Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.
|
Debian: DSA-4590-1: cyrus-imapd security update (Dec 19) |
|
It was discovered that the lmtpd component of the Cyrus IMAP server created mailboxes with administrator privileges if the "fileinto" was used, bypassing ACL checks.
|
|
Debian: DSA-4589-1: debian-edu-config security update (Dec 18) |
|
It was discovered that debian-edu-config, a set of configuration files used for the Debian Edu blend, configured too permissive ACLs for the Kerberos admin server, which allowed password changes for other user principals.
|
|
Debian: DSA-4588-1: python-ecdsa security update (Dec 17) |
|
It was discovered that python-ecdsa, a cryptographic signature library for Python, incorrectly handled certain signatures. A remote attacker could use this issue to cause python-ecdsa to either not warn about incorrect signatures, or generate exceptions resulting in a
|
|
Debian: DSA-4587-1: ruby2.3 security update (Dec 17) |
|
Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code.
|
|
Debian: DSA-4586-1: ruby2.5 security update (Dec 17) |
|
Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code.
|
|
Debian: DSA-4585-1: thunderbird security update (Dec 15) |
|
Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code. For the oldstable distribution (stretch), these problems have been fixed
|
|
Debian: DSA-4584-1: spamassassin security update (Dec 14) |
|
Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. CVE-2018-11805
|
|
Debian: DSA-4565-2: intel-microcode security update (Dec 13) |
|
This update ships updated CPU microcode for CFL-S (Coffe Lake Desktop) models of Intel CPUs which were not yet included in the Intel microcode update released as DSA 4565-1. For details please refer to https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/IPU-2019.2-microcode-update-guidance-v1.01.pdf
|
|
Debian: DSA-4583-1: spip security update (Dec 13) |
|
A vulnerability was discovered in the SPIP publishing system, which could result in unauthorised writes to the database by authors. The oldstable distribution (stretch) is not affected.
|
|
Debian: DSA-4582-1: davical security update (Dec 13) |
|
Multiple cross-site scripting and cross-site request forgery issues were discovered in the DAViCal CalDAV Server. For the oldstable distribution (stretch), these problems have been fixed
|
|
|
|
Fedora 30: cacti-spine FEDORA-2019-6bf27b45b3 (Dec 19) |
|
- Update to 1.2.8 Release notes:
|
|
Fedora 30: cacti FEDORA-2019-6bf27b45b3 (Dec 19) |
|
- Update to 1.2.8 Release notes:
|
|
Fedora 30: fribidi FEDORA-2019-533a72fec5 (Dec 19) |
|
Security fix for CVE-2019-18397
|
|
Fedora 31: python-django FEDORA-2019-adc8990386 (Dec 18) |
|
bugfix release for CVE-2019-19118
|
|
Fedora 30: openslp FEDORA-2019-86bceb61b3 (Dec 18) |
|
Security fix for CVE-2019-5544
|
|
Fedora 31: chromium FEDORA-2019-1a10c04281 (Dec 17) |
|
Update to Chromium 79. Fixes the usual giant pile of bugs and security issues. This time, the list is: CVE-2019-13725 CVE-2019-13726 CVE-2019-13727 CVE-2019-13728 CVE-2019-13729 CVE-2019-13730 CVE-2019-13732 CVE-2019-13734 CVE-2019-13735 CVE-2019-13764 CVE-2019-13736 CVE-2019-13737 CVE-2019-13738 CVE-2019-13739 CVE-2019-13740 CVE-2019-13741 CVE-2019-13742 CVE-2019-13743
|
|
Fedora 31: libssh FEDORA-2019-8b0ad69829 (Dec 17) |
|
Update to version 0.9.3 to address CVE-2019-14889
|
|
Fedora 31: fribidi FEDORA-2019-7075bc4ff8 (Dec 17) |
|
Security fix for CVE-2019-18397
|
|
Fedora 31: openslp FEDORA-2019-1e5ae33e87 (Dec 17) |
|
Security fix for CVE-2019-5544
|
|
Fedora 31: kernel FEDORA-2019-39e97683e8 (Dec 16) |
|
The 5.3.16 update contains a number of important fixes across the tree
|
|
Fedora 31: libgit2 FEDORA-2019-9c3d054f39 (Dec 16) |
|
This is a security release fixing the following issues: * CVE-2019-1348: the fast-import stream command "feature export-marks=path" allows writing to arbitrary file paths. As libgit2 does not offer any interface for fast-import, it is not susceptible to this vulnerability. * CVE-2019-1349: by using NTFS 8.3 short names, backslashes or alternate filesystreams, it is possible to cause
|
|
Fedora 30: knot-resolver FEDORA-2019-44ccfa9b29 (Dec 12) |
|
- update to upstream version 4.3.0 - fixes CVE-2019-19331 - root.keys is moved to /var/lib/knot-resolver - knot-resolver no longer requires write permission to /etc/knot-resolver/
|
|
Fedora 30: xen FEDORA-2019-3d7105bd2a (Dec 12) |
|
Device quarantine for alternate pci assignment methods [XSA-306]
|
|
Fedora 31: knot-resolver FEDORA-2019-866dc03603 (Dec 12) |
|
- update to upstream version 4.3.0 - fixes CVE-2019-19331 - root.keys is moved to /var/lib/knot-resolver - knot-resolver no longer requires write permission to /etc/knot-resolver/
|
|
|
|
RedHat: RHSA-2019-4237:01 Moderate: OpenShift Container Platform 4.1.28 (Dec 19) |
|
An update for the openshift-enterprise-builder container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4358:01 Important: openstack-keystone security update (Dec 19) |
|
An update for openstack-keystone is now available for Red Hat OpenStack Platform 15 (Stein). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
|
|
RedHat: RHSA-2019-4356:01 Important: git security update (Dec 19) |
|
An update for git is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability
|
|
RedHat: RHSA-2019-4357:01 Moderate: Red Hat Ceph Storage security update (Dec 19) |
|
An update is now available for Red Hat Ceph Storage 3.3 that runs on Ubuntu 16.04. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4353:01 Moderate: Red Hat Ceph Storage security, bug fix, (Dec 19) |
|
An update is now available for Red Hat Ceph Storage 3.3 that runs on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4326:01 Important: fribidi security update (Dec 19) |
|
An update for fribidi is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability
|
|
RedHat: RHSA-2019-4341:01 Moderate: Red Hat Quay v3.2.0 security and bug (Dec 19) |
|
An update is now available for Red Hat Quay 3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
|
|
RedHat: RHSA-2019-4352:01 Important: Red Hat JBoss Fuse/A-MQ 6.3 R14 (Dec 19) |
|
An update is now available for Red Hat JBoss Fuse 6.3 and Red Hat JBoss A-MQ 6.3. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
|
|
RedHat: RHSA-2019-4317:01 Important: rh-maven35-apache-commons-beanutils (Dec 18) |
|
An update for rh-maven35-apache-commons-beanutils is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
|
|
RedHat: RHSA-2019-4256:01 Important: kernel security and bug fix update (Dec 17) |
|
An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability
|
|
RedHat: RHSA-2019-4254:01 Moderate: freetype security update (Dec 17) |
|
An update for freetype is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
|
|
RedHat: RHSA-2019-4273:01 Important: container-tools:1.0 security update (Dec 17) |
|
An update for the container-tools:1.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
|
|
RedHat: RHSA-2019-4269:01 Important: container-tools:rhel8 security and bug (Dec 17) |
|
An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
|
|
RedHat: RHSA-2019-4255:01 Important: kernel security update (Dec 17) |
|
An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
|
|
RedHat: RHSA-2019-4090:01 Moderate: OpenShift Container Platform 4.1 (Dec 17) |
|
An update for openshift-enterprise-cli-container, openshift-enterprise-hyperkube-container, openshift-enterprise-hypershift-container, openshift-enterprise-node-container, and ose-cli-artifacts-container is now
|
|
RedHat: RHSA-2019-4091:01 Moderate: OpenShift Container Platform 4.1 (Dec 17) |
|
An update for ose-cluster-kube-controller-manager-operator-container and ose-cluster-kube-scheduler-operator-container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact
|
|
RedHat: RHSA-2019-4088:01 Moderate: OpenShift Container Platform 4.1 (Dec 17) |
|
An update for ose-cluster-openshift-apiserver-operator-container is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4245:01 Important: kpatch-patch security update (Dec 17) |
|
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability
|
|
RedHat: RHSA-2019-4225:01 Moderate: OpenShift Container Platform 4.1 (Dec 16) |
|
An update for openshift-external-storage is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4089:01 Important: OpenShift Container Platform 4.1 (Dec 16) |
|
An update for jenkins-2-plugins is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
|
|
RedHat: RHSA-2019-4087:01 Moderate: OpenShift Container Platform 4.1 (Dec 16) |
|
An update for openshift is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4243:01 Important: Red Hat Ansible Tower 3.6.2-1 - RHEL7 (Dec 16) |
|
Red Hat Ansible Tower 3.6.2-1 - RHEL7 Container 2. Description: * Added a command to generate a new SECRET_KEY and rekey the database * Removed the guest user from the optionally-configured RabbitMQ admin
|
|
RedHat: RHSA-2019-4242:01 Important: Red Hat Ansible Tower 3.5.4-1 - RHEL7 (Dec 16) |
|
Red Hat Ansible Tower 3.5.4-1 - RHEL7 Container 2. Description: * Added a command to generate a new SECRET_KEY and rekey the database * Removed the guest user from the optionally-configured RabbitMQ admin
|
|
RedHat: RHSA-2019-4053:01 Moderate: OpenShift Container Platform 3.11 (Dec 16) |
|
An update for openshift-enterprise-console-container is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4054:01 Moderate: OpenShift Container Platform 3.11 (Dec 16) |
|
An update for openshift-external-storage is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4055:01 Important: OpenShift Container Platform 3.11 (Dec 16) |
|
An update for jenkins-2-plugins is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
|
|
RedHat: RHSA-2019-4052:01 Moderate: OpenShift Container Platform 3.11 (Dec 16) |
|
An update for atomic-openshift is now available for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4240:01 Critical: openslp security update (Dec 16) |
|
An update for openslp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
|
|
RedHat: RHSA-2019-4238:01 Critical: chromium-browser security update (Dec 16) |
|
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
|
|
RedHat: RHSA-2019-4201:01 Moderate: CloudForms 5.0.1 security, (Dec 12) |
|
An update is now available for CloudForms Management Engine 5.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
|
|
|
|
Slackware: 2019-353-01: wavpack Security Update (Dec 19) |
|
New wavpack packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
|
|
|
|
SUSE: 2019:3369-1 moderate: mariadb (Dec 20) |
|
An update that fixes 7 vulnerabilities is now available.
|
|
SUSE: 2019:3371-1 important: the Linux Kernel (Dec 20) |
|
An update that solves 24 vulnerabilities and has 58 fixes is now available.
|
|
SUSE: 2019:3371-1 important: the Linux Kernel (Dec 20) |
|
An update that solves 24 vulnerabilities and has 58 fixes is now available.
|
|
SUSE: 2019:3349-1 moderate: trousers (Dec 19) |
|
An update that fixes one vulnerability is now available.
|
|
SUSE: 2019:3347-1 important: MozillaFirefox (Dec 19) |
|
An update that fixes 8 vulnerabilities is now available.
|
|
SUSE: 2019:3348-1 moderate: spectre-meltdown-checker (Dec 19) |
|
An update that fixes two vulnerabilities is now available.
|
|
SUSE: 2019:3340-1 moderate: spectre-meltdown-checker (Dec 19) |
|
An update that fixes two vulnerabilities is now available.
|
|
SUSE: 2019:3341-1 moderate: zziplib (Dec 19) |
|
An update that solves two vulnerabilities and has one errata is now available.
|
|
SUSE: 2019:3337-1 important: MozillaFirefox (Dec 18) |
|
An update that fixes 8 vulnerabilities is now available.
|
|
SUSE: 2019:3338-1 important: xen (Dec 18) |
|
An update that solves 7 vulnerabilities and has two fixes is now available.
|
|
SUSE: 2019:3339-1 important: MozillaThunderbird (Dec 18) |
|
An update that fixes 8 vulnerabilities is now available.
|
|
SUSE: 2019:3318-1 important: samba (Dec 17) |
|
An update that fixes two vulnerabilities is now available.
|
|
SUSE: 2019:3319-1 important: samba (Dec 17) |
|
An update that fixes two vulnerabilities is now available.
|
|
SUSE: 2019:3313-1 moderate: LibreOffice (Dec 16) |
|
An update that solves one vulnerability and has three fixes is now available.
|
|
SUSE: 2019:3308-1 important: libssh (Dec 16) |
|
An update that fixes one vulnerability is now available.
|
|
SUSE: 2019:3306-1 moderate: mariadb (Dec 16) |
|
An update that fixes 7 vulnerabilities is now available.
|
|
SUSE: 2019:3307-1 important: libssh (Dec 16) |
|
An update that fixes one vulnerability is now available.
|
|
SUSE: 2019:3309-1 important: xen (Dec 16) |
|
An update that fixes 9 vulnerabilities is now available.
|
|
SUSE: 2019:3310-1 important: xen (Dec 16) |
|
An update that fixes 10 vulnerabilities is now available.
|
|
SUSE: 2019:3311-1 important: git (Dec 16) |
|
An update that solves 9 vulnerabilities and has one errata is now available.
|
|
SUSE: 2019:3294-1 important: the Linux Kernel (Dec 13) |
|
An update that solves 16 vulnerabilities and has 124 fixes is now available.
|
|
SUSE: 2019:3296-1 important: xen (Dec 13) |
|
An update that fixes 6 vulnerabilities is now available.
|
|
SUSE: 2019:3293-1 important: libssh (Dec 13) |
|
An update that fixes one vulnerability is now available.
|
|
SUSE: 2019:3297-1 important: xen (Dec 13) |
|
An update that fixes 15 vulnerabilities is now available.
|
|
SUSE: 2019:3288-1 important: haproxy (Dec 12) |
|
An update that fixes one vulnerability is now available.
|
|
SUSE: 2019:14249-1 important: openssl (Dec 12) |
|
An update that fixes one vulnerability is now available.
|
|
|
|
Ubuntu 4224-1: Django vulnerability (Dec 18) |
|
Django accounts could be hijacked through password reset requests.
|
|
Ubuntu 4223-1: OpenJDK vulnerabilities (Dec 17) |
|
Several security issues were fixed in OpenJDK.
|
|
Ubuntu 4222-1: GraphicsMagick vulnerabilities (Dec 16) |
|
Several security issues were fixed in GraphicsMagick.
|
|
|
|
Debian LTS: DLA-2043-2: gdk-pixbuf regression update (Dec 20) |
|
While preparing a fix for CVE-2017-6314 an unknown symbol g_uint_checked_mul() was introduced.
|
|
Debian LTS: DLA-2043-1: gdk-pixbuf security update (Dec 19) |
|
Several issues in gdk-pixbuf, a library to handle pixbuf, have been found. CVE-2016-6352 fix for denial of service (out-of-bounds write and crash) via
|
|
Debian LTS: DLA-2042-1: python-django security update (Dec 18) |
|
It was discovered that there was a potential account hijack vulnerabilility in Django, the Python-based web development framework.
|
|
Debian LTS: DLA-2041-1: debian-edu-config security update (Dec 18) |
|
It was discovered that debian-edu-config, the package containing the configuration files and scripts for Debian Edu (Skolelinux), contained an insecure configuration for kadmin, the Kerberos administration server. The
|
|
Debian LTS: DLA-2040-1: harfbuzz security update (Dec 17) |
|
An issue has been found in harfbuzz, an OpenType text shaping engine. Due to a buffer over-read, remote attackers are able to cause a denial of
|
|
Debian LTS: DLA-2039-1: libvorbis security update (Dec 17) |
|
Two issues have been found in libvorbis, a decoder library for Vorbis General Audio Compression Codec.
|
|
Debian LTS: DLA-2038-1: libssh security update (Dec 17) |
|
It was found that libssh, a tiny C SSH library, does not sufficiently sanitize path parameters provided to the server, allowing an attacker with only SCP file access to execute arbitrary commands on the server.
|
|
Debian LTS: DLA-2037-1: spamassassin security update (Dec 16) |
|
Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. CVE-2018-11805
|
|
Debian LTS: DLA-2036-1: thunderbird security update (Dec 16) |
|
Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version
|
|
Debian LTS: DLA-2035-1: libpgf security update (Dec 15) |
|
An issue has been found in libpgf, a library to handle Progressive Graphics File (PGF).
|
|
Debian LTS: DLA-2034-1: davical security update (Dec 14) |
|
Multiple cross-site scripting and cross-site request forgery issues were discovered in the DAViCal CalDAV Server.
|
|
Debian LTS: DLA-2033-1: php-horde security update (Dec 13) |
|
A vulnerability has been found in php-horde, the Horde Application Framework, which may result in information disclosure via cross-site scripting.
|
|
|
|
ArchLinux: 201912-6: git: arbitrary code execution (Dec 18) |
|
The package git before version 2.24.1-1 is vulnerable to arbitrary code execution.
|
|
ArchLinux: 201912-5: libgit2: arbitrary code execution (Dec 18) |
|
The package libgit2 before version 1:0.28.4-1 is vulnerable to arbitrary code execution.
|
|
ArchLinux: 201912-4: shadow: privilege escalation (Dec 18) |
|
The package shadow before version 4.8-1 is vulnerable to privilege escalation.
|
|
|
|
SciLinux: SLSA-2019-4326-1 Important: fribidi on SL7.x x86_64 (Dec 19) |
|
fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib /fribidi-bidi.c leading to denial of service and possible code execution (CVE-2019-18397) SL7 x86_64 fribidi-debuginfo-1.0.2-1.el7_7.1.i686.rpm fribidi-debuginfo-1.0.2-1.el7_7.1.x86_64.rpm fribidi-1.0.2-1.el7_7.1.i686.rpm fribidi-1.0.2-1.el7_7.1.x86_64.rpm fribidi-devel-1.0.2-1.el7_7.1.i686.rpm [More...]
|
|
SciLinux: SLSA-2019-4256-1 Important: kernel on SL6.x i386/x86_64 (Dec 18) |
|
Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821) Bug Fix(es): * KEYS: prevent creating a different user's keyrings SL-6.10 * BUG: unable to handle kernel NULL pointer dereference at (null) * long I/O stalls with bnx2fc from not masking off scope bits of retry delay value SL6 x86_64 kernel-2.6.32-754.25.1.el6.x86_64.rpm kernel-debug-2.6.32-754.25.1.el6.x86_64. [More...]
|
|
SciLinux: SLSA-2019-4254-1 Moderate: freetype on SL6.x i386/x86_64 (Dec 18) |
|
freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to information disclosure (CVE-2015-9381) * freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read (CVE-2015-9382) SL6 x86_64 freetype-2.3.11-19.el6_10.i686.rpm freetype-2.3.11-19.el6_10.x86_64.rpm freet [More...]
|
|
SciLinux: SLSA-2019-4240-1 Critical: openslp on SL7.x x86_64 (Dec 16) |
|
openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution (CVE-2019-5544) SL7 x86_64 openslp-2.0.0-8.el7_7.i686.rpm openslp-2.0.0-8.el7_7.x86_64.rpm openslp-debuginfo-2.0.0-8.el7_7.i686.rpm openslp-debuginfo-2.0.0-8.el7_7.x86_64.rpm openslp-server-2.0.0-8.el7_7.x86_64.rpm openslp-devel-2.0.0-8.el7_7.i686.rpm opensl [More...]
|
|
|
|
openSUSE: 2019:2694-1: important: chromium (Dec 18) |
|
An update that fixes 37 vulnerabilities is now available.
|
|
openSUSE: 2019:2693-1: important: chromium (Dec 18) |
|
An update that fixes two vulnerabilities is now available.
|
|
openSUSE: 2019:2692-1: important: chromium (Dec 16) |
|
An update that fixes 37 vulnerabilities is now available.
|
|
openSUSE: 2019:2689-1: important: libssh (Dec 16) |
|
An update that fixes one vulnerability is now available.
|
|
openSUSE: 2019:2692-1: important: chromium (Dec 16) |
|
An update that fixes 37 vulnerabilities is now available.
|
|
openSUSE: 2019:2687-1: important: java-1_8_0-openjdk (Dec 15) |
|
An update that fixes 17 vulnerabilities is now available.
|
|
openSUSE: 2019:2685-1: moderate: postgresql (Dec 15) |
|
An update that contains security fixes can now be installed.
|
|
|
|
Mageia 2019-0403: htmldoc security update (Dec 19) |
|
Updated htmldoc packages fix security vulnerability: In HTMLDOC, there was a one-byte underflow in htmldoc/ps-pdf.cxx caused by a floating point math difference between GCC and Clang (CVE-2019-19630).
|
|
Mageia 2019-0402: libssh security update (Dec 19) |
|
Updated libssh packages fix security vulnerability: In an environment where a user is only allowed to copy files and not to execute applications, it would be possible to pass a location which contains commands to be executed in addition (CVE-2019-14889).
|
|
Mageia 2019-0401: freerdp security update (Dec 19) |
|
Updated freerdp packages fix security vulnerabilities: Multiple memory leaks in libfreerdp/codec/region.c (CVE-2019-17177). Memory leak in HuffmanTree_makeFromFrequencies (CVE-2019-17178).
|
|
Mageia 2019-0400: rsyslog security update (Dec 19) |
|
Updated rsyslog packages fix security vulnerabilities: Heap overflow in the parser for AIX log messages (CVE-2019-17041). Heap overflow in the parser for Cisco log messages (CVE-2019-17042).
|
|
Mageia 2019-0399: apache-commons-beanutils security update (Dec 19) |
|
Updated apache-commons-beanutils packages fix security vulnerability: In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We,
|
|
Mageia 2019-0398: fence-agents security update (Dec 19) |
|
pdated fence-agents package fixes security vulnerability: Denial of service via guest VM comments (CVE-2019-10153). References:
|
|
Mageia 2019-0397: samba security update (Dec 19) |
|
Updated samba packages fix security vulnerabilities: Malicious servers can cause Samba client code to return filenames containing path separators to calling code (CVE-2019-10218).
|
|
Mageia 2019-0396: flightcrew security update (Dec 19) |
|
The updated packages fix security vulnerabilities: An issue was discovered in FlightCrew v0.9.2 and earlier. A NULL pointer dereference occurs in GetRelativePathToNcx() or GetRelativePathsToXhtmlDocuments() when a NULL pointer is passed to
|
|
Mageia 2019-0395: sssd security update (Dec 19) |
|
The updated packages fix a security vulnerability: A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login
|
|
Mageia 2019-0394: pacemaker security update (Dec 19) |
|
The updated packages fix security vulnerabilities: A use-after-free flaw was found in pacemaker up to and including version 2.0.1 which could result in certain sensitive information to be leaked via the system logs. (CVE-2019-3885)
|
|
Mageia 2019-0393: git security update (Dec 15) |
|
The updated packages fix security vulnerabilities: The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it allows overwriting arbitrary paths. (CVE-2019-1348)
|
|
Mageia 2019-0392: dnsmasq security update (Dec 15) |
|
A vulnerability was found in dnsmsq through version 2.90, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation. (CVE-2019-14834)
|
|
Mageia 2019-0391: libgit2 security update (Dec 15) |
|
libgit2 has been updated to version 0.28.4 to fix several security issues: * A carefully constructed commit object with a very large number of parents may lead to potential out-of-bounds writes or potential denial of service.
|
|
Mageia 2019-0390: libvirt security update (Dec 15) |
|
Updated libvirt packages fix security vulnerabilities: An information leak which allowed to retrieve the guest hostname under readonly mode (CVE-2019-3886).
|
|
Mageia 2019-0389: libcroco security update (Dec 15) |
|
Updated libcroco packages fix security vulnerabilities: Heap overflow (input: check end of input before reading a byte) (CVE-2017-7960).
|
|
Mageia 2019-0388: kernel security update (Dec 13) |
|
This update provides an update to 5.4 series kernels, currently based on upstream 5.4.2, adding support for new hardware and features, and fixing atleast the following security issue: KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID
|
|
Mageia 2019-0387: ncurses security update (Dec 13) |
|
Updated ncurses packages fix security vulnerabilities: Heap-based buffer over-read in the _nc_find_entry function (CVE-2019-17594).
|
|
Mageia 2019-0386: signing-party security update (Dec 13) |
|
Updated signing-party package fixes security vulnerability: The gpg-key2ps tool in signing-party contained an unsafe shell call enabling shell injection via a User ID (CVE-2019-11627).
|
|
Mageia 2019-0385: proftpd security update (Dec 13) |
|
An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server
|
|
Mageia 2019-0384: wireshark security update (Dec 13) |
|
Version 3.0.7 fixes the following security vulnerability: CMS dissector crash (CVE-2019-19553). This update also brings the Mageia package from version 3.0.4 to 3.0.7.
|
|
Mageia 2019-0383: openafs security update (Dec 13) |
|
Update to security-release 1.8.5, adresses: * OPENAFS-SA-2019-001: Skip server OUT args on error * OPENAFS-SA-2019-002: Zero all server RPC args * OPENAFS-SA-2019-003: ubik: Avoid unlocked ubik_currentTrans deref
|
|
Mageia 2019-0382: squid security update (Dec 13) |
|
Potential remote code execution during URN processing (CVE-2019-12526). Multiple improper validations in URI processing (CVE-2019-12523, CVE-2019-18676).
|
|
Mageia 2019-0381: jasper security update (Dec 13) |
|
Heap based overflow in jas_icctxtdesc_input (CVE-2018-19540). Heap based overread in jas_image_depalettize (CVE-2018-19541). References:
|
|
Mageia 2019-0380: clementine security update (Dec 13) |
|
NULL ptr dereference (crash) in the moodbar pipeline (CVE-2019-14332). References: - https://bugs.mageia.org/show_bug.cgi?id=25753 -
|
|
Mageia 2019-0379: qbittorrent security update (Dec 13) |
|
In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed (CVE-2019-13640).
|
|
Mageia 2019-0378: kdelibs4 security update (Dec 13) |
|
kdelibs: malicious desktop files and configuration files lead to code execution with minimal user interaction (CVE-2019-14744). References: - https://bugs.mageia.org/show_bug.cgi?id=25403
|