Red Hat Security Advisory 2020-2337-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability.
d97960039ea897209f7073d1df3f547cead0b07aa28946f6737a56f52c083fce
Red Hat Security Advisory 2020-2336-01 - FreeRDP is a free implementation of the Remote Desktop Protocol, released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Issues addressed include integer overflow and out of bounds write vulnerabilities.
a97d0758a99b8e81309670874f63e5ae377f59755cb22c023da972d8e2578f73
Red Hat Security Advisory 2020-2338-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.
e6a2c73a2a4b38c1487faacabaaebda854a4acb40e748164c0484aced16dfe20
Red Hat Security Advisory 2020-2335-01 - FreeRDP is a free implementation of the Remote Desktop Protocol, released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Issues addressed include integer overflow and out of bounds write vulnerabilities.
95bfbc66511ee33ff88995e888012f41cd17e1549e2fbb074f8ced41bb5c2a2c
Red Hat Security Advisory 2020-2334-01 - FreeRDP is a free implementation of the Remote Desktop Protocol, released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Issues addressed include integer overflow and out of bounds write vulnerabilities.
e6eb51a86aae787edc8b9e31f50b2a7226ca764a53f6a55c29725b4c919f7a95
Debian Linux Security Advisory 4672-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service or request smuggling attacks.
660939fa86daf06b26ab50e4af0902ea74ef786a1e05e439262de385213123e4
Debian Linux Security Advisory 4673-1 - Several vulnerabilities were discovered in the Tomcat servlet and JSP engine, which could result in HTTP request smuggling and code execution in the AJP connector (disabled by default in Debian).
ba3d584d4fdc2ced4b9b9288a441018d4480428ec0d74e435018d2230c3f1349
Debian Linux Security Advisory 4674-1 - It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, did not correctly process and sanitize requests. This would allow a remote attacker to perform either a Cross-Site Request Forgery (CSRF) forcing an authenticated user to be logged out, or a Cross-Side Scripting (XSS) leading to execution of arbitrary code.
1a0e4fd0c77e5eb1e095f0a4465f6f037d2438c0aa3169e10e182197a9f7487e
Debian Linux Security Advisory 4675-1 - Several vulnerabilities have been discovered in GraphicsMagick, a set of command-line applications to manipulate image files, which could result in information disclosure, denial of service or the execution of arbitrary code if malformed image files are processed.
b2e87b4bb9b4dbb556409e766633ea564939c979313986ac94ce86ed6c29b11c
Debian Linux Security Advisory 4676-1 - Several vulnerabilities were discovered in salt, a powerful remote execution manager, which could result in retrieve of user tokens from the salt master, execution of arbitrary commands on salt minions, arbitrary directory access to authenticated users or arbitrary code execution on salt-api hosts.
bc8f6fb80beef063b1481154a0f467f4fb6d9239d5d229f48d3dffa80f9fa57e
Debian Linux Security Advisory 4676-2 - The update for salt for the oldstable distribution (stretch) released as DSA 4676-1 contained an incomplete fix to address CVE-2020-11651 and CVE-2020-11652. Updated salt packages are now available to correct this issue. For reference, the original advisory text follows.
796842d23e3e132487d82a2497387a92aa2770d53d6f95db179b90ce2981e9ee
Debian Linux Security Advisory 4677-1 - Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create files on the server, disclose private information, create open redirects, poison cache, and bypass authorization access and input sanitation.
6d27cba833ecba03b616051272e9350ebac60ca6dcdce5a8f1dbee3e9022d501
Debian Linux Security Advisory 4678-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or information disclosure.
42fc94236225414bc8cc2105ae469426c24ee3505e206d79b00379fad2795042
Debian Linux Security Advisory 4679-1 - A vulnerability was found in the EC2 credentials API of Keystone, the scope (trust/oauth/application credential) could create an EC2 credential with an escalated permission, such as obtaining "admin" while the user is on a limited "viewer" role.
57abffa4201ffff7ed9e3092133cdd1fe8625030c63993ef966787f79303370f
Debian Linux Security Advisory 4680-1 - Several vulnerabilities were discovered in the Tomcat servlet and JSP engine, which could result in HTTP request smuggling, code execution in the AJP connector (disabled by default in Debian) or a man-in-the-middle attack against the JMX interface.
d84200d1f875157db5551cd1679c3bdbff3b6dbe5f87a455c1a84bf2902aa60e
Debian Linux Security Advisory 4681-1 - Ryan Pickren discovered that a file URL may be incorrectly processed. Sergei Glazunov discovered that a race condition may allow an application to read restricted memory. Various other issues were also found.
3364a5da93f7debc3fd95c59d610976690373dd114d62d171dd6c632c645b187
Debian Linux Security Advisory 4682-1 - Multiple security issues were discovered in the Squid proxy caching server, which could result in the bypass of security filters, information disclosure, the execution of arbitrary code or denial of service.
87ca95b4ae1d88238583d52bb863f0a6581ef8c84693704ff5fc9f5b91f4325a
Debian Linux Security Advisory 4683-1 - Multiple security issues have been found in Thunderbird which could result in spoofing the displayed sender email address, denial of service or potentially the execution of arbitrary code.
6b4651f29f022e0efe1d6770f39d66f9649fc415381e1388373054438f2656bd
Debian Linux Security Advisory 4684-1 - Stephan Zeisberg discovered that the libreswan IPsec implementation could be forced into a crash/restart via a malformed IKEv1 Informational Exchange packet, resulting in denial of service.
3da635b656c657a466ffd3f22799562a5f2cb79c8dab0db749a4d23f21d3f966
Debian Linux Security Advisory 4685-1 - Shuaibing Lu discovered that missing input validation in the ar/tar implementations of APT, the high level package manager, could result in denial of service when processing specially crafted deb files.
d11a1baf9490082af927a3e0c3aa42218a73c54fe7796464fc703c7e99185b0f
Debian Linux Security Advisory 4686-1 - It was discovered that the SocketServer class included in apache-log4j1.2, a logging library for java, is vulnerable to deserialization of untrusted data. An attacker can take advantage of this flaw to execute arbitrary code in the context of the logger application by sending a specially crafted log event.
b7652cf3e1c98d44b0475cd461748855ac6cb1cda2d39aaf078852e016be5ce0
Debian Linux Security Advisory 4687-1 - It was discovered that exim4, a mail transport agent, suffers from a authentication bypass vulnerability in the spa authentication driver. The spa authentication driver is not enabled by default.
e3272bf74799d54d749a059ab8ec2fc1ae847a99be8c8ac11d45f300841755ab
Debian Linux Security Advisory 4688-1 - Multiple vulnerabilities were discovered in the vhost code of DPDK, a set of libraries for fast packet processing, which could result in denial of service or the execution of arbitrary code by malicious guests/containers.
53c57f7ed5d005acebd7038ef00b5ce38572fc2f58e783024f20cc04979ec7b9
Debian Linux Security Advisory 4689-1 - Several vulnerabilities were discovered in BIND, a DNS server implementation.
96c2db1c832c3227b5a973f46df47ac93ec1ba53a83a6ee66f99e63722d11f9b
Debian Linux Security Advisory 4690-1 - Several vulnerabilities were discovered in the Dovecot email server, which could cause crashes in the submission, submission-login or lmtp services, resulting in denial of service.
9d63598a1c71dc750c77f667387b4618d03c19f05df378ce707cb2a4abea6c26