the following security issues: An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a