Thank you for subscribing to the LinuxSecurity Linux Advisory Watch newsletter! Staying on top of the latest security advisories issued by the distro(s) you use is essential in maintaining an updated, secure Linux system. Our weekly newsletter is an easy, convenient way to track distribution security advisories - helping you keep your Linux environment safe from malware and other exploits.


Important advisories issued this week include a Mozilla Firefox update fixing seven security vulnerabilities in the popular web browser. CentOS has issued multiple advisories this week warning of flaws in python-twisted-web affecting CentOS 6 and CenOS 7, urging users to update to protect against HTTP request smuggling. Continue reading to learn about other significant advisories issued this week. Stay healthy, safe and secure - both on and offline!


LinuxSecurity.com Feature Extras:

Open Source Intelligence, Security Hacking, and Security Blogger Dancho Danchev - Open Source Intelligence (OSINT), is a tactic used to learn about information relevant to protecting an organization from external and internal threats using publically accessible data. Being able to identify information that could potentially be used against an organization provides actionable insight that could reduce the risk that organization may face. Its an early warning system used to forecast and signal a potential threat.

Know Your Enemy: Honeynets - Honeynets are an invaluable offensive security tool for learning the tactics and motives of the blackhat community and sharing the information and insights gathered. This article will explore what a Honeynet is, its value, how it works and the risks involved with deploying a Honeynet.


  Debian: DSA-4676-2: salt security update (May 7)
 

The update for salt for the oldstable distribution (stretch) released as DSA 4676-1 contained an incomplete fix to address CVE-2020-11651 and CVE-2020-11652. Updated salt packages are now available to correct this issue. For reference, the original advisory text follows.

  Debian: DSA-4681-1: webkit2gtk security update (May 7)
 

The following vulnerability has been discovered in the webkit2gtk web engine: CVE-2020-3885

  Debian: DSA-4680-1: tomcat9 security update (May 6)
 

Several vulnerabilities were discovered in the Tomcat servlet and JSP engine, which could result in HTTP request smuggling, code execution in the AJP connector (disabled by default in Debian) or a man-in-the-middle attack against the JMX interface.

  Debian: DSA-4679-1: keystone security update (May 6)
 

A vulnerability was found in the EC2 credentials API of Keystone, the OpenStack identity service: Any user authenticated within a limited scope (trust/oauth/application credential) could create an EC2 credential with an escalated permission, such as obtaining "admin" while

  Debian: DSA-4678-1: firefox-esr security update (May 6)
 

Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or information disclosure.

  Debian: DSA-4677-1: wordpress security update (May 6)
 

Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create files on the server, disclose private information, create open

  Debian: DSA-4676-1: salt security update (May 6)
 

Several vulnerabilities were discovered in salt, a powerful remote execution manager, which could result in retrieve of user tokens from the salt master, execution of arbitrary commands on salt minions, arbitrary directory access to authenticated users or arbitrary code

  Debian: DSA-4675-1: graphicsmagick security update (May 5)
 

Several vulnerabilities have been discovered in GraphicsMagick, a set of command-line applications to manipulate image files, which could result in information disclosure, denial of service or the execution of arbitrary code if malformed image files are processed.

  Debian: DSA-4674-1: roundcube security update (May 5)
 

It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, did not correctly process and sanitize requests. This would allow a remote attacker to perform either a Cross-Site Request Forgery (CSRF) forcing an authenticated user to be

  Debian: DSA-4673-1: tomcat8 security update (May 3)
 

Several vulnerabilities were discovered in the Tomcat servlet and JSP engine, which could result in HTTP request smuggling and code execution in the AJP connector (disabled by default in Debian).

  Debian: DSA-4672-1: trafficserver security update (May 1)
 

Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service or request smuggling attacks.

  Debian: DSA-4671-1: vlc security update (Apr 30)
 

Multiple security issues were discovered in the microdns plugin of the VLC media player, which could result in denial of service or potentially the execution of arbitrary code via malicious mDNS packets.

  Fedora 31: nss FEDORA-2020-3c52435c2d (May 8)
 

- New Firefox upstream release (76.0) - New nss release needed for Firefox (3.51.1) - More info at https://www.mozilla.org/en-US/firefox/76.0/releasenotes/

  Fedora 31: firefox FEDORA-2020-3c52435c2d (May 8)
 

- New Firefox upstream release (76.0) - New nss release needed for Firefox (3.51.1) - More info at https://www.mozilla.org/en-US/firefox/76.0/releasenotes/

  Fedora 31: mingw-gnutls FEDORA-2020-d14280a6e8 (May 8)
 

https://lists.gnupg.org/pipermail/gnutls-help/2020-March/004642.html

  Fedora 30: firefox FEDORA-2020-f389eab5d1 (May 7)
 

- New Firefox upstream release (76.0) - New nss release needed for Firefox (3.51.1) - More info at https://www.mozilla.org/en-US/firefox/76.0/releasenotes/

  Fedora 30: nss FEDORA-2020-f389eab5d1 (May 7)
 

- New Firefox upstream release (76.0) - New nss release needed for Firefox (3.51.1) - More info at https://www.mozilla.org/en-US/firefox/76.0/releasenotes/

  Fedora 30: teeworlds FEDORA-2020-0d6b80678a (May 7)
 

0.7.5

  Fedora 32: mingw-gnutls FEDORA-2020-f90fb78f70 (May 7)
 

https://lists.gnupg.org/pipermail/gnutls-help/2020-March/004642.html

  Fedora 31: seamonkey FEDORA-2020-678a5157f7 (May 7)
 

Update to 2.53.2 If you have Lightning and/or Chatzilla extensions previously disabled, they are enabled after the update. Disable it again if needed (in about:addons), or remove completely (which can improve startup time).

  Fedora 31: libldb FEDORA-2020-9cf0b1c8f1 (May 7)
 

Update to Samba 4.11.8

  Fedora 31: samba FEDORA-2020-9cf0b1c8f1 (May 7)
 

Update to Samba 4.11.8

  Fedora 31: ceph FEDORA-2020-81b9c6cddc (May 7)
 

ceph-14.2.9 GA Security fix for CVE-2020-1760 ceph: header-splitting in RGW GetObject has a possible XSS Security fix for CVE-2020-1759 ceph: secure mode of msgr2 breaks both confidentiality and integrity aspects for long-lived sessions

  Fedora 30: samba FEDORA-2020-e244c98af5 (May 6)
 

Update to Samba 4.10.15

  Fedora 30: libldb FEDORA-2020-e244c98af5 (May 6)
 

Update to Samba 4.10.15

  Fedora 32: firefox FEDORA-2020-9e2c5c8f1e (May 6)
 

- New Firefox upstream release (76.0) - New nss release needed for Firefox (3.51.1) - More info at https://www.mozilla.org/en-US/firefox/76.0/releasenotes/

  Fedora 32: nss FEDORA-2020-9e2c5c8f1e (May 6)
 

- New Firefox upstream release (76.0) - New nss release needed for Firefox (3.51.1) - More info at https://www.mozilla.org/en-US/firefox/76.0/releasenotes/

  Fedora 32: java-1.8.0-openjdk FEDORA-2020-5386fe3bbb (May 6)
 

Update to OpenJDK 8u252 (April Critical Patch Update) - JDK-8223898, CVE-2020-2754: Forward references to Nashorn - JDK-8223904, CVE-2020-2755: Improve Nashorn matching - JDK-8224541, CVE-2020-2756: Better mapping of serial ENUMs - JDK-8224549, CVE-2020-2757: Less Blocking Array Queues - JDK-8225603: Enhancement for big integers - JDK-8227542: Manifest improved jar headers -

  Fedora 32: suricata FEDORA-2020-c5c2ab38cd (May 6)
 

Upstream security/bugfix release

  Fedora 31: java-11-openjdk FEDORA-2020-372eeb28f3 (May 5)
 

Update to upstream's security update, Critical Patch Update April 2020. See: https://bitly.com/oj1107

  Fedora 32: libldb FEDORA-2020-c931060ab7 (May 5)
 

Update to Samba 4.12.2

  Fedora 32: samba FEDORA-2020-c931060ab7 (May 5)
 

Update to Samba 4.12.2

  Fedora 31: rubygem-json FEDORA-2020-26df92331a (May 3)
 

A security flaw was found on rubygem-json prior to 2.3.0 which was now assigned as CVE-2020-10663. This new rpm contains backport fixes for this issue.

  Fedora 30: openvpn FEDORA-2020-969414e05b (May 3)
 

Update to latest upstream OpenVPN 2.4.9 release. It contains a security fix for CVE-2020-11810. This security issue is quite hard to abuse, requiring a fairly precise timing attack combined with guessing a just assigned peer-id reference. If successful, only a single client just initiating a new connection will experience a denial of service situation. This wi why the severity is rated

  Fedora 30: chromium FEDORA-2020-0e7f1b663b (May 3)
 

Another day, another chromium update. This one fixes: CVE-2020-6458 CVE-2020-6459 CVE-2020-6460 ---- Fix dependency issue introduced when switching from a "shared" build to a "static" build. ---- A new major version of Chromium without any security bugs! Just kidding. Here's the CVE list: CVE-2020-6454 CVE-2020-6423 CVE-2020-6455 CVE-2020-6430 CVE-2020-6456

  Fedora 30: rubygem-json FEDORA-2020-d171bf636d (May 3)
 

A security flaw was found on rubygem-json prior to 2.3.0 which was now assigned as CVE-2020-10663. This new rpm contains backport fixes for this issue.

  Fedora 30: pxz FEDORA-2020-c9eb911737 (May 3)
 

- Update to GIT 20200421 - Added patch against race condition in setting permissions on output file (#1182024) - Added patch to revert environment redirect allowing `export XZ_OPT="-9"` or similar

  Fedora 32: kernel FEDORA-2020-16f9239805 (May 2)
 

The 5.6.8 stable kernel update contains a number of important fixes across the tree.

  Fedora 31: kernel FEDORA-2020-b453269c4e (May 1)
 

The 5.6.8 stable kernel update contains a number of important fixes across the tree.

  Fedora 30: kernel FEDORA-2020-64d46a6e29 (May 1)
 

The 5.6.8 stable kernel update contains a number of important fixes across the tree.

  Fedora 30: java-11-openjdk FEDORA-2020-73341c894c (May 1)
 

Update to upstream's security update, Critical Patch Update April 2020. See: https://bitly.com/oj1107

  Fedora 30: java-latest-openjdk FEDORA-2020-92ed6d99e4 (May 1)
 

OpenJDK 14 April CPU update

  Fedora 30: git FEDORA-2020-4e093619bb (May 1)
 

Security fix for CVE-2020-5260 and CVE-2020-11008 CVE-2020-5260 - From the upstream [release notes](https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.4.txt): > With a crafted URL that contains a newline in it, the credential > helper machinery can be fooled to give credential information for > a wrong host. The

  Fedora 32: mingw-libxml2 FEDORA-2020-7694e8be73 (May 1)
 

Update to 2.9.10 * Fix CVE-2019-19956, CVE-2019-20388 and CVE-2020-7595

  Fedora 32: sqliteodbc FEDORA-2020-df7c647fa3 (May 1)
 

Fix CVE-2020-12050 (use mktemp(1) for temp. file name creation)

  Fedora 32: pxz FEDORA-2020-8b89d5b9eb (May 1)
 

- Update to GIT 20200421 - Added patch against race condition in setting permissions on output file (#1182024) - Added patch to revert environment redirect allowing `export XZ_OPT="-9"` or similar

  Fedora 31: xen FEDORA-2020-295ed0b1e0 (Apr 30)
 

multiple xenoprof issues [XSA-313, CVE-2020-11740, CVE-2020-11741] (#1823912, #1823914) Missing memory barriers in read-write unlock paths [XSA-314, CVE-2020-11739] (#1823784) Bad error path in GNTTABOP_map_grant [XSA-316, CVE-2020-11743] (#1823926) Bad continuation handling in GNTTABOP_copy [XSA-318, CVE-2020-11742] (#1823943)

  Fedora 32: php-horde-horde FEDORA-2020-6b8868fad9 (Apr 30)
 

**horde 5.2.22** * [jan] SECURITY: Protect image processing service from rendering active SVG content within the browser. * [jan] SECURITY: Fix XSS vulnerabilities in administration interface. * [jan] Support Redis Sentinel configuration (Michael Menge <This email address is being protected from spambots. You need JavaScript enabled to view it.>, Request #14998). * [jan] Use file hashing for detecting outdated configuration files.

  Gentoo: GLSA-202004-17: Django: Multiple vulnerabilities (Apr 30)
 

Multiple vulnerabilities have been found in Django, the worst of which could result in privilege escalation.

  Gentoo: GLSA-202004-16: Cacti: Multiple vulnerabilities (Apr 30)
 

Multiple vulnerabilities have been found in Cacti, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202004-15: libu2f-host: Multiple vulnerabilities (Apr 30)
 

Multiple vulnerabilities have been found in libu2f-host, the worst of which could result in the execution of code.

  Gentoo: GLSA-202004-14: FontForge: Multiple vulnerabilities (Apr 30)
 

Multiple vulnerabilities have been found in FontForge, the worst of which could result in the arbitrary execution of code.

  RedHat: RHSA-2020-2040:01 Important: squid security update (May 6)
 

An update for squid is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-2041:01 Important: squid:4 security update (May 6)
 

An update for the squid:4 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-2039:01 Important: squid:4 security update (May 6)
 

An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-2038:01 Important: squid:4 security update (May 6)
 

An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-2036:01 Critical: firefox security update (May 6)
 

An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-2037:01 Critical: firefox security update (May 6)
 

An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-2031:01 Critical: firefox security update (May 6)
 

An update for firefox is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-2032:01 Critical: firefox security update (May 6)
 

An update for firefox is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-2033:01 Critical: firefox security update (May 6)
 

An update for firefox is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-2014:01 Important: sqlite security update (May 5)
 

An update for sqlite is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1942:01 Moderate: OpenShift Container Platform 4.4.3 (May 4)
 

An update for presto-container is now available for Red Hat OpenShift Container Platform 4.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1938:01 Moderate: OpenShift Container Platform 4.4.3 (May 4)
 

An update for hadoop-container is now available for Red Hat OpenShift Container Platform 4.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1939:01 Moderate: OpenShift Container Platform 4.4.3 (May 4)
 

An update for ose-machine-config-operator-container is now available for Red Hat OpenShift Container Platform 4.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1940:01 Moderate: OpenShift Container Platform 4.4.3 (May 4)
 

An update for ose-cluster-policy-controller-container is now available for Red Hat OpenShift Container Platform 4.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1937:01 Moderate: OpenShift Container Platform 4.4.3 (May 4)
 

An update for cri-o is now available for Red Hat OpenShift Container Platform 4.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1936:01 Moderate: OpenShift Container Platform 4.4.3 (May 4)
 

An update for haproxy is now available for Red Hat OpenShift Container Platform 4.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1998:01 Moderate: gnutls security update (Apr 30)
 

An update for gnutls is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-1984:01 Moderate: kernel security and bug fix update (Apr 30)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-1422:01 Moderate: Red Hat build of Eclipse Vert.x 3.9.0 (Apr 30)
 

An update is now available for Red Hat build of Eclipse Vert.x. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For

  RedHat: RHSA-2020-1980:01 Important: git security update (Apr 30)
 

An update for git is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-1978:01 Important: git security update (Apr 30)
 

An update for git is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1979:01 Important: git security update (Apr 30)
 

An update for git is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-1981:01 Important: chromium-browser security update (Apr 30)
 

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  Slackware: 2020-126-02: mozilla-thunderbird Security Update (May 5)
 

New mozilla-thunderbird packages are available for Slackware 14.2 and -current to fix security issues.

  Slackware: 2020-126-01: mozilla-firefox Security Update (May 5)
 

New mozilla-firefox packages are available for Slackware 14.2 and -current to fix security issues.

  Slackware: 2020-124-01: seamonkey Security Update (May 3)
 

New seamonkey packages are available for Slackware 14.2 and -current to fix security issues.

  SUSE: 2020:1219-1 important: openldap2 (May 7)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1221-1 moderate: syslog-ng (May 7)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1218-1 important: MozillaFirefox (May 7)
 

An update that fixes 7 vulnerabilities is now available.

  SUSE: 2020:1220-1 important: ghostscript (May 7)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:14358-1 important: openldap2 (May 7)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1211-1 important: webkit2gtk3 (May 7)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1209-1 important: MozillaFirefox (May 7)
 

An update that fixes 7 vulnerabilities is now available.

  SUSE: 2020:1212-1 important: ghostscript (May 7)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1210-1 important: openldap2 (May 7)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2020:1213-1 moderate: rmt-server (May 7)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:1208-1 important: libvirt (May 6)
 

An update that solves two vulnerabilities and has 8 fixes is now available.

  SUSE: 2020:1199-1 moderate: php7 (May 6)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:1198-1 important: webkit2gtk3 (May 6)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1197-1 important: slirp4netns (May 6)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1194-1 important: python-Pillow (May 6)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:1193-1 important: openldap2 (May 5)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1190-1 moderate: ardana-ansible, ardana-barbican, ardana-cluster, ardana-db, ar (May 5)
 

An update that solves 5 vulnerabilities and has 10 fixes is now available.

  SUSE: 2020:14356-1 important: mailman (May 5)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:1180-1 moderate: icu (May 5)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1179-1 moderate: rmt-server (May 5)
 

An update that solves one vulnerability and has four fixes is now available.

  SUSE: 2020:1178-1 moderate: rubygem-actionview-5_1 (May 5)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:1177-1 moderate: rpmlint (May 5)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:1171-1 moderate: nginx (May 4)
 

An update that solves one vulnerability and has three fixes is now available.

  SUSE: 2020:14355-1 important: LibVNCServer (May 4)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2020:1165-1 important: LibVNCServer (May 4)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2020:1163-1 important: permissions (May 4)
 

An update that solves three vulnerabilities and has one errata is now available.

  SUSE: 2020:1164-1 important: LibVNCServer (May 4)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2020:14354-1 important: the Linux Kernel (Apr 30)
 

An update that solves 28 vulnerabilities and has 20 fixes is now available.

  SUSE: 2020:1156-1 important: squid (Apr 30)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2020:1158-1 important: ceph (Apr 30)
 

An update that fixes one vulnerability is now available.

  Ubuntu 4353-1: Firefox vulnerabilities (May 7)
 

Firefox could be made to crash or run programs as your login if it opened a malicious website.

  Ubuntu 4352-2: OpenLDAP vulnerability (May 6)
 

OpenLDAP could be made to crash if it received specially crafted network traffic.

  Ubuntu 4352-1: OpenLDAP vulnerability (May 6)
 

OpenLDAP could be made to crash if it received specially crafted network traffic.

  Ubuntu 4351-1: Linux firmware vulnerability (May 6)
 

The system could be made to expose sensitive information.

  Ubuntu 4330-2: PHP vulnerabilities (May 6)
 

Several security issues were fixed in PHP.

  Ubuntu 4350-1: MySQL vulnerabilities (May 4)
 

Several security issues were fixed in MySQL.

  Ubuntu 4349-1: EDK II vulnerabilities (Apr 30)
 

Several security issues were fixed in edk2.

  Ubuntu 4333-2: Python vulnerabilities (Apr 30)
 

Several security issues were fixed in Python.

  Debian LTS: DLA-2205-1: firefox-esr security update (May 8)
 

Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or information disclosure.

  Debian LTS: DLA-2204-1: mailman security update (May 7)
 

It was discovered that there was an arbitrary content injection vulnerability in the Mailman mailing list manager. For Debian 8 "Jessie", this issue has been fixed in mailman version

  Debian LTS: DLA-2203-1: sqlite3 security update (May 5)
 

It was discovered that there was a denial of service attack in the SQLite database, often embedded into other programs and servers. In the event of a semantic error in an aggregate query, SQLite did

  Debian LTS: DLA-2202-1: ansible security update (May 5)
 

Several vulnerabilities were discovered in Ansible, a configuration management, deployment, and task execution system.

  Debian LTS: DLA-2201-1: ntp security update (May 5)
 

A Denial of Service (DoS) vulnerability was discovered in the network time protocol server/client, ntp. ntp allowed an "off-path" attacker to block unauthenticated

  Debian LTS: DLA-2196-2: pound regression update (May 3)
 

A regression has been found in the patch for CVE-2016-10711 of pound, a reverse proxy, load balancer and HTTPS front-end for Web servers. Without the fix pound can be tricked to use 100% CPU.

  Debian LTS: DLA-2200-1: mailman security update (May 3)
 

A vulnerability was discovered in mailman. GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against

  Debian LTS: DLA-2199-1: openldap security update (May 2)
 

A vulnerability was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. LDAP search filters with nested boolean expressions can result in denial of service (slapd daemon

  Debian LTS: DLA-2198-1: otrs2 security update (May 1)
 

Several vulnerabilities have been discovered in otrs2 (Open source Ticket Request System)

  Debian LTS: DLA-2197-1: miniupnpc security update (Apr 30)
 

It was discovered that there was a integer signedness error in the miniupnpc UPnP client that could allow remote attackers to cause a denial of service attack.

  Debian LTS: DLA-2196-1: pound security update (Apr 30)
 

An issue has been found in pound, A request smuggling vulnerability was discovered in pound, a everse proxy, load balancer and HTTPS front-end for Web servers, that may allow

  Debian LTS: DLA-2195-1: w3m security update (Apr 30)
 

Two issues have been found in w3m, WWW browsable pager with excellent tables/frames support.

  Debian LTS: DLA-2194-1: yodl security update (Apr 30)
 

An issue has been found in yodl, a pre-document language. Hanno Bock discovered that there was a buffer over-read vulnerability.

  ArchLinux: 202005-1: salt: multiple issues (May 5)
 

The package salt before version 2019.2.4-1 is vulnerable to multiple issues including arbitrary command execution and arbitrary filesystem access.

  ArchLinux: 202004-24: libmicrodns: multiple issues (May 5)
 

The package libmicrodns before version 0.1.2-1 is vulnerable to multiple issues including arbitrary code execution, denial of service and information disclosure.

  ArchLinux: 202004-23: webkit2gtk: arbitrary code execution (Apr 30)
 

The package webkit2gtk before version 2.28.2-1 is vulnerable to arbitrary code execution.

  ArchLinux: 202004-22: chromium: arbitrary code execution (Apr 30)
 

The package chromium before version 81.0.4044.129-1 is vulnerable to arbitrary code execution.

  ArchLinux: 202004-21: git: information disclosure (Apr 30)
 

The package git before version 2.26.2-1 is vulnerable to information disclosure.

  CentOS: CESA-2020-1962: Important CentOS 6 python-twisted-web (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1962

  CentOS: CESA-2020-1489: Important CentOS 7 thunderbird (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1489

  CentOS: CESA-2020-1561: Important CentOS 7 python-twisted-web (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1561

  CentOS: CESA-2020-1511: Important CentOS 7 git (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1511

  CentOS: CESA-2020-1507: Important CentOS 7 java-1.7.0-openjdk (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1507

  CentOS: CESA-2020-1512: Important CentOS 7 java-1.8.0-openjdk (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1512

  CentOS: CESA-2020-1509: Important CentOS 7 java-11-openjdk (Apr 30)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:1509

  SciLinux: SLSA-2020-2036-1 Critical: firefox on SL6.x i386/x86_64 (May 6)
 

Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) * Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) * Mozilla: Buffer overflow in SCTP chunk input validation (CVE-2020-6831) * Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392) SL6 x86_64 firefox-68.8.0-1.el6_10.x86_64.rpm firefox-debuginfo-68.8.0-1.el6_10. [More...]

  SciLinux: SLSA-2020-2040-1 Important: squid on SL7.x x86_64 (May 6)
 

squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) * squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) * squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525) SL7 x86_64 squid-3.5.20-15.el7_8.1.x86_64.rpm s [More...]

  SciLinux: SLSA-2020-2037-1 Critical: firefox on SL7.x x86_64 (May 6)
 

Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) * Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) * Mozilla: Buffer overflow in SCTP chunk input validation (CVE-2020-6831) * Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392) SL7 x86_64 firefox-68.8.0-1.el7_8.x86_64.rpm firefox-debuginfo-68.8.0-1.el7_8.x8 [More...]

  openSUSE: 2020:0615-1: important: chromium (May 6)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2020:0612-1: important: sqliteodbc (May 5)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0609-1: python-typed-ast (May 4)
 

An update that solves two vulnerabilities and has one errata is now available.

  openSUSE: 2020:0607-1: moderate: bouncycastle (May 3)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0606-1: moderate: squid (May 3)
 

An update that fixes four vulnerabilities is now available.

  openSUSE: 2020:0604-1: important: chromium (May 3)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2020:0602-1: important: webkit2gtk3 (May 2)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0601-1: important: samba (May 2)
 

An update that solves one vulnerability and has two fixes is now available.

  openSUSE: 2020:0599-1: important: xen (May 1)
 

An update that solves 5 vulnerabilities and has 7 fixes is now available.

  openSUSE: 2020:0585-1: important: resource-agents (May 1)
 

An update that contains security fixes can now be installed.

  openSUSE: 2020:0586-1: moderate: ruby2.5 (May 1)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:0598-1: moderate: git (May 1)
 

An update that solves 15 vulnerabilities and has 8 fixes is now available.

  openSUSE: 2020:0597-1: important: apache2 (May 1)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2020:0567-1: python-typed-ast (May 1)
 

An update that solves two vulnerabilities and has one errata is now available.

  openSUSE: 2020:0566-1: critical: chromium (May 1)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:0565-1: important: cacti, cacti-spine (Apr 30)
 

An update that fixes 11 vulnerabilities is now available.

  openSUSE: 2020:0564-1: critical: salt (Apr 30)
 

An update that fixes two vulnerabilities is now available.

  Mageia 2020-0207: libvncserver security update (May 8)
 

Updated libvncserver packages fix security vulnerability: libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value (CVE-2019-20788).

  Mageia 2020-0206: roundcubemail security update (May 8)
 

Updated roundcubemail packages fix security vulnerabilities: - Cross-Site Scripting (XSS) via malicious HTML content (CVE-2020-12625) - CSRF attack can cause an authenticated user to be logged out

  Mageia 2020-0205: samba security update (May 8)
 

Updated samba packages fix security vulnerabilities: A client combining the 'ASQ' and 'Paged Results' LDAP controls can cause a use-after-free in Samba's AD DC LDAP server (CVE-2020-10700).

  Mageia 2020-0204: qt4 security update (May 8)
 

Updated qt4 packages fix security vulnerabilities: A double-free or corruption during parsing of a specially crafted illegal XML document (CVE-2018-15518).

  Mageia 2020-0203: vlc security update (May 8)
 

Multiple security issues were discovered in the microdns plugin of the VLC media player, which could result in denial of service or potentially the execution of arbitrary code via malicious mDNS packets (CVE-2020-6071, CVE-2020-6072, CVE-2020-6073, CVE-2020-6077, CVE-2020-6078, CVE-2020-6079, CVE-2020-6080).

  Mageia 2020-0202: matio security update (May 8)
 

Updated matio packages fix a security vulnerability: Multiple integer overflows exist in MATIO before 1.5.16, related to mat.c, mat4.c, mat5.c, mat73.c, and matvar_struct.c (CVE-2019-13107).

  Mageia 2020-0201: kernel security update (May 5)
 

This update is based on the upstream 5.6.8 kernel and fixes atleast the following security issue: usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a

  Mageia 2020-0200: openldap security update (May 5)
 

Updated openldap packages fix security vulnerabilities: When both the nops module and the member of overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation

  Mageia 2020-0199: fortune-mod security update (May 5)
 

Updated fortune-mod fixes integer and buffer overflows that might have security implications. References: - https://bugs.mageia.org/show_bug.cgi?id=26567

  Mageia 2020-0198: chromium-browser-stable security update (May 5)
 

Chromium-browser 81.0.4044.129 fixes security issues: Multiple flaws were found in the way Chromium 81.0.4044.122 processes various types of web content, where loading a web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive

  Mageia 2020-0197: libsndfile security update (May 5)
 

Updated libsndfile packages fix security vulnerabilities: An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2ulaw_array in ulaw.c that will lead to a denial of service (CVE-2018-19661).

  Mageia 2020-0196: exiv2 security update (May 5)
 

The updated packages fix a security vulnerability: A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.

  Mageia 2020-0195: openvpn security update (May 5)
 

Updated openvpn packages fix security vulnerability: An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the

  Mageia 2020-0194: gnuchess security update (May 5)
 

Updated gnuchess package fixes security vulnerability: A vulnerability was found in GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file (CVE-2019-15767).

  Mageia 2020-0193: dolphin-emu security update (May 5)
 

Updated dolphin-emu package fixes security vulnerabilities Dolphin Emulator includes a modified copy of the SoundTouch library at version 1.9.2. That version is subject to the following security issues:

  Mageia 2020-0192: qtbase5 security update (May 5)
 

Updated qtbase5 packages fix security vulnerability: An XML Entity Expansion flaw was found in the QT library. Applications that use QT to load untrusted images, for example, SVG images, or untrusted XML documents, may be vulnerable to this flaw. This flaw allows an attacker to

  Mageia 2020-0191: teeworlds security update (May 5)
 

Updated teeworlds packages fix security vulnerabilities Teeworlds before 0.7.4 is subject to an integer overflow when computing a tilemap size (CVE-2019-20787).

  Mageia 2020-0190: crawl security update (May 5)
 

Updated crawl packages fix security vulnerability crawl 0.24.0 and earlier are subject to possible remote code evaluation with lua loadstring (CVE-2020-11722).

  Mageia 2020-0189: openexr security update (May 5)
 

The updated packages fix security vulnerabilities: An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read in ImfOptimizedPixelReading.h. (CVE-2020-11758)

  Mageia 2020-0188: webkit2 security update (May 5)
 

Updated webkit2 packages fix security vulnerability: A memory consumption issue was addressed with improved memory handling. A remote attacker may be able to cause arbitrary code execution (CVE-2020-3899).

  Mageia 2020-0187: squid security update (May 5)
 

Updated squid packages fix security vulnerability: Due to an integer overflow bug Squid is vulnerable to credential replay and remote code execution attacks against HTTP Digest Authentication tokens. When memory pooling is used this problem allows a remote client to replay a

  Mageia 2020-0186: ruby-json security update (May 5)
 

Updated ruby-json packages fix security vulnerability: In ruby-json before 2.3.0, there is an unsafe object creation vulnerability. When parsing certain JSON documents, the json gem can be coerced into creating arbitrary objects in the target system (CVE-2020-10663).