Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.


LinuxSecurity.com Feature Extras:

A Critical Exim Vulnerability, Lilocked Ransomware on the Rise, but Linux Not to Blame - Exim may be the Internets most popular email server, but the MTAs recent history with security vulnerabilities is concerning to say the least. This past Friday, the Exim team warned about a critical flaw in its software , affecting all Exim servers running version 4.92.1 and before. When exploited, the bug enables attackers to run malicious code with root privileges. Exim released version 4.92.2 on Friday, September 6, to address the issue, and recommends that users running a prior version of Exim update immediately.

Which Linux Distros Are Most Focused On Privacy? - With over 200 distros to choose from, which one actually offers the most privacy-oriented experience?


  Debian: DSA-4544-1: unbound security update (Oct 16)
 

X41 D-Sec discovered that unbound, a validating, recursive, and caching DNS resolver, did not correctly process some NOTIFY queries. This could lead to remote denial-of-service by application crash.

  Debian: DSA-4509-3: apache2 security update (Oct 15)
 

It was reported that the apache2 update released as DSA 4509-1 incorrectly fixed CVE-2019-10092. Updated apache2 packages are now available to correct this issue. For reference, the relevant part of the original advisory text follows.

  Debian: DSA-4543-1: sudo security update (Oct 14)
 

Joe Vennix discovered that sudo, a program designed to provide limited super user privileges to specific users, when configured to allow a user to run commands as an arbitrary user via the ALL keyword in a Runas specification, allows to run commands as root by specifying the user ID

  Debian: DSA-4539-3: openssl regression update (Oct 13)
 

The update for openssl released as DSA 4539-1 introduced a regression where AES-CBC-HMAC-SHA ciphers were not enabled. Updated openssl packages are now available to correct this issue.

 
  Fedora 31: kernel-tools FEDORA-2019-038d78eaa5 (Oct 17)
 

The 5.3.6 update contains a number of important fixes across the tree.

  Fedora 31: kernel FEDORA-2019-038d78eaa5 (Oct 17)
 

The 5.3.6 update contains a number of important fixes across the tree.

  Fedora 31: kernel-headers FEDORA-2019-038d78eaa5 (Oct 17)
 

The 5.3.6 update contains a number of important fixes across the tree.

  Fedora 29: runc FEDORA-2019-3fc86a518b (Oct 15)
 

Resolves: #1757214, #1757290 - CVE-2019-16884 ---- add patch for cgroupsv2

  Fedora 30: sudo FEDORA-2019-9cb221f2be (Oct 15)
 

* Rebase to 1.8.28 * Fixed CVE-2019-14287

  Fedora 30: runc FEDORA-2019-96946c39dd (Oct 15)
 

Resolves: #1757214, #1757290 - CVE-2019-16884 ---- add patch for cgroupsv2

  Fedora 30: opendmarc FEDORA-2019-24b3f84f6e (Oct 15)
 

This update provides the final 1.3.2 release (previously the package was 1.3.2 beta). It also includes the previously-omitted database schema directory (resolving [#1415753](https://bugzilla.redhat.com/show_bug.cgi?id=1415753)) and rddmarc tools, and backports proposed fixes for a [crasher bug](https://bugzilla.redhat.com/show_bug.cgi?id=1673293) and [security issue

  Fedora 30: thunderbird FEDORA-2019-14af6fde2e (Oct 12)
 

Update to latest upstream version.

  Fedora 29: opendmarc FEDORA-2019-e1f0417a24 (Oct 11)
 

This update provides the final 1.3.2 release (previously the package was 1.3.2 beta). It also includes the previously-omitted database schema directory (resolving [#1415753](https://bugzilla.redhat.com/show_bug.cgi?id=1415753)) and rddmarc tools, and backports proposed fixes for a [crasher bug](https://bugzilla.redhat.com/show_bug.cgi?id=1673293) and [security issue

  Fedora 29: ming FEDORA-2019-03aa4f746c (Oct 11)
 

Backport security fixes from [PR#145](https://github.com/libming/libming/pull/145) Fixes: CVE-2018-7866, CVE-2018-7873, CVE-2018-7876, CVE-2018-9009, CVE-2018-9132

  Fedora 30: libapreq2 FEDORA-2019-7fbe8a9a06 (Oct 11)
 

Patch CVE-2019-12412.

  Fedora 30: cutter-re FEDORA-2019-b3de19c346 (Oct 11)
 

- Rebase radare2 to 3.9.0 - Rebase cutter-re to 1.9.0 - fix CVE-2019-14745 in radare2 on F30

  Fedora 30: radare2 FEDORA-2019-b3de19c346 (Oct 11)
 

- Rebase radare2 to 3.9.0 - Rebase cutter-re to 1.9.0 - fix CVE-2019-14745 in radare2 on F30

  Fedora 30: jackson-parent FEDORA-2019-b171554877 (Oct 11)
 

- Update jackson-parent to version 2.10. - Update jackson-bom to version 2.10.0. - Update jackson-annotations to version 2.10.0. - Update jackson-core to version 2.10.0. - Update jackson-databind to version 2.10.0. Resolves CVE-2019-14540, CVE-2019-16335, CVE-2019-16942, CVE-2019-16943.

  Fedora 30: jackson-core FEDORA-2019-b171554877 (Oct 11)
 

- Update jackson-parent to version 2.10. - Update jackson-bom to version 2.10.0. - Update jackson-annotations to version 2.10.0. - Update jackson-core to version 2.10.0. - Update jackson-databind to version 2.10.0. Resolves CVE-2019-14540, CVE-2019-16335, CVE-2019-16942, CVE-2019-16943.

  Fedora 30: jackson-databind FEDORA-2019-b171554877 (Oct 11)
 

- Update jackson-parent to version 2.10. - Update jackson-bom to version 2.10.0. - Update jackson-annotations to version 2.10.0. - Update jackson-core to version 2.10.0. - Update jackson-databind to version 2.10.0. Resolves CVE-2019-14540, CVE-2019-16335, CVE-2019-16942, CVE-2019-16943.

  Fedora 30: jackson-annotations FEDORA-2019-b171554877 (Oct 11)
 

- Update jackson-parent to version 2.10. - Update jackson-bom to version 2.10.0. - Update jackson-annotations to version 2.10.0. - Update jackson-core to version 2.10.0. - Update jackson-databind to version 2.10.0. Resolves CVE-2019-14540, CVE-2019-16335, CVE-2019-16942, CVE-2019-16943.

  Fedora 30: jackson-bom FEDORA-2019-b171554877 (Oct 11)
 

- Update jackson-parent to version 2.10. - Update jackson-bom to version 2.10.0. - Update jackson-annotations to version 2.10.0. - Update jackson-core to version 2.10.0. - Update jackson-databind to version 2.10.0. Resolves CVE-2019-14540, CVE-2019-16335, CVE-2019-16942, CVE-2019-16943.

  Fedora 30: ming FEDORA-2019-5139453028 (Oct 11)
 

Backport security fixes from [PR#145](https://github.com/libming/libming/pull/145) Fixes: CVE-2018-7866, CVE-2018-7873, CVE-2018-7876, CVE-2018-9009, CVE-2018-9132

  Fedora 29: krb5 FEDORA-2019-dc4e1d0fb6 (Oct 10)
 

Fix KDC crash when logging PKINIT enctypes (CVE-2019-14844) This is a purely denial-of-service issue, though it is unauthenticated, and is unlikely to trigger by accident.

  Fedora 29: SDL2 FEDORA-2019-8ef33a69ca (Oct 10)
 

Update to 2.0.10 to fix security issues.

 
  RedHat: RHSA-2019-3144:01 Important: OpenShift Container Platform 3.11 (Oct 17)
 

An update for jenkins is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3143:01 Moderate: OpenShift Container Platform 3.11 (Oct 17)
 

An update for atomic-openshift is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3142:01 Low: OpenShift Container Platform 3.11 mediawiki (Oct 17)
 

An update for mediawiki is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3140:01 Important: Red Hat JBoss Data Virtualization (Oct 17)
 

An update is now available for Red Hat JBoss Data Virtualization. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-3136:01 Important: java-1.8.0-openjdk security update (Oct 17)
 

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3135:01 Important: java-11-openjdk security update (Oct 17)
 

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3134:01 Important: java-1.8.0-openjdk security update (Oct 17)
 

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3007:01 Moderate: OpenShift Container Platform 4.1.20 (Oct 16)
 

An update for openshift-enterprise-builder-container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3131:01 Important: OpenShift Container Platform 4.1.20 (Oct 16)
 

An update is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-3132:01 Important: OpenShift Container Platform 4.1.20 (Oct 16)
 

An update for openshift is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3127:01 Important: java-11-openjdk security update (Oct 16)
 

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3128:01 Important: java-1.8.0-openjdk security update (Oct 16)
 

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3089:01 Important: kernel-rt security and bug fix update (Oct 16)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-3055:01 Important: kernel security and bug fix update (Oct 15)
 

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-3067:01 Important: jss security update (Oct 15)
 

An update for jss is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-3076:01 Important: kpatch-patch security update (Oct 15)
 

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-3082:01 Moderate: Red Hat JBoss Enterprise Application (Oct 15)
 

A security update is now available for Red Hat JBoss Enterprise Application Platform from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3083:01 Moderate: Red Hat JBoss Enterprise Application (Oct 15)
 

A security update is now available for Red Hat JBoss Enterprise Application Platform from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3050:01 Important: Red Hat Single Sign-On 7.3.4 security (Oct 14)
 

A security update is now available for Red Hat Single Sign-On 7.3 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3049:01 Low: RH-SSO 7.3.4 adapters for Enterprise (Oct 14)
 

Red Hat Single Sign-On 7.3.4 adapters are now available for Red Hat JBoss Enterprise Application Platform 7.2 Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3048:01 Low: RH-SSO 7.3.4 adapters for Enterprise (Oct 14)
 

Red Hat Single Sign-On 7.3.4 adapters are now available for Red Hat JBoss Enterprise Application Platform 6. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3046:01 Important: Red Hat Single Sign-On 7.3.4 security (Oct 14)
 

New Red Hat Single Sign-On 7.3.4 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3045:01 Important: Red Hat Single Sign-On 7.3.4 security (Oct 14)
 

New Red Hat Single Sign-On 7.3.4 packages are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3044:01 Important: Red Hat Single Sign-On 7.3.4 security (Oct 14)
 

New Red Hat Single Sign-On 7.3.4 packages are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-3041:01 Important: Red Hat OpenShift Service Mesh 1.0.1 (Oct 14)
 

Red Hat OpenShift Service Mesh 1.0.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2989:01 Moderate: OpenShift Container Platform 3.10 (Oct 14)
 

An update for atomic-openshift kube-apiserver is now available for Red Hat OpenShift Container Platform 3.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3024:01 Moderate: ovirt-web-ui security and bug fix update (Oct 10)
 

An update for ovirt-web-ui is now available for Red Hat Virtualization Engine 4.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3023:01 Moderate: ovirt-engine-ui-extensions security and (Oct 10)
 

An update for ovirt-engine-ui-extensions is now available for Red Hat Virtualization Engine 4.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3011:01 Moderate: Red Hat Virtualization security, bug fix, (Oct 10)
 

An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-3002:01 Important: Red Hat FIS 2.0 on Fuse 6.3.0 R13 (Oct 10)
 

An update is now available for Red Hat Fuse Integration Services. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2998:01 Important: Red Hat OpenShift Application Runtimes (Oct 10)
 

An update is now available for Red Hat OpenShift Application Runtimes. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2995:01 Important: Red Hat A-MQ Broker 7.5 release and (Oct 10)
 

Red Hat A-MQ Broker 7.5 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

 
  Slackware: 2019-287-01: sudo Security Update (Oct 14)
 

New sudo packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.

 
  SUSE: 2019:2707-1 important: postgresql10 (Oct 17)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2702-1 moderate: gcc7 (Oct 16)
 

An update that solves two vulnerabilities and has three fixes is now available.

  SUSE: 2019:2687-1 moderate: mariadb-100 (Oct 16)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2019:2673-1 important: libpcap (Oct 15)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:2674-1 important: tcpdump (Oct 15)
 

An update that fixes 28 vulnerabilities is now available.

  SUSE: 2019:2667-1 important: sudo (Oct 15)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2668-1 important: sudo (Oct 15)
 

An update that solves one vulnerability and has three fixes is now available.

  SUSE: 2019:2669-1 important: libpcap (Oct 15)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:2666-1 important: sudo (Oct 15)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:14191-1 important: tcpdump (Oct 15)
 

An update that fixes 83 vulnerabilities is now available.

  SUSE: 2019:2655-1 important: kubernetes-salt (Oct 14)
 

An update that contains security fixes can now be installed.

  SUSE: 2019:2656-1 important: sudo (Oct 14)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2657-1 moderate: dhcp (Oct 14)
 

An update that solves one vulnerability and has two fixes is now available.

  SUSE: 2019:1299-2 ffmpeg (Oct 14)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:2650-1 moderate: binutils (Oct 14)
 

An update that solves 17 vulnerabilities and has three fixes is now available.

  SUSE: 2019:1212-2 important: jakarta-commons-fileupload (Oct 11)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2019:1368-2 important: Recommended sles12sp3-docker-image, sles12sp4-image, system-user-root (Oct 11)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:1373-2 moderate: axis (Oct 11)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:2345-2 important: webkit2gtk3 (Oct 11)
 

An update that fixes 24 vulnerabilities is now available.

 
  Ubuntu 4158-1: LibTIFF vulnerabilities (Oct 17)
 

Several security issues were fixed in LibTIFF.

  Ubuntu 4157-1: Linux kernel vulnerabilities (Oct 16)
 

Several security issues were fixed in the Linux kernel.

  Ubuntu 4156-2: SDL vulnerabilities (Oct 16)
 

Several security issues were fixed in SDL.

  Ubuntu 4156-1: SDL vulnerabilities (Oct 15)
 

Several security issues were fixed in SDL.

  Ubuntu 4155-1: Aspell vulnerability (Oct 15)
 

Aspell could be made to expose sensitive information if it received a specially crafted input.

  Ubuntu 4154-1: Sudo vulnerability (Oct 14)
 

Sudo could be made to run commands as root if it called with a specially crafted user ID.

  Ubuntu 4151-2: Python vulnerabilities (Oct 10)
 

Several security issues were fixed in Python.

  Ubuntu 4153-1: Octavia vulnerability (Oct 10)
 

Octavia could allow unintended access to network services.

 
  Debian LTS: DLA-1963-2: poppler regression update (Oct 18)
 

The fix for CVE-2019-10871 broke xpdf. This change has been reverted until a better fix can be developed.

  Debian LTS: DLA-1963-1: poppler security update (Oct 18)
 

Two buffer allocation issues were identified in poppler. CVE-2019-9959

  Debian LTS: DLA-1960-1: wordpress security update (Oct 17)
 

Several cross-site scripting (XSS) vulnerabilities were discovered in Wordpress, a popular content management framework. An attacker can use these flaws to send malicious scripts to an unsuspecting user.

  Debian LTS: DLA-1964-1: sudo security update (Oct 17)
 

In sudo, a program that provides limited super user privileges to specific users, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can

  Debian LTS: DLA-1714-2: libsdl2 regression update (Oct 17)
 

The update of libsdl2 released as DLA 1714-1 led to several regressions, as reported by Avital Ostromich. These regressions are caused by libsdl1.2 patches for CVE-2019-7637, CVE-2019-7635, CVE-2019-7638 and CVE-2019-7636 being applied to libsdl2 without adaptations.

  Debian LTS: DLA-1713-2: libsdl1.2 regression update (Oct 17)
 

The update of libsdl1.2 released as DLA 1713-1 led to a regression, caused by an incomplete fix for CVE-2019-7637. This issue was known upstream and resulted, among others, in windows versions from libsdl1.2 failing to set video mode.

  Debian LTS: DLA-1959-1: xtrlock security update (Oct 14)
 

It was discovered that multitouch devices were not being disabled by the "xtrlock" screen locking utility. xtrlock did not block multitouch events so an attacker could still

  Debian LTS: DLA-1953-2: clamav regression update (Oct 14)
 

The update of clamav released as DLA 1953-1 led to permission issues on /var/run/clamav. This caused several users to experience issues restarting the clamav daemon. This regression is caused by a mistakenly backported patch from the stretch package, upon which this update was based.

  Debian LTS: DLA-1958-1: libdatetime-timezone-perl new upstream (Oct 14)
 

This update includes the changes in tzdata 2019c for the Perl bindings. For the list of changes, see DLA-1957-1. For Debian 8 "Jessie", this problem has been fixed in version

  Debian LTS: DLA-1957-1: tzdata new upstream version (Oct 14)
 

This update includes the changes in tzdata 2018c. Notable changes are: - Brazil has canceled DST and will stay on standard time indefinitely.

  Debian LTS: DLA-1955-1: tcpdump security update (Oct 11)
 

Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These security vulnerabilities might result in denial of service or, potentially, execution of arbitrary code.

  Debian LTS: DLA-1956-1: ruby-openid security update (Oct 11)
 

ruby-openid performed discovery first, and then verification. This allowed an attacker to change the URL used for discovery and trick the server into connecting to the URL. This server in turn could be a private server not publicly accessible.

  Debian LTS: DLA-1954-1: lucene-solr security update (Oct 10)
 

A security vulnerability was discovered in lucene-solr, an enterprise search server. The DataImportHandler, an optional but popular module to pull in data

  Debian LTS: DLA-1953-1: clamav security update (Oct 10)
 

It was discovered that clamav, the open source antivirus engine, is affected by the following security vulnerabilities: CVE-2019-12625

 
  ArchLinux: 201910-9: sudo: privilege escalation (Oct 16)
 

The package sudo before version 1.8.28-1 is vulnerable to privilege escalation.

  ArchLinux: 201910-8: sdl: arbitrary code execution (Oct 11)
 

The package sdl before version 1.2.15-13 is vulnerable to arbitrary code execution.

  ArchLinux: 201910-7: chromium: multiple issues (Oct 11)
 

The package chromium before version 77.0.3865.120-1 is vulnerable to multiple issues including arbitrary code execution and information disclosure.

  ArchLinux: 201910-6: unbound: denial of service (Oct 11)
 

The package unbound before version 1.9.4-1 is vulnerable to denial of service.

 
  SciLinux: SLSA-2019-3055-1 Important: kernel on SL7.x x86_64 (Oct 18)
 

kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c (CVE-2018-20856) * kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846) * hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506) * kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ [More...]

  SciLinux: SLSA-2019-3127-1 Important: java-11-openjdk on SL7.x x86_64 (Oct 17)
 

OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) * OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975) * OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062) (CVE-2019-2977) * OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handl [More...]

  SciLinux: SLSA-2019-3128-1 Important: java-1.8.0-openjdk on SL7.x x86_64 (Oct 17)
 

OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) * OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975) * OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) * OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConne [More...]

  SciLinux: SLSA-2019-3067-1 Important: jss on SL7.x x86_64 (Oct 16)
 

JSS: OCSP policy "Leaf and Chain" implicitly trusts the root certificate (CVE-2019-14823) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. SL7 x86_64 jss-4.4.6-3.el7_7.x86_64.rpm jss-debuginfo-4.4.6-3.el7_7.x86_64.rpm jss-javadoc-4.4.6-3.el [More...]

 
  openSUSE: 2019:2333-1: important: sudo (Oct 17)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2321-1: moderate: GraphicsMagick (Oct 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2317-1: moderate: GraphicsMagick (Oct 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2319-1: important: libopenmpt (Oct 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2318-1: moderate: epiphany (Oct 16)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2316-1: important: sudo (Oct 15)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2314-1: important: chromium (Oct 14)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2019:2313-1: important: chromium (Oct 14)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2019:2311-1: important: chromium (Oct 12)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2019:2312-1: important: chromium (Oct 12)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2019:2306-1: important: libopenmpt (Oct 10)
 

An update that fixes one vulnerability is now available.

 
  Mageia 2019-0298: sudo security update (Oct 16)
 

The updated packages fix a security vulnerability: Potential bypass of Runas user restrictions. (CVE-2019-14287) References:

  Mageia 2019-0297: libpcap and tcpdump security update (Oct 16)
 

Updated libpcap and tcpdump packages fix security vulnerabilities: The libpcap packages have been updated to versions 1.9.1 and tcpdump to 4.9.3, respectively, fixing several buffer overread and overflow issues.

  Mageia 2019-0296: e2fsprogs security update (Oct 16)
 

Updated e2fsprogs packages fix security vulnerability: Lilith of Cisco Talos discovered a buffer overflow flaw in the quota code used by e2fsck from the ext2/ext3/ext4 file system utilities. Running e2fsck on a malformed file system can result in the execution of arbitrary

  Mageia 2019-0295: kernel security update (Oct 16)
 

This kernel update is based on the upstream 5.3.6 and fixes several issues. * a potential kernel crash by using suppress-prefix rule in ipv6 * 3rdparty rtl8723/rtl8821ce drivers have been fixed to work with kernel 5.3 series

  Mageia 2019-0294: nmap security update (Oct 16)
 

Updated nmap packages fix security vulnerability: Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service (CVE-2018-15173).