Thank you for subscribing to the LinuxSecurity Linux Advisory Watch newsletter! Staying on top of the latest security advisories issued by the distro(s) you use is essential in maintaining an updated, secure Linux system. Our weekly newsletter is an easy, convenient way to track distribution security advisories - helping you keep your Linux environment safe from malware and other exploits.


Distribution security advisories issued this week include a Slackware advisory warning of a security vulnerability in OpenVPN, and providing information of new OpenVPN packages available to fix the issue. CentOS and Scientific Linux have issued advisories regarding an important update available to fix a security bug in Python-Twisted-Web. Continue reading to learn about other distribution security advisories issued this week. Stay healthy, safe and secure - both on and offline!


LinuxSecurity.com Feature Extras:

Open Source Intelligence, Security Hacking, and Security Blogger Dancho Danchev - Open Source Intelligence (OSINT), is a tactic used to learn about information relevant to protecting an organization from external and internal threats using publically accessible data. Being able to identify information that could potentially be used against an organization provides actionable insight that could reduce the risk that organization may face. Its an early warning system used to forecast and signal a potential threat.

Know Your Enemy: Honeynets - Honeynets are an invaluable offensive security tool for learning the tactics and motives of the blackhat community and sharing the information and insights gathered. This article will explore what a Honeynet is, its value, how it works and the risks involved with deploying a Honeynet.


  Debian: DSA-4671-1: vlc security update (Apr 30)
 

Multiple security issues were discovered in the microdns plugin of the VLC media player, which could result in denial of service or potentially the execution of arbitrary code via malicious mDNS packets.

  Debian: DSA-4670-1: tiff security update (Apr 29)
 

Several vulnerabilities have been found in the TIFF library, which may result in denial of service or the execution of arbitrary code if malformed image files are processed.

  Debian: DSA-4669-1: nodejs security update (Apr 29)
 

Multiple vulnerabilities were discovered in Node.js, which could result in denial of service or HTTP request smuggling. For the stable distribution (buster), these problems have been fixed in

  Debian: DSA-4667-1: linux security update (Apr 28)
 

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, or information leak.

  Debian: DSA-4668-1: openjdk-8 security update (Apr 28)
 

Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, insecure TLS handshakes, bypass of sandbox restrictions or HTTP response splitting attacks.

  Debian: DSA-4666-1: openldap security update (Apr 28)
 

A vulnerability was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. LDAP search filters with nested boolean expressions can result in denial of service (slapd daemon crash).

  Debian: DSA-4665-1: qemu security update (Apr 27)
 

Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service or the execution of arbitrary code. For the stable distribution (buster), these problems have been fixed in

  Debian: DSA-4664-1: mailman security update (Apr 26)
 

Hanno Boeck discovered that it was possible to create a cross site scripting attack on the webarchives of the Mailman mailing list manager, by sending a special type of attachement.

  Debian: DSA-4663-1: python-reportlab security update (Apr 25)
 

It was discovered that python-reportlab, a Python library to create PDF documents, is prone to a code injection vulnerability while parsing a color attribute. An attacker can take advantage of this flaw to execute arbitrary code if a specially crafted document is processed.

  Debian: DSA-4662-1: openjdk-11 security update (Apr 24)
 

Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, insecure TLS handshakes, bypass of sandbox restrictions or HTTP response splitting attacks.

  Fedora 30: java-latest-openjdk FEDORA-2020-92ed6d99e4 (May 1)
 

OpenJDK 14 April CPU update

  Fedora 30: git FEDORA-2020-4e093619bb (May 1)
 

Security fix for CVE-2020-5260 and CVE-2020-11008 CVE-2020-5260 - From the upstream [release notes](https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.4.txt): > With a crafted URL that contains a newline in it, the credential > helper machinery can be fooled to give credential information for > a wrong host. The

  Fedora 32: mingw-libxml2 FEDORA-2020-7694e8be73 (May 1)
 

Update to 2.9.10 * Fix CVE-2019-19956, CVE-2019-20388 and CVE-2020-7595

  Fedora 32: sqliteodbc FEDORA-2020-df7c647fa3 (May 1)
 

Fix CVE-2020-12050 (use mktemp(1) for temp. file name creation)

  Fedora 32: pxz FEDORA-2020-8b89d5b9eb (May 1)
 

- Update to GIT 20200421 - Added patch against race condition in setting permissions on output file (#1182024) - Added patch to revert environment redirect allowing `export XZ_OPT="-9"` or similar

  Fedora 31: xen FEDORA-2020-295ed0b1e0 (Apr 30)
 

multiple xenoprof issues [XSA-313, CVE-2020-11740, CVE-2020-11741] (#1823912, #1823914) Missing memory barriers in read-write unlock paths [XSA-314, CVE-2020-11739] (#1823784) Bad error path in GNTTABOP_map_grant [XSA-316, CVE-2020-11743] (#1823926) Bad continuation handling in GNTTABOP_copy [XSA-318, CVE-2020-11742] (#1823943)

  Fedora 32: php-horde-horde FEDORA-2020-6b8868fad9 (Apr 30)
 

**horde 5.2.22** * [jan] SECURITY: Protect image processing service from rendering active SVG content within the browser. * [jan] SECURITY: Fix XSS vulnerabilities in administration interface. * [jan] Support Redis Sentinel configuration (Michael Menge <This email address is being protected from spambots. You need JavaScript enabled to view it.>, Request #14998). * [jan] Use file hashing for detecting outdated configuration files.

  Fedora 31: sqliteodbc FEDORA-2020-c98c7da2f6 (Apr 29)
 

Fix CVE-2020-12050 (use mktemp(1) for temp. file name creation)

  Fedora 31: pxz FEDORA-2020-07fcbfddbd (Apr 29)
 

- Update to GIT 20200421 - Added patch against race condition in setting permissions on output file (#1182024) - Added patch to revert environment redirect allowing `export XZ_OPT="-9"` or similar

  Fedora 31: php-horde-horde FEDORA-2020-1a968aeb47 (Apr 29)
 

**horde 5.2.22** * [jan] SECURITY: Protect image processing service from rendering active SVG content within the browser. * [jan] SECURITY: Fix XSS vulnerabilities in administration interface. * [jan] Support Redis Sentinel configuration (Michael Menge <This email address is being protected from spambots. You need JavaScript enabled to view it.>, Request #14998). * [jan] Use file hashing for detecting outdated configuration files.

  Fedora 30: sqliteodbc FEDORA-2020-1e85425a52 (Apr 29)
 

Fix CVE-2020-12050 (use mktemp(1) for temp. file name creation)

  Fedora 30: php-horde-horde FEDORA-2020-fd8761fd13 (Apr 29)
 

**horde 5.2.22** * [jan] SECURITY: Protect image processing service from rendering active SVG content within the browser. * [jan] SECURITY: Fix XSS vulnerabilities in administration interface. * [jan] Support Redis Sentinel configuration (Michael Menge <This email address is being protected from spambots. You need JavaScript enabled to view it.>, Request #14998). * [jan] Use file hashing for detecting outdated configuration files.

  Fedora 30: libxml2 FEDORA-2020-0c71c00af4 (Apr 29)
 

Update to 2.9.10 and fix CVE-2019-19956, CVE-2019-20388 and CVE-2020-7595

  Fedora 32: openvpn FEDORA-2020-c1cb4ebcd9 (Apr 28)
 

Update to latest upstream OpenVPN 2.4.9 release. It contains a security fix for CVE-2020-11810. This security issue is quite hard to abuse, requiring a fairly precise timing attack combined with guessing a just assigned peer-id reference. If successful, only a single client just initiating a new connection will experience a denial of service situation. This wi why the severity is rated

  Fedora 31: haproxy FEDORA-2020-13fd8b1721 (Apr 27)
 

Security fix for CVE-2020-11100

  Fedora 32: chromium FEDORA-2020-b82a634e27 (Apr 27)
 

Another day, another chromium update. This one fixes: CVE-2020-6458 CVE-2020-6459 CVE-2020-6460 ---- Fix dependency issue introduced when switching from a "shared" build to a "static" build. ---- A new major version of Chromium without any security bugs! Just kidding. Here's the CVE list: CVE-2020-6454 CVE-2020-6423 CVE-2020-6455 CVE-2020-6430 CVE-2020-6456

  Fedora 32: libssh FEDORA-2020-6cad41abb0 (Apr 27)
 

Fixes CVE-2020-1730

  Fedora 31: openvpn FEDORA-2020-e56f2deb30 (Apr 27)
 

Update to latest upstream OpenVPN 2.4.9 release. It contains a security fix for CVE-2020-11810. This security issue is quite hard to abuse, requiring a fairly precise timing attack combined with guessing a just assigned peer-id reference. If successful, only a single client just initiating a new connection will experience a denial of service situation. This wi why the severity is rated

  Fedora 31: gnuchess FEDORA-2020-dbccd7e9be (Apr 27)
 

6.2.6

  Fedora 31: ansible FEDORA-2020-f80154b5b4 (Apr 27)
 

Update to upstream bugfix and security update 2.9.7. See https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst for a detailed list of changes.

  Fedora 31: rubygem-rake FEDORA-2020-dc1ae17bb5 (Apr 27)
 

A security flaw is found on rake which may case arbitrary command execution under file existence with crafted name. This new rpm will fix the issue (CVE-2020-8130)

  Fedora 30: gnuchess FEDORA-2020-3eaf264c4b (Apr 26)
 

6.2.6

  Fedora 30: ansible FEDORA-2020-1b6ce91e37 (Apr 26)
 

Update to upstream bugfix and security update 2.9.7. See https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst for a detailed list of changes.

  Fedora 30: rubygem-rake FEDORA-2020-28e06b5f08 (Apr 26)
 

A security flaw is found on rake which may case arbitrary command execution under file existence with crafted name. This new rpm will fix the issue (CVE-2020-8130)

  Fedora 32: git FEDORA-2020-b2a2c830cf (Apr 26)
 

Security fix for CVE-2020-5260 From the upstream [release notes](https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.5.txt): > With a crafted URL that contains a newline or empty host, or lacks > a scheme, the credential helper machinery can be fooled into > providing credential information that is not appropriate for the > protocol in use and host being

  Fedora 32: gnuchess FEDORA-2020-8083181df6 (Apr 26)
 

6.2.6

  Fedora 32: ansible FEDORA-2020-3990f03ba3 (Apr 26)
 

Update to upstream bugfix and security update 2.9.7. See https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst for a detailed list of changes.

  Fedora 30: webkit2gtk3 FEDORA-2020-11b0f45883 (Apr 25)
 

Update to WebKitGTK 2.28.1: * Fix position of default option element popup windows under Wayland. * Fix rendering after a cross site navigation with PSON enabled and hardware acceleration forced. * Fix a crash in nested wayland compositor when closing a tab with PSON enabled. * Update Chrome and Firefox versions in user agent quirks. * Fix several crashes and rendering issues. *

  Fedora 31: git FEDORA-2020-f6b3b6fb18 (Apr 25)
 

Security fix for CVE-2020-5260 From the upstream [release notes](https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.5.txt): > With a crafted URL that contains a newline or empty host, or lacks > a scheme, the credential helper machinery can be fooled into > providing credential information that is not appropriate for the > protocol in use and host being

  Fedora 31: webkit2gtk3 FEDORA-2020-4832f2bd62 (Apr 25)
 

Update to WebKitGTK 2.28.1: * Fix position of default option element popup windows under Wayland. * Update Chrome and Firefox versions in user agent quirks. * Fix several crashes and rendering issues. * Security fixes: CVE-2020-11793

  Fedora 31: snakeyaml FEDORA-2020-23012fafbc (Apr 25)
 

Update to version 1.26. Resolves CVE-2017-18640.

  Fedora 31: liblas FEDORA-2020-b0695fcdf7 (Apr 24)
 

This update fixes the following security vulnerabilities: CVE-2018-20536, CVE-2018-20537, CVE-2018-20539, CVE-2018-20540

  Fedora 31: php FEDORA-2020-62ee541bbb (Apr 24)
 

**PHP version 7.3.17** (16 Apr 2020) **Core:** * Fixed bug php#79364 (When copy empty array, next key is unspecified). (cmb) * Fixed bug php#78210 (Invalid pointer address). (cmb, Nikita) **CURL:** * Fixed bug php#79199 (curl_copy_handle() memory leak). (cmb) **Date:** * Fixed bug php#79396 (DateTime hour incorrect during DST jump forward). (Nate Brunette) **Iconv:**

  Fedora 31: wireshark FEDORA-2020-87737529a4 (Apr 24)
 

3.2.3 ---- New version 3.2.2 Security fix for CVE-2020-7044, CVE-2020-9428, CVE-2020-9430, CVE-2020-9431

  Fedora 31: dolphin-emu FEDORA-2020-14cdf5fdf8 (Apr 24)
 

Fix mistakes in Wayland wrapper change ---- Fixes Wayland issue when running from terminal ---- Update sound touch library, fixes some known security issues.

  Fedora 31: qt5-qtbase FEDORA-2020-3069e44be5 (Apr 24)
 

Security fix for CVE-2015-9541

  Fedora 30: php FEDORA-2020-96cb012029 (Apr 24)
 

**PHP version 7.3.17** (16 Apr 2020) **Core:** * Fixed bug php#79364 (When copy empty array, next key is unspecified). (cmb) * Fixed bug php#78210 (Invalid pointer address). (cmb, Nikita) **CURL:** * Fixed bug php#79199 (curl_copy_handle() memory leak). (cmb) **Date:** * Fixed bug php#79396 (DateTime hour incorrect during DST jump forward). (Nate Brunette) **Iconv:**

  Fedora 30: wireshark FEDORA-2020-da7dcee2ec (Apr 24)
 

3.2.3 ---- New version 3.2.2 Security fix for CVE-2020-7044, CVE-2020-9428, CVE-2020-9430, CVE-2020-9431

  Fedora 32: webkit2gtk3 FEDORA-2020-abd0e92eaa (Apr 24)
 

Reenable WPE renderer and update to WebKitGTK 2.28.1: * Fix position of default option element popup windows under Wayland. * Update Chrome and Firefox versions in user agent quirks. * Fix several crashes and rendering issues. * Security fixes: CVE-2020-11793

  Fedora 32: snakeyaml FEDORA-2020-599514b47e (Apr 24)
 

Update to version 1.26. Resolves CVE-2017-18640.

  Fedora 32: xen FEDORA-2020-440457afe4 (Apr 24)
 

multiple xenoprof issues [XSA-313, CVE-2020-11740, CVE-2020-11741] (#1823912, #1823914) Missing memory barriers in read-write unlock paths [XSA-314, CVE-2020-11739] (#1823784) Bad error path in GNTTABOP_map_grant [XSA-316, CVE-2020-11743] (#1823926) Bad continuation handling in GNTTABOP_copy [XSA-318, CVE-2020-11742] (#1823943)

  Fedora 32: liblas FEDORA-2020-6dbbecb893 (Apr 24)
 

This update fixes the following security vulnerabilities: CVE-2018-20536, CVE-2018-20537, CVE-2018-20539, CVE-2018-20540

  Fedora 32: php FEDORA-2020-60f9a47657 (Apr 24)
 

**PHP version 7.4.5** (16 Apr 2020) **Core:** * Fixed bug php#79364 (When copy empty array, next key is unspecified). (cmb) * Fixed bug php#78210 (Invalid pointer address). (cmb, Nikita) **CURL:** * Fixed bug php#79199 (curl_copy_handle() memory leak). (cmb) **Date:** * Fixed bug php#79396 (DateTime hour incorrect during DST jump forward). (Nate Brunette) * Fixed bug

  Fedora 32: thunderbird FEDORA-2020-731de8230d (Apr 24)
 

Update to latest upstream version

  Fedora 32: wireshark FEDORA-2020-ef943221ca (Apr 24)
 

3.2.3 ---- New version 3.2.2 Security fix for CVE-2020-7044, CVE-2020-9428, CVE-2020-9430, CVE-2020-9431

  Fedora 32: dolphin-emu FEDORA-2020-983fee18e2 (Apr 24)
 

Fix mistakes in Wayland wrapper change ---- Fixes Wayland issue when running from terminal ---- Update sound touch library, fixes some known security issues.

  Fedora 32: qt5-qtbase FEDORA-2020-ca02c529f8 (Apr 24)
 

Security fix for CVE-2015-9541

  Fedora 32: cacti FEDORA-2020-788dd52289 (Apr 24)
 

- Update to 1.2.11 Release notes:

  Fedora 32: cacti-spine FEDORA-2020-788dd52289 (Apr 24)
 

- Update to 1.2.11 Release notes:

  Fedora 32: golang-github-buger-jsonparser FEDORA-2020-39852a8ef8 (Apr 24)
 

Multiple bug fixes, including a fix for CVE-2020-10675 .

  Fedora 32: nrpe FEDORA-2020-d436ed655f (Apr 24)
 

New upstream version, fixes CVEs

  Fedora 32: php-robrichards-xmlseclibs1 FEDORA-2020-af82229ae5 (Apr 24)
 

## 1.4.3 (12, Nov 2019) ### Security Improvements: - Insure only a single SignedInfo element exists within a signature during verification. Refs [CVE-2019-3465](https://nvd.nist.gov/vuln/detail/CVE-2019-3465).

  Fedora 32: drupal7-ckeditor FEDORA-2020-f6d022a3f8 (Apr 24)
 

- https://www.drupal.org/project/ckeditor/releases/7.x-1.19 - https://www.drupal.org/sa-contrib-2020-007

  Gentoo: GLSA-202004-17: Django: Multiple vulnerabilities (Apr 30)
 

Multiple vulnerabilities have been found in Django, the worst of which could result in privilege escalation.

  Gentoo: GLSA-202004-16: Cacti: Multiple vulnerabilities (Apr 30)
 

Multiple vulnerabilities have been found in Cacti, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202004-15: libu2f-host: Multiple vulnerabilities (Apr 30)
 

Multiple vulnerabilities have been found in libu2f-host, the worst of which could result in the execution of code.

  Gentoo: GLSA-202004-14: FontForge: Multiple vulnerabilities (Apr 30)
 

Multiple vulnerabilities have been found in FontForge, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202004-13: Git: Information disclosure (Apr 23)
 

Multiple vulnerabilities have been found in Git which might all allow attackers to access sensitive information.

  Gentoo: GLSA-202004-12: Chromium, Google Chrome: Multiple vulnerabilities (Apr 23)
 

Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could allow remote attackers to execute arbitrary code. [More...]

  Gentoo: GLSA-202004-11: Mozilla Firefox: Multiple vulnerabilities (Apr 23)
 

Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202004-10: OpenSSL: Multiple vulnerabilities (Apr 23)
 

Multiple vulnerabilities were found in OpenSSL, the worst of which could allow remote attackers to cause a Denial of Service condition.

  RedHat: RHSA-2020-1998:01 Moderate: gnutls security update (Apr 30)
 

An update for gnutls is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1984:01 Moderate: kernel security and bug fix update (Apr 30)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1422:01 Moderate: Red Hat build of Eclipse Vert.x 3.9.0 (Apr 30)
 

An update is now available for Red Hat build of Eclipse Vert.x. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For

  RedHat: RHSA-2020-1980:01 Important: git security update (Apr 30)
 

An update for git is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-1978:01 Important: git security update (Apr 30)
 

An update for git is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1979:01 Important: git security update (Apr 30)
 

An update for git is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1981:01 Important: chromium-browser security update (Apr 30)
 

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1975:01 Important: rh-git218-git security update (Apr 29)
 

An update for rh-git218-git is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1970:01 Important: chromium-browser security update (Apr 29)
 

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1963:01 Moderate: ruby security update (Apr 29)
 

An update for ruby is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1962:01 Important: python-twisted-web security update (Apr 29)
 

An update for python-twisted-web is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1966:01 Important: kernel security update (Apr 29)
 

An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2020-1932:01 Important: container-tools:rhel8 security update (Apr 28)
 

An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1926:01 Important: container-tools:1.0 security and bug (Apr 28)
 

An update for the container-tools:1.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1931:01 Important: container-tools:2.0 security update (Apr 28)
 

An update for the container-tools:2.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1933:01 Important: targetcli security update (Apr 28)
 

An update for targetcli is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-1852:01 Moderate: patch security and bug fix update (Apr 28)
 

An update for patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1804:01 Moderate: sudo security, bug fix, (Apr 28)
 

An update for sudo is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1845:01 Moderate: bind security, bug fix, (Apr 28)
 

An update for bind is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1766:01 Moderate: GNOME security, bug fix, (Apr 28)
 

An update for GNOME is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1921:01 Moderate: fontforge security update (Apr 28)
 

An update for fontforge is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1604:01 Low: tcpdump security update (Apr 28)
 

An update for tcpdump is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1712:01 Moderate: edk2 security, bug fix, (Apr 28)
 

An update for edk2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1708:01 Moderate: liblouis security and bug fix update (Apr 28)
 

An update for liblouis is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1665:01 Moderate: qt5 security, bug fix, (Apr 28)
 

An update is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1725:01 Moderate: haproxy security, bug fix, (Apr 28)
 

An update for haproxy is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1912:01 Low: bluez security update (Apr 28)
 

An update for bluez is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1605:01 Moderate: python27:2.7 security, bug fix, (Apr 28)
 

An update for the python27:2.7 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1735:01 Moderate: dpdk security, bug fix, (Apr 28)
 

An update for dpdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1653:01 Moderate: zziplib security update (Apr 28)
 

An update for zziplib is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1567:01 Important: kernel-rt security, bug fix, (Apr 28)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-1598:01 Moderate: libreoffice security and bug fix update (Apr 28)
 

An update for libreoffice is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1636:01 Moderate: libsndfile security update (Apr 28)
 

An update for libsndfile is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1794:01 Moderate: systemd security, bug fix, (Apr 28)
 

An update for systemd is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1635:01 Moderate: gdb security and bug fix update (Apr 28)
 

An update for gdb is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1716:01 Moderate: unbound security update (Apr 28)
 

An update for unbound is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1631:01 Low: GStreamer, libmad, and SDL security, bug fix, (Apr 28)
 

An update for GStreamer, libmad, and SDL is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1913:01 Moderate: e2fsprogs security, bug fix, (Apr 28)
 

An update for e2fsprogs is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1715:01 Low: dnsmasq security, bug fix, (Apr 28)
 

An update for dnsmasq is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1650:01 Moderate: container-tools:rhel8 security, bug fix, (Apr 28)
 

An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1787:01 Low: unzip security update (Apr 28)
 

An update for unzip is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1624:01 Moderate: php:7.2 security, bug fix, (Apr 28)
 

An update for the php:7.2 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1864:01 Moderate: gcc security and bug fix update (Apr 28)
 

An update for gcc is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1686:01 Low: libmspack security and bug fix update (Apr 28)
 

An update for libmspack is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1688:01 Moderate: libtiff security update (Apr 28)
 

An update for libtiff is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1916:01 Moderate: python-pip security update (Apr 28)
 

An update for python-pip is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1600:01 Moderate: evolution security and bug fix update (Apr 28)
 

An update for evolution, evolution-data-server, and evolution-ews is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1702:01 Moderate: rsyslog security, bug fix, (Apr 28)
 

An update for rsyslog is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1659:01 Moderate: grafana security, bug fix, (Apr 28)
 

An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1764:01 Moderate: python3 security and bug fix update (Apr 28)
 

An update for python3 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1577:01 Moderate: exiv2 security, bug fix, (Apr 28)
 

An update for exiv2, gegl, gnome-color-manager, and libgexiv2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1576:01 Moderate: memcached security update (Apr 28)
 

An update for memcached is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1792:01 Moderate: curl security update (Apr 28)
 

An update for curl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1880:01 Moderate: ibus and glib2 security and bug fix (Apr 28)
 

An update for glib2 and ibus is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1878:01 Moderate: samba security, bug fix, (Apr 28)
 

An update for samba is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1581:01 Low: wavpack security update (Apr 28)
 

An update for wavpack is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1828:01 Low: glibc security, bug fix, (Apr 28)
 

An update for glibc is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1810:01 Moderate: sqlite security and bug fix update (Apr 28)
 

An update for sqlite is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1672:01 Moderate: freeradius:3.0 security update (Apr 28)
 

An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1797:01 Low: binutils security and bug fix update (Apr 28)
 

An update for binutils is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1769:01 Important: kernel security, bug fix, (Apr 28)
 

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-1765:01 Low: cups security and bug fix update (Apr 28)
 

An update for cups is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1827:01 Moderate: libxml2 security update (Apr 28)
 

An update for libxml2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1840:01 Moderate: openssl security and bug fix update (Apr 28)
 

An update for openssl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1616:01 Low: irssi security update (Apr 28)
 

An update for irssi is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1660:01 Moderate: mod_auth_mellon security and bug fix (Apr 28)
 

An update for mod_auth_mellon is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1561:01 Important: python-twisted-web security update (Apr 23)
 

An update for python-twisted-web is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  SUSE: 2020:14354-1 important: the Linux Kernel (Apr 30)
 

An update that solves 28 vulnerabilities and has 20 fixes is now available.

  SUSE: 2020:1156-1 important: squid (Apr 30)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2020:1158-1 important: ceph (Apr 30)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:14353-1 important: openldap2 (Apr 29)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:1150-1 critical: salt (Apr 29)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:14351-1 critical: salt (Apr 29)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:1147-1 critical: salt (Apr 29)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:14350-1 critical: salt (Apr 29)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:1151-1 critical: salt (Apr 29)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:1146-1 important: the Linux Kernel (Apr 29)
 

An update that solves 7 vulnerabilities and has 77 fixes is now available.

  SUSE: 2020:1146-1 important: the Linux Kernel (Apr 29)
 

An update that solves 7 vulnerabilities and has 77 fixes is now available.

  SUSE: 2020:1142-1 important: the Linux Kernel (Apr 29)
 

An update that solves 13 vulnerabilities and has 157 fixes is now available.

  SUSE: 2020:1144-1 moderate: munge (Apr 29)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:1139-1 important: xen (Apr 29)
 

An update that solves 6 vulnerabilities and has 8 fixes is now available.

  SUSE: 2020:1142-1 important: the Linux Kernel (Apr 29)
 

An update that solves 13 vulnerabilities and has 157 fixes is now available.

  SUSE: 2020:1141-1 important: the Linux Kernel (Apr 29)
 

An update that solves 11 vulnerabilities and has 94 fixes is now available.

  SUSE: 2020:1138-1 important: xen (Apr 29)
 

An update that solves 6 vulnerabilities and has three fixes is now available.

  SUSE: 2020:1141-1 important: the Linux Kernel (Apr 29)
 

An update that solves 11 vulnerabilities and has 94 fixes is now available.

  SUSE: 2020:1135-1 important: webkit2gtk3 (Apr 29)
 

An update that fixes 30 vulnerabilities is now available.

  SUSE: 2020:1134-1 important: squid (Apr 29)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2020:1132-1 important: samba (Apr 28)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1133-1 important: samba (Apr 28)
 

An update that solves one vulnerability and has two fixes is now available.

  SUSE: 2020:1121-1 moderate: git (Apr 28)
 

An update that solves 15 vulnerabilities and has 8 fixes is now available.

  SUSE: 2020:1123-1 important: the Linux Kernel (Apr 28)
 

An update that solves 10 vulnerabilities and has 89 fixes is now available.

  SUSE: 2020:1124-1 important: xen (Apr 28)
 

An update that solves 5 vulnerabilities and has 7 fixes is now available.

  SUSE: 2020:1125-1 moderate: ovmf (Apr 28)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1126-1 important: apache2 (Apr 28)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2020:1119-1 important: the Linux Kernel (Apr 27)
 

An update that solves 11 vulnerabilities and has 96 fixes is now available.

  SUSE: 2020:1117-1 important: pam_radius (Apr 27)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:1118-1 important: the Linux Kernel (Apr 27)
 

An update that solves 12 vulnerabilities and has 139 fixes is now available.

  SUSE: 2020:14348-1 important: resource-agents (Apr 24)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:1109-1 important: webkit2gtk3 (Apr 24)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:1111-1 important: apache2 (Apr 24)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2020:1088-1 file-roller (Apr 23)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1091-1 important: resource-agents (Apr 23)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:1092-1 important: resource-agents (Apr 23)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:1089-1 important: resource-agents (Apr 23)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:1090-1 important: resource-agents (Apr 23)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:1087-1 important: the Linux Kernel (Apr 23)
 

An update that solves 12 vulnerabilities and has 139 fixes is now available.

  SUSE: 2020:1084-1 important: the Linux Kernel (Apr 23)
 

An update that solves 11 vulnerabilities and has 107 fixes is now available.

  SUSE: 2020:1045-1 important: cups (Apr 23)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:14341-1 important: cups (Apr 23)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1083-1 important: cups (Apr 23)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1085-1 important: the Linux Kernel (Apr 23)
 

An update that solves 11 vulnerabilities and has 91 fixes is now available.

  Ubuntu 4349-1: EDK II vulnerabilities (Apr 30)
 

Several security issues were fixed in edk2.

  Ubuntu 4333-2: Python vulnerabilities (Apr 30)
 

Several security issues were fixed in Python.

  Ubuntu 4341-2: Samba vulnerability (Apr 29)
 

Samba could be made to consume resources if it received a specially crafted LDAP query.

  Ubuntu 4348-1: Mailman vulnerabilities (Apr 29)
 

Several security issues were fixed in Mailman.

  Ubuntu 4341-3: Samba regression (Apr 29)
 

USN-4341-1 introduced a regression in Samba.

  Ubuntu 4347-1: WebKitGTK vulnerability (Apr 29)
 

Several security issues were fixed in WebKitGTK.

  Ubuntu 4346-1: Linux kernel vulnerabilities (Apr 28)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4345-1: Linux kernel vulnerabilities (Apr 28)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4344-1: Linux kernel vulnerabilities (Apr 28)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4343-1: Linux kernel vulnerability (Apr 28)
 

Systems running on s390x architecture could be made to crash or run programs as an administrator under certain conditions.

  Ubuntu 4342-1: Linux kernel vulnerabilities (Apr 28)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4341-1: Samba vulnerabilities (Apr 28)
 

Several security issues were fixed in Samba.

  Ubuntu 4338-2: re2c vulnerability (Apr 28)
 

re2c could be made to execute arbitrary code if it received a specially crafted file.

  Ubuntu 4332-2: File Roller vulnerability (Apr 27)
 

File Roller could be made to expose sensitive information.

  Ubuntu 4340-1: CUPS vulnerabilities (Apr 27)
 

Several security issues were fixed in CUPS.

  Ubuntu 4339-1: OpenEXR vulnerabilities (Apr 27)
 

Several security issues were fixed in OpenEXR.

  Debian LTS: DLA-2198-1: otrs2 security update (May 1)
 

Several vulnerabilities have been discovered in otrs2 (Open source Ticket Request System)

  Debian LTS: DLA-2197-1: miniupnpc security update (Apr 30)
 

It was discovered that there was a integer signedness error in the miniupnpc UPnP client that could allow remote attackers to cause a denial of service attack.

  Debian LTS: DLA-2196-1: pound security update (Apr 30)
 

An issue has been found in pound, A request smuggling vulnerability was discovered in pound, a everse proxy, load balancer and HTTPS front-end for Web servers, that may allow

  Debian LTS: DLA-2195-1: w3m security update (Apr 30)
 

Two issues have been found in w3m, WWW browsable pager with excellent tables/frames support.

  Debian LTS: DLA-2194-1: yodl security update (Apr 30)
 

An issue has been found in yodl, a pre-document language. Hanno Bock discovered that there was a buffer over-read vulnerability.

  Debian LTS: DLA-2189-1: rzip security update (Apr 26)
 

Agostino Sarubbo of Gentoo discovered a heap buffer overflow write in the rzip program (a compression program for large files) when uncompressing maliciously crafted files.

  Debian LTS: DLA-2188-1: php5 security update (Apr 26)
 

Three issues have been found in php5, a server-side, HTML-embedded scripting language.

  Debian LTS: DLA-2187-1: radicale security update (Apr 25)
 

Radicale, a simple calendar and addressbook server - daemon, is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method.

  Debian LTS: DLA-2186-1: ncmpc security update (Apr 25)
 

It has been discovered a NULL pointer dereference could happen in ncmpc, an ncurses-based audio player. This could result in a crash and a denial of service.

  Debian LTS: DLA-2185-1: eog security update (Apr 25)
 

It was discovered that eog (Eye of GNOME) incorrectly handled certain invalid UTF-8 strings. If a user were tricked into opening a specially-crafted image, a remote attacker could use this issue to cause

  Debian LTS: DLA-2184-1: jsch security update (Apr 25)
 

It was discovered that there was a path traversal vulnerability in jsch, a pure Java implementation of the SSH2 protocol.

  Debian LTS: DLA-2183-1: libgsf security update (Apr 25)
 

It was discovered that there was a null pointer deference exploit in libgsf, a I/O abstraction library for GNOME.

  ArchLinux: 202004-23: webkit2gtk: arbitrary code execution (Apr 30)
 

The package webkit2gtk before version 2.28.2-1 is vulnerable to arbitrary code execution.

  ArchLinux: 202004-22: chromium: arbitrary code execution (Apr 30)
 

The package chromium before version 81.0.4044.129-1 is vulnerable to arbitrary code execution.

  ArchLinux: 202004-21: git: information disclosure (Apr 30)
 

The package git before version 2.26.2-1 is vulnerable to information disclosure.

  ArchLinux: 202004-20: chromium: multiple issues (Apr 24)
 

The package chromium before version 81.0.4044.122-1 is vulnerable to multiple issues including arbitrary code execution and insufficient validation.

  ArchLinux: 202004-19: lib32-openssl: denial of service (Apr 23)
 

The package lib32-openssl before version 1.1.1.g-1 is vulnerable to denial of service.

  CentOS: CESA-2020-1962: Important CentOS 6 python-twisted-web (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1962

  CentOS: CESA-2020-1489: Important CentOS 7 thunderbird (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1489

  CentOS: CESA-2020-1561: Important CentOS 7 python-twisted-web (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1561

  CentOS: CESA-2020-1511: Important CentOS 7 git (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1511

  CentOS: CESA-2020-1507: Important CentOS 7 java-1.7.0-openjdk (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1507

  CentOS: CESA-2020-1512: Important CentOS 7 java-1.8.0-openjdk (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1512

  CentOS: CESA-2020-1509: Important CentOS 7 java-11-openjdk (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1509

  CentOS: CESA-2020-1524: Important CentOS 6 kernel (Apr 27)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1524

  CentOS: CESA-2020-1506: Important CentOS 6 java-1.8.0-openjdk (Apr 27)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1506

  CentOS: CESA-2020-1508: Important CentOS 6 java-1.7.0-openjdk (Apr 27)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1508

  CentOS: CESA-2020-1403: Important CentOS 6 qemu-kvm (Apr 27)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1403

  CentOS: CESA-2020-1429: Important CentOS 6 firefox (Apr 27)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1429

  CentOS: CESA-2020-1488: Important CentOS 6 thunderbird (Apr 27)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1488

  SciLinux: SLSA-2020-1962-1 Important: python-twisted-web on SL6.x i386/x86_64 (Apr 29)
 

python-twisted: HTTP request smuggling when presented with two Content-Length headers (CVE-2020-10108) SL6 x86_64 python-twisted-web-8.2.0-6.el6_10.x86_64.rpm i386 python-twisted-web-8.2.0-6.el6_10.i686.rpm - Scientific Linux Development Team

  SciLinux: SLSA-2020-1561-1 Important: python-twisted-web on SL7.x x86_64 (Apr 23)
 

python-twisted: HTTP request smuggling when presented with two Content-Length headers (CVE-2020-10108) * python-twisted: HTTP request smuggling when presented with a Content-Length and a chunked Transfer-Encoding header (CVE-2020-10109) SL7 x86_64 python-twisted-web-12.1.0-7.el7_8.x86_64.rpm - Scientific Linux Development Team

  openSUSE: 2020:0567-1: python-typed-ast (May 1)
 

An update that solves two vulnerabilities and has one errata is now available.

  openSUSE: 2020:0566-1: critical: chromium (May 1)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0565-1: important: cacti, cacti-spine (Apr 30)
 

An update that fixes 11 vulnerabilities is now available.

  openSUSE: 2020:0564-1: critical: salt (Apr 30)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0562-1: moderate: vlc (Apr 29)
 

An update that fixes 12 vulnerabilities is now available.

  openSUSE: 2020:0563-1: moderate: teeworlds (Apr 29)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0557-1: moderate: teeworlds (Apr 27)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0558-1: important: cacti, cacti-spine (Apr 27)
 

An update that fixes 11 vulnerabilities is now available.

  openSUSE: 2020:0558-1: important: cacti, cacti-spine (Apr 27)
 

An update that fixes 11 vulnerabilities is now available.

  openSUSE: 2020:0554-1: important: kubernetes (Apr 26)
 

An update that solves 7 vulnerabilities and has 22 fixes is now available.

  openSUSE: 2020:0555-1: important: cups (Apr 26)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0553-1: moderate: freeradius-server (Apr 26)
 

An update that solves two vulnerabilities and has one errata is now available.

  openSUSE: 2020:0551-1: moderate: Recommended otrs (Apr 25)
 

An update that fixes 18 vulnerabilities is now available.

  openSUSE: 2020:0549-1: moderate: crawl (Apr 24)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0545-1: moderate: vlc (Apr 23)
 

An update that fixes 12 vulnerabilities is now available.

  openSUSE: 2020:0543-1: important: the Linux Kernel (Apr 23)
 

An update that solves 7 vulnerabilities and has 76 fixes is now available.

  openSUSE: 2020:0544-1: important: MozillaThunderbird (Apr 23)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2020:0542-1: important: freeradius-server (Apr 23)
 

An update that fixes two vulnerabilities is now available.

  Mageia 2020-0185: chromium-browser-stable security update (Apr 26)
 

Chromium-browser 81.0.4044.122 fixes security issues: Multiple flaws were found in the way Chromium 81.0.4044.92 processes various types of web content, where loading a web page containing malicious content could cause Chromium to crash, execute arbitrary code,

  Mageia 2020-0184: kernel-linus security update (Apr 25)
 

This provides an update to kernel 5.6 series, currently based on upstream 5.6.6 adding support for new hardware and features, and fixes atleast the following security issues: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image,

  Mageia 2020-0183: kernel security update (Apr 25)
 

This provides an update to kernel 5.6 series, currently based on upstream 5.6.6 adding support for new hardware and features, and fixes atleast the following security issues: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image,

  Mageia 2020-0182: java-1.8.0-openjdk security update (Apr 24)
 

Updated java-1.8.0-openjdk packages fix security vulnerabilities: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754)

  Mageia 2020-0181: git security update (Apr 24)
 

Updated git packages fix security vulnerability: Malicious URLs can still cause Git to send a stored credential to the wrong server (CvE-2020-111008).

  Mageia 2020-0180: virtualbox security update (Apr 24)
 

This update provides the upstream 6.0.20 adding support for kernel 5.6 series and fixes the following security vulnerabilities: Oracle VM VirtualBox before 6.0.20 has an easily exploitable vulnerability that allows high privileged attacker with logon to the infrastructure where

  Mageia 2020-0179: mp3gain security update (Apr 24)
 

The updated package fixes a security vulnerability: A buffer over-read was discovered in ReadMP3APETag in apetag.c in MP3Gain 1.6.2. The vulnerability causes an application crash, which leads to remote denial of service. (CVE-2019-18359)