Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.


LinuxSecurity.com Feature Extras:

A Critical Exim Vulnerability, Lilocked Ransomware on the Rise, but Linux Not to Blame - Exim may be the Internets most popular email server, but the MTAs recent history with security vulnerabilities is concerning to say the least. This past Friday, the Exim team warned about a critical flaw in its software , affecting all Exim servers running version 4.92.1 and before. When exploited, the bug enables attackers to run malicious code with root privileges. Exim released version 4.92.2 on Friday, September 6, to address the issue, and recommends that users running a prior version of Exim update immediately.

Which Linux Distros Are Most Focused On Privacy? - With over 200 distros to choose from, which one actually offers the most privacy-oriented experience?


  Debian: DSA-4533-1: lemonldap-ng security update (Sep 25)
 

It was discovered that the Lemonldap::NG web SSO system did not restrict OIDC authorization codes to the relying party. For the stable distribution (buster), this problem has been fixed in

  Debian: DSA-4532-1: spip security update (Sep 25)
 

It was discovered that SPIP, a website engine for publishing, would allow unauthenticated users to modify published content and write to the database, perform cross-site request forgeries, and enumerate registered users.

  Debian: DSA-4531-1: linux security update (Sep 25)
 

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

  Debian: DSA-4530-1: expat security update (Sep 22)
 

It was discovered that Expat, an XML parsing C library, did not properly handled internal entities closing the doctype, potentially resulting in denial of service or information disclosure if a malformed XML file is processed.

  Debian: DSA-4529-1: php7.0 security update (Sep 20)
 

Multiple security issues were found in PHP, a widely-used open source general purpose scripting language: Missing sanitising in the EXIF extension and the iconv_mime_decode_headers() function could result in information disclosure or denial of service.

  Debian: DSA-4528-1: bird security update (Sep 19)
 

Daniel McCarney discovered that the BIRD internet routing daemon incorrectly validated RFC 8203 messages in it's BGP daemon, resulting in a stack buffer overflow.

  Debian: DSA-4527-1: php7.3 security update (Sep 19)
 

Multiple security issues were found in PHP, a widely-used open source general purpose scripting language: Missing sanitising in the EXIF extension and the iconv_mime_decode_headers() function could result in information disclosure or denial of service.

  Debian: DSA-4526-1: opendmarc security update (Sep 19)
 

It was discovered that OpenDMARC, a milter implementation of DMARC, is prone to a signature-bypass vulnerability with multiple From: addresses. For the oldstable distribution (stretch), this problem has been fixed

 
  Fedora 29: dcmtk FEDORA-2019-4349fc0afb (Sep 26)
 

Security fix for CVE-2019-1010228

  Fedora 30: dcmtk FEDORA-2019-12650a34d8 (Sep 26)
 

Security fix for CVE-2019-1010228

  Fedora 31: cobbler FEDORA-2019-502f1a2c67 (Sep 25)
 

Update to current release. Python3 compatible Installable with f31+ ---- Update to 2.5.0 (pre-release)

  Fedora 29: SDL2_image FEDORA-2019-a6bc0fb143 (Sep 24)
 

Update to SDL2_Image 2.0.5 for multiple CVEs.

  Fedora 29: java-1.8.0-openjdk-aarch32 FEDORA-2019-5c794ec7ba (Sep 24)
 

8u222 update

  Fedora 30: ghostscript FEDORA-2019-953fc0f16d (Sep 24)
 

- rebase to latest upstream version 9.27 - security fixes added for: - CVE-2019-14811 (bug #1747908) - CVE-2019-14812 (bug #1747907) - CVE-2019-14813 (bug #1747906) - CVE-2019-14817 (bug #1747909)

  Fedora 30: java-1.8.0-openjdk-aarch32 FEDORA-2019-a5ec38072a (Sep 24)
 

8u222 update

  Fedora 30: expat FEDORA-2019-9505c6b555 (Sep 24)
 

This update of `expat` fixes the following security issue: * **CVE-2019-15903** -- Fix heap overflow triggered by `XML_GetCurrentLineNumber` (or `XML_GetCurrentColumnNumber`), and deny internal entities closing the doctype The following bug fixes are also included: * Fix cases where `XML_StopParser` did not have any effect when called from inside of an end element handler *

  Fedora 30: ibus FEDORA-2019-b577187ba8 (Sep 24)
 

Security fix for CVE-2019-14822

  Fedora 30: compat-openssl10 FEDORA-2019-00c25b9379 (Sep 24)
 

Patch for CVE-2018-0737, CVE-2018-0732, CVE-2018-0734, CVE-2019-1552, CVE-2019-1559. https://www.openssl.org/news/vulnerabilities.html

  Fedora 31: java-1.8.0-openjdk-aarch32 FEDORA-2019-0bb3cfd816 (Sep 24)
 

8u222 update

  Fedora 30: kernel-headers FEDORA-2019-15e141c6a7 (Sep 23)
 

The 5.2.16 stable kernel updates contain a number of important fixes across the tree.

  Fedora 30: kernel FEDORA-2019-15e141c6a7 (Sep 23)
 

The 5.2.16 stable kernel updates contain a number of important fixes across the tree.

  Fedora 30: blis FEDORA-2019-5fec758a3f (Sep 23)
 

Don't call popen on ARM (in case it's run with privileges). Also replace patch to use FMA with simd pragma.

  Fedora 29: jackson-bom FEDORA-2019-fb23eccc03 (Sep 21)
 

- Update jackson-databind to version 2.9.9.3. - Update jackson-core to version 2.9.9. - Update jackson-annotations to version 2.9.9. - Update jackson-bom to version 2.9.9. Resolves CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, and CVE-14439.

  Fedora 29: jackson-core FEDORA-2019-fb23eccc03 (Sep 21)
 

- Update jackson-databind to version 2.9.9.3. - Update jackson-core to version 2.9.9. - Update jackson-annotations to version 2.9.9. - Update jackson-bom to version 2.9.9. Resolves CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, and CVE-14439.

  Fedora 29: jackson-databind FEDORA-2019-fb23eccc03 (Sep 21)
 

- Update jackson-databind to version 2.9.9.3. - Update jackson-core to version 2.9.9. - Update jackson-annotations to version 2.9.9. - Update jackson-bom to version 2.9.9. Resolves CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, and CVE-14439.

  Fedora 29: jackson-annotations FEDORA-2019-fb23eccc03 (Sep 21)
 

- Update jackson-databind to version 2.9.9.3. - Update jackson-core to version 2.9.9. - Update jackson-annotations to version 2.9.9. - Update jackson-bom to version 2.9.9. Resolves CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, and CVE-14439.

  Fedora 30: ImageMagick FEDORA-2019-612d4f64dd (Sep 21)
 

Bug fixes and security fixes. Better threading compile time option set. See: https://src.fedoraproject.org/rpms/ImageMagick/pull-request/2 Additional formats enabled.

  Fedora 30: rubygem-rmagick FEDORA-2019-612d4f64dd (Sep 21)
 

Bug fixes and security fixes. Better threading compile time option set. See: https://src.fedoraproject.org/rpms/ImageMagick/pull-request/2 Additional formats enabled.

  Fedora 30: jackson-annotations FEDORA-2019-ae6a703b8f (Sep 21)
 

- Update jackson-databind to version 2.9.9.3. - Update jackson-core to version 2.9.9. - Update jackson-annotations to version 2.9.9. - Update jackson-bom to version 2.9.9. Resolves CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, and CVE-14439.

  Fedora 30: jackson-core FEDORA-2019-ae6a703b8f (Sep 21)
 

- Update jackson-databind to version 2.9.9.3. - Update jackson-core to version 2.9.9. - Update jackson-annotations to version 2.9.9. - Update jackson-bom to version 2.9.9. Resolves CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, and CVE-14439.

  Fedora 30: jackson-bom FEDORA-2019-ae6a703b8f (Sep 21)
 

- Update jackson-databind to version 2.9.9.3. - Update jackson-core to version 2.9.9. - Update jackson-annotations to version 2.9.9. - Update jackson-bom to version 2.9.9. Resolves CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, and CVE-14439.

  Fedora 30: jackson-databind FEDORA-2019-ae6a703b8f (Sep 21)
 

- Update jackson-databind to version 2.9.9.3. - Update jackson-core to version 2.9.9. - Update jackson-annotations to version 2.9.9. - Update jackson-bom to version 2.9.9. Resolves CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, and CVE-14439.

  Fedora 31: ghostscript FEDORA-2019-0a9d525d71 (Sep 21)
 

- rebase to latest upstream version 9.27 - security fixes added for: - CVE-2019-14811 (bug #1747908) - CVE-2019-14812 (bug #1747907) - CVE-2019-14813 (bug #1747906) - CVE-2019-14817 (bug #1747909)

  Fedora 31: rubygem-rmagick FEDORA-2019-27b9b94805 (Sep 21)
 

Bug fixes and security fixes. Better threading compile time option set. See: https://src.fedoraproject.org/rpms/ImageMagick/pull-request/2 Additional formats enabled.

  Fedora 31: ImageMagick FEDORA-2019-27b9b94805 (Sep 21)
 

Bug fixes and security fixes. Better threading compile time option set. See: https://src.fedoraproject.org/rpms/ImageMagick/pull-request/2 Additional formats enabled.

  Fedora 31: firefox FEDORA-2019-7f7bace5b4 (Sep 20)
 

- Updated to new upstream (69.0.1) - Wayland rendering fixes ---- - The update to 69.0.1 - Fix flickering issues - Fix disappearing webrtc dialogs ---- - Fixed rendering artifacts on Wayland backend

  Fedora 31: libldb FEDORA-2019-41c7fa478a (Sep 20)
 

Update to Samba 4.11.0 ---- Update to Samba 4.11.0rc4 ---- Update to Samba 4.11.0rc3 - Security fixes for CVE-2019-10197

  Fedora 31: samba FEDORA-2019-41c7fa478a (Sep 20)
 

Update to Samba 4.11.0 ---- Update to Samba 4.11.0rc4 ---- Update to Samba 4.11.0rc3 - Security fixes for CVE-2019-10197

  Fedora 31: libtalloc FEDORA-2019-41c7fa478a (Sep 20)
 

Update to Samba 4.11.0 ---- Update to Samba 4.11.0rc4 ---- Update to Samba 4.11.0rc3 - Security fixes for CVE-2019-10197

  Fedora 31: libtevent FEDORA-2019-41c7fa478a (Sep 20)
 

Update to Samba 4.11.0 ---- Update to Samba 4.11.0rc4 ---- Update to Samba 4.11.0rc3 - Security fixes for CVE-2019-10197

  Fedora 31: openssl FEDORA-2019-9ab7ee6309 (Sep 20)
 

Minor update release 1.1.1d with low impact security fixes.

  Fedora 31: expat FEDORA-2019-613edfe68b (Sep 20)
 

This update of `expat` fixes the following security issue: * **CVE-2019-15903** -- Fix heap overflow triggered by `XML_GetCurrentLineNumber` (or `XML_GetCurrentColumnNumber`), and deny internal entities closing the doctype The following bug fixes are also included: * Fix cases where `XML_StopParser` did not have any effect when called from inside of an end element handler *

  Fedora 31: curl FEDORA-2019-6d7f6fa2c8 (Sep 20)
 

- double free due to subsequent call of realloc() (CVE-2019-5481) - fix heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482) ---- - avoid reporting spurious error in the HTTP2 framing layer (#1690971)

  Fedora 31: compat-openssl10 FEDORA-2019-db06efdea1 (Sep 20)
 

Patch for CVE-2018-0737, CVE-2018-0732, CVE-2018-0734, CVE-2019-1552, CVE-2019-1559. https://www.openssl.org/news/vulnerabilities.html

  Fedora 29: dino FEDORA-2019-0eb6d51f81 (Sep 19)
 

Update dino to [a96c8014](https://github.com/dino/dino/compare/016ab2c1...a96c8014), which addresses three CVEs. CVE-2019-16235 check the source of message carbons. https://nvd.nist.gov/vuln/detail/CVE-2019-16235 Fixed in

  Fedora 29: openconnect FEDORA-2019-4c0d6e1784 (Sep 19)
 

Update to 8.05 release (CVE-2019-16239)

  Fedora 29: bird FEDORA-2019-b629e3b97f (Sep 19)
 

BIRD 1.6.8 (2019-09-10)

  Fedora 30: nbdkit FEDORA-2019-867f0858e6 (Sep 19)
 

New upstream version 1.12.7. Fixes Denial of Service / Amplication Attack: https://www.redhat.com/archives/libguestfs/2019-September/msg00084.html

  Fedora 30: dino FEDORA-2019-3d3bb765ca (Sep 19)
 

Update dino to [a96c8014](https://github.com/dino/dino/compare/016ab2c1...a96c8014), which addresses three CVEs. CVE-2019-16235 check the source of message carbons. https://nvd.nist.gov/vuln/detail/CVE-2019-16235 Fixed in

  Fedora 30: openconnect FEDORA-2019-1caffa01f2 (Sep 19)
 

Update to 8.05 release (CVE-2019-16239)

  Fedora 30: bird FEDORA-2019-ace80f492e (Sep 19)
 

BIRD 2.0.6 (2019-09-10) * BGP: Optional Adj-RIB-Out * BGP: Extended optional parameters length * Filter: Sets and set expressions in path masks * Several important bugfixes

 
  RedHat: RHSA-2019-2924:01 Important: redhat-virtualization-host security (Sep 27)
 

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2019-2860:01 Important: OpenShift Container Platform 4.1.18 (Sep 26)
 

An update for kibana is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2859:01 Moderate: OpenShift Container Platform 4.1.18 (Sep 26)
 

An update for golang-github-openshift-oauth-proxy-container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-2858:01 Important: OpenShift Container Platform 4.1.18 (Sep 26)
 

An update for logging-elasticsearch5-container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2861:01 Important: OpenShift Container Platform 4.1.18 (Sep 26)
 

An update for gRPC, included in sriov-network-device-plugin-container, is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2900:01 Important: kernel security and bug fix update (Sep 25)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.

  RedHat: RHSA-2019-2899:01 Important: kernel security and bug fix update (Sep 25)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.

  RedHat: RHSA-2019-2901:01 Important: kernel security update (Sep 25)
 

An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2825:01 Moderate: OpenShift Container Platform 4.1.17 (Sep 25)
 

An update for cri-o is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-2896:01 Low: Red Hat Enterprise Linux 7.4 Extended Update (Sep 24)
 

This is the final notification for the retirement of Red Hat Enterprise Linux 7.4 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.4.

  RedHat: RHSA-2019-2893:01 Important: httpd:2.4 security update (Sep 24)
 

An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2892:01 Important: qemu-kvm security update (Sep 24)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2889:01 Important: redhat-virtualization-host security (Sep 24)
 

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2019-2817:01 Moderate: OpenShift Container Platform 3.11 (Sep 23)
 

An update for cri-o is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2019-2885:01 Important: dovecot security update (Sep 23)
 

An update for dovecot is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2818:01 Important: OpenShift Container Platform 3.11 (Sep 23)
 

An update for openshift-ansible is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2867:01 Important: kernel security update (Sep 23)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.

  RedHat: RHSA-2019-2869:01 Important: kernel security and bug fix update (Sep 23)
 

An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2868:01 Important: dbus security update (Sep 23)
 

An update for dbus is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2870:01 Important: dbus security update (Sep 23)
 

An update for dbus is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2864:01 Important: kernel security update (Sep 23)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2866:01 Important: kernel security update (Sep 23)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2865:01 Important: kpatch-patch security update (Sep 23)
 

An update for kpatch-patch is now available for RHEL-7.6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2863:01 Important: kernel security update (Sep 23)
 

An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2862:01 Important: kernel-alt security update (Sep 23)
 

An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2854:01 Important: kpatch-patch security update (Sep 21)
 

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2809:01 Important: kernel-alt security, bug fix, (Sep 20)
 

An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2781:01 Important: qpid-proton security update (Sep 20)
 

An update for qpid-proton is now available for Satellite Tools 6.3. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2782:01 Important: qpid-proton security update (Sep 20)
 

An update for qpid-proton is now available for Satellite Tools 6.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2837:01 Important: kernel security and bug fix update (Sep 20)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2789:01 Important: OpenShift Container Platform 4.1.16 (Sep 20)
 

An update for jenkins is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2836:01 Important: dovecot security update (Sep 20)
 

An update for dovecot is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2829:01 Important: kernel security update (Sep 20)
 

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2830:01 Important: kernel-rt security update (Sep 20)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2827:01 Important: kernel security update (Sep 20)
 

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2828:01 Important: kernel-rt security update (Sep 20)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2822:01 Important: dovecot security update (Sep 19)
 

An update for dovecot is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2799:01 Important: nginx:1.14 security update (Sep 19)
 

An update for the nginx:1.14 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2807:01 Important: thunderbird security update (Sep 19)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2019-2805:01 Important: systemd security update (Sep 19)
 

An update for systemd is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.

  RedHat: RHSA-2019-2806:01 Important: ruby security update (Sep 19)
 

An update for ruby is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.

  RedHat: RHSA-2019-2808:01 Important: kernel security update (Sep 19)
 

An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2019-2798:01 Important: patch security update (Sep 19)
 

An update for patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

 
  Slackware: 2019-268-01: mozilla-thunderbird Security Update (Sep 25)
 

New mozilla-thunderbird packages are available for Slackware 14.2 and -current to fix security issues.

 
  SUSE: 2019:2473-1 moderate: nghttp2 (Sep 26)
 

An update that solves two vulnerabilities and has three fixes is now available.

  SUSE: 2019:2475-1 moderate: u-boot (Sep 26)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:2474-1 moderate: u-boot (Sep 26)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:2462-1 moderate: python-numpy (Sep 25)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2461-1 moderate: mariadb (Sep 25)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2019:2453-1 moderate: python-Twisted (Sep 24)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2454-1 important: dovecot22 (Sep 24)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2452-1 moderate: djvulibre (Sep 24)
 

An update that fixes four vulnerabilities is now available.

  SUSE: 2019:14179-1 libxml2 (Sep 24)
 

An update that contains security fixes can now be installed.

  SUSE: 2019:2444-1 moderate: djvulibre (Sep 24)
 

An update that fixes four vulnerabilities is now available.

  SUSE: 2019:2439-1 moderate: rust (Sep 23)
 

An update that solves two vulnerabilities and has two fixes is now available.

  SUSE: 2019:2440-1 moderate: expat (Sep 23)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2436-1 important: MozillaFirefox (Sep 23)
 

An update that solves 8 vulnerabilities and has one errata is now available.

  SUSE: 2019:2428-1 important: webkit2gtk3 (Sep 23)
 

An update that fixes 24 vulnerabilities is now available.

  SUSE: 2019:2429-1 moderate: expat (Sep 23)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2426-1 important: nmap (Sep 20)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2427-1 important: ibus (Sep 20)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:2425-1 important: nmap (Sep 20)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:2253-2 important: python-SQLAlchemy (Sep 19)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2019:2365-2 moderate: python-Werkzeug (Sep 19)
 

An update that fixes one vulnerability is now available.

  SUSE: 2019:14174-1 moderate: openssl (Sep 19)
 

An update that fixes two vulnerabilities is now available.

 
  Ubuntu 4140-1: Firefox vulnerability (Sep 25)
 

Firefox could be made to hijack the mouse pointer it if opened a malicious website.

  Ubuntu 4139-1: File Roller vulnerability (Sep 25)
 

File Roller could be made to overwrite sensitive files if it received a specially crafted TAR file.

  Ubuntu 4138-1: LibreOffice vulnerability (Sep 24)
 

LibreOffice could be made to run programs as your login if it opened a specially crafted file.

  Ubuntu 4137-1: Mosquitto vulnerability (Sep 23)
 

Mosquitto could be made to crash or run programs if it received specially crafted network traffic.

  Ubuntu 4134-2: IBus regression (Sep 23)
 

USN 4134-1 introduced a regression in IBus.

  Ubuntu 0056-1: Linux kernel vulnerability (Sep 20)
 

Several security issues were fixed in the kernel.

 
  Debian LTS: DLA-1933-1: ruby-nokogiri security update (Sep 26)
 

A command injection vulnerability in Nokogiri allows commands to be executed in a subprocess by Ruby's `Kernel.open` method. For Debian 8 "Jessie", this problem has been fixed in version

  Debian LTS: DLA-1932-1: openssl security update (Sep 25)
 

Two security vulnerabilities were found in OpenSSL, the Secure Sockets Layer toolkit. CVE-2019-1547

  Debian LTS: DLA-1930-1: linux security update (Sep 25)
 

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

  Debian LTS: DLA-1931-1: libgcrypt20 security update (Sep 24)
 

It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. For Debian 8 "Jessie", this issue has been fixed in libgcrypt20 version

  Debian LTS: DLA-1928-1: php5 security update (Sep 24)
 

An update has been made to php5, a server-side, HTML-embedded scripting language. Specficially, as reported in #805222, the ability to build extensions in certain older versions of PHP within Debian has been

  Debian LTS: DLA-1929-1: php-pecl-http security update (Sep 20)
 

A vulnerability has been discovered in php-pecl-http, the pecl_http module for PHP 5 Extended HTTP Support. A type confusion vulnerability in the merge_param() function allows attackers to crash PHP and possibly

  Debian LTS: DLA-1927-1: qemu security update (Sep 20)
 

Several vulnerabilities were found in QEMU, a fast processor emulator (notably used in KVM and Xen HVM virtualization).

 
  CentOS: CESA-2019-2836: Important CentOS 7 dovecot (Sep 26)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2019:2836

 
  SciLinux: SLSA-2019-2892-1 Important: qemu-kvm on SL6.x i386/x86_64 (Sep 24)
 

QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams (CVE-2018-11806) * QEMU: slirp: heap buffer overflow in tcp_emu() (CVE-2019-6778) * QEMU: ne2000: integer overflow leads to buffer overflow issue (CVE-2018-10839) * QEMU: pcnet: integer overflow leads to buffer overflow (CVE-2018-17962) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-1 [More...]

  SciLinux: SLSA-2019-2885-1 Important: dovecot on SL6.x i386/x86_64 (Sep 23)
   
  SciLinux: SLSA-2019-2863-1 Important: kernel on SL6.x i386/x86_64 (Sep 23)
 

A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. (CVE-2019-14835) SL6 x86_64 kernel-2.6.32-754.23 [More...]

  SciLinux: SLSA-2019-2836-1 Important: dovecot on SL7.x x86_64 (Sep 20)
 

dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes (CVE-2019-11500) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. SL7 x86_64 dovecot-2.2.36-3.el7_7.1.i686.rpm [More...]

  SciLinux: SLSA-2019-2829-1 Important: kernel on SL7.x x86_64 (Sep 20)
 

A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. (CVE-2019-14835) SL7 x86 [More...]

  SciLinux: SLSA-2019-2807-1 Important: thunderbird on SL6.x i386/x86_64 (Sep 19)
 

This update upgrades Thunderbird to version 60.9.0. * Mozilla: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message (CVE-2019-11739) * Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740) * Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742) * Mo [More...]

 
  openSUSE: 2019:2203-1: moderate: rust (Sep 27)
 

An update that solves two vulnerabilities and has two fixes is now available.

  openSUSE: 2019:2200-1: important: nmap (Sep 26)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2019:2199-1: important: ibus (Sep 26)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2198-1: important: nmap (Sep 26)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2019:2189-1: moderate: openssl-1_1 (Sep 25)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2019:2188-1: moderate: fish3 (Sep 25)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2019:2186-1: important: chromium (Sep 25)
 

An update that fixes four vulnerabilities is now available.

  openSUSE: 2019:2184-1: moderate: varnish (Sep 25)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2185-1: moderate: links (Sep 25)
 

An update that contains security fixes can now be installed.

  openSUSE: 2019:2183-1: moderate: libreoffice (Sep 25)
 

An update that solves 7 vulnerabilities and has one errata is now available.

  openSUSE: 2019:2180-1: moderate: bird (Sep 24)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2173-1: important: the Linux Kernel (Sep 24)
 

An update that solves 38 vulnerabilities and has 159 fixes is now available.

  openSUSE: 2019:2178-1: moderate: bird (Sep 24)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2160-1: moderate: ghostscript (Sep 24)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2159-1: important: skopeo (Sep 24)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2161-1: moderate: libgcrypt (Sep 24)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2177-1: moderate: fish3 (Sep 24)
 

An update that fixes 5 vulnerabilities is now available.

  openSUSE: 2019:2176-1: moderate: openldap2 (Sep 24)
 

An update that solves three vulnerabilities and has two fixes is now available.

  openSUSE: 2019:2175-1: moderate: util-linux and shadow (Sep 24)
 

An update that contains security fixes can now be installed.

  openSUSE: 2019:2174-1: important: ibus (Sep 24)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2019:2169-1: important: curl (Sep 24)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2019:2158-1: moderate: openssl-1_1 (Sep 24)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2019:2157-1: moderate: openldap2 (Sep 23)
 

An update that solves three vulnerabilities and has two fixes is now available.

  openSUSE: 2019:2156-1: important: chromium (Sep 20)
 

An update that fixes 35 vulnerabilities is now available.

  openSUSE: 2019:2155-1: important: chromium (Sep 20)
 

An update that fixes 35 vulnerabilities is now available.

  openSUSE: 2019:2152-1: important: chromium (Sep 19)
 

An update that fixes 35 vulnerabilities is now available.

  openSUSE: 2019:2153-1: important: chromium (Sep 19)
 

An update that fixes 35 vulnerabilities is now available.

 
  Mageia 2019-0288: kernel security update (Sep 21)
 

This kernel update is based on the upstream 5.2.16 and fixes atleast the following security issues: There is heap-based buffer overflow in the marvell wifi chip driver that allows local users to cause a denial of service(system crash) or possibly

  Mageia 2019-0287: kernel security update (Sep 21)
 

This kernel update is based on the upstream 4.14.145 and fixes atleast the following security issues: There is heap-based buffer overflow in the marvell wifi chip driver that allows local users to cause a denial of service(system crash) or possibly

  Mageia 2019-0286: samba security update (Sep 21)
 

Updated samba packages fix security vulnerabilities: A combination of parameters and permissions in smb.conf can allow user to escape from the share path definition (CVE-2019-10197).

  Mageia 2019-0285: thunderbird security update (Sep 21)
 

The updated thunderbird packages fix security issues: Covert Content Attack on S/MIME encryption using a crafted multipart/ alternative message. (CVE-2019-11739)

  Mageia 2019-0284: ibus security update (Sep 21)
 

It was discovered that any unprivileged user could monitor and send method calls to the ibus bus of another user, due to a misconfiguration during the setup of the DBus server. When ibus is in use, a local attacker, who discovers the UNIX socket used by another user connected on a graphical environment, could use this flaw to intercept all keystrokes of the victim user or modify

  Mageia 2019-0283: chromium-browser-stable security update (Sep 21)
 

Multiple flaws were found in the way Chromium 73.0.3683.103 processes various types of web content, where loading a web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information. (CVE-2019-5805, CVE-2019-5806, CVE-2019-5807, CVE-2019-5808, CVE-2019-5809, CVE-2019-5810,