Thank you for subscribing to the LinuxSecurity Linux Advisory Watch newsletter! Staying on top of the latest security advisories issued by the distro(s) you use is essential in maintaining an updated, secure Linux system. Our weekly newsletter is an easy, convenient way to track distribution security advisories - helping you keep your Linux environment safe from malware and other exploits.


Important advisories issued this week include warnings from various distros of multiple vulnerabilities in Mozilla Firefox and Mozilla Thunderbird and advisory issued by Gentoo regarding various flaws discovered in Google Chrome and Chromium. Continue reading to learn about other significant advisories issued this week. Stay healthy, safe and secure - both on and offline!


LinuxSecurity.com Feature Extras:

IoT Security Vulnerabilities are Ubiquitous: How To Secure Your Router and Your Linux System Now - The Internet of Things (IoT) is rapidly growing, connecting more devices each day. It is projected that by 2025, the world will have an astounding 64 billion IoT devices .

The Ultimate Guide to Using Data Encryption on Linux - Data encryption has never been more important. New data protection and privacy regulations, such as GDPR, mean that companies storing unencrypted customer information are vulnerable to paying heavy fines. The public is now more aware of the importance of encryption, with massive data breaches impacting companies like Facebook receiving major media coverage.


  Debian: DSA-4745-1: dovecot security update (Aug 12)
 

Several vulnerabilities have been discovered in the Dovecot email server. CVE-2020-12100

  Debian: DSA-4744-1: roundcube security update (Aug 12)
 

It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, is prone to cross-site scripting vulnerabilities in handling invalid svg and math tag content.

  Debian: DSA-4743-1: ruby-kramdown security update (Aug 10)
 

A flaw was discovered in ruby-kramdown, a fast, pure ruby, Markdown parser and converter, which could result in unintended read access to files or unintended embedded Ruby code execution when the {::options /} extension is used together with the 'template' option.

  Debian: DSA-4742-1: firejail security update (Aug 6)
 

Tim Starling discovered two vulnerabilities in firejail, a sandbox program to restrict the running environment of untrusted applications. CVE-2020-17367

  Fedora 31: lilypond 2020-7cd08d85ce (Aug 13)
 

Patch for CVE-2020-17353

  Fedora 31: python3 2020-d808fdd597 (Aug 13)
 

Security fix for CVE-2019-20907, CVE-2020-14422. Provide a versioned pathfix3.7.py command.

  Fedora 32: lilypond 2020-328534eeba (Aug 13)
 

Patch for CVE-2020-17353

  Fedora 32: hylafax+ 2020-01eb48bcce (Aug 12)
 

update to 7.0.3

  Fedora 32: ark 2020-e2fe8f0165 (Aug 12)
 

Security update for CVE-2020-16116, https://kde.org/info/security/advisory-20200730-1.txt

  Fedora 31: hylafax+ 2020-8aa8793d25 (Aug 12)
 

update to 7.0.3

  Fedora 31: python36 2020-efb908b6a8 (Aug 11)
 

Security fix for CVE-2019-20907, CVE-2020-14422.

  Fedora 32: kernel 2020-8d634e31c0 (Aug 11)
 

The 5.7.14 stable kernel update contains a number of important fixes across the tree.

  Fedora 32: nodejs 2020-754b711a58 (Aug 11)
 

Update to 12.18.3

  Fedora 32: libmetalink 2020-c3ca827d31 (Aug 11)
 

Patched null ptr dereference

  Fedora 31: nodejs 2020-fed59ab473 (Aug 11)
 

Update to 12.18.3

  Fedora 31: ark 2020-cac5ae9b6e (Aug 8)
 

Security update for CVE-2020-16116, https://kde.org/info/security/advisory-20200730-1.txt

  Fedora 32: rpki-client 2020-25d8011cb4 (Aug 8)
 

# rpki-client 6.7p1 * Security fix: Incorrect use of `EVP_PKEY_cmp` allowed an authentication bypass

  Fedora 31: rpki-client 2020-9f31ce1df2 (Aug 7)
 

# rpki-client 6.7p1 * Security fix: Incorrect use of `EVP_PKEY_cmp` allowed an authentication bypass

  Fedora 32: radare2 2020-aa51efe207 (Aug 6)
 

- Rebase radare2 to upstream version 4.5.0 - Rebase cutter to upstream version 1.11.0 - Provide cutter translation - Provide -devel sub package of cutter-re

  Fedora 32: cutter-re 2020-aa51efe207 (Aug 6)
 

- Rebase radare2 to upstream version 4.5.0 - Rebase cutter to upstream version 1.11.0 - Provide cutter translation - Provide -devel sub package of cutter-re

  Fedora 32: postgresql-jdbc 2020-5a31ccfe66 (Aug 6)
 

fixed XML external entity (XXE) vulnerability

  Fedora 31: radare2 2020-d5b33b6e6c (Aug 6)
 

- Rebase radare2 to 4.5.0 - Rebase cutter-re to 1.11.0

  Fedora 31: cutter-re 2020-d5b33b6e6c (Aug 6)
 

- Rebase radare2 to 4.5.0 - Rebase cutter-re to 1.11.0

  Fedora 32: python36 2020-1ddd5273d6 (Aug 6)
 

Security fix for CVE-2019-20907, CVE-2020-14422.

  Fedora 32: python37 2020-87c0a0a52d (Aug 6)
 

Security fix for CVE-2019-20907, CVE-2020-14422. Provide a versioned pathfix3.7.py command.

  Gentoo: GLSA-202008-07: Chromium, Google Chrome: Multiple vulnerabilities (Aug 12)
 

Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202008-06: iproute2: Denial of service (Aug 8)
 

A use-after-free was found in iproute2, possibly allowing a Denial of Service condition.

  Gentoo: GLSA-202008-05: gThumb: Arbitrary code execution (Aug 8)
 

A buffer overflow in gThumb might allow remote attacker(s) to execute arbitrary code.

  Gentoo: GLSA-202008-04: Apache: Multiple vulnerabilities (Aug 8)
 

Multiple vulnerabilities have been found in Apache, the worst of which could result in the arbitrary execution of code.

  Gentoo: GLSA-202008-03: Ark: Arbitrary code execution (Aug 8)
 

Ark was found to allow arbitrary file overwrite, possibly allowing arbitrary code execution.

  Gentoo: GLSA-202008-02: GNU GLOBAL: Arbitrary code execution (Aug 8)
 

A vulnerability in GNU GLOBAL was discovered, possibly allowing remote attackers to execute arbitrary code.

  RedHat: RHSA-2020-3433:01 Important: bind security update (Aug 12)
 

An update for bind is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.

  RedHat: RHSA-2020-3432:01 Important: kernel security update (Aug 12)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.

  RedHat: RHSA-2020-3414:01 Low: OpenShift Container Platform 4.5.5 security (Aug 12)
 

An update for atomic-openshift-descheduler-container and ose-cluster-kube-descheduler-operator-container is now available for Red Hat OpenShift Container Platform 4.5. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2020-3425:01 Moderate: Red Hat OpenShift Service Mesh 1.1 (Aug 11)
 

An update for servicemesh is now available for OpenShift Service Mesh 1.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3422:01 Important: .NET Core 3.1 security and bugfix (Aug 11)
 

An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3421:01 Important: .NET Core 3.1 security and bugfix (Aug 11)
 

An update for rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3406:01 Important: python-paunch and (Aug 11)
 

An update for python-paunch and openstack-tripleo-heat-templates is now available for Red Hat OpenStack Platform 16.0 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3410:01 Important: python-paunch and (Aug 11)
 

An update for python-paunch and openstack-tripleo-heat-templates is now available for Red Hat OpenStack Platform 15 (Stein). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3389:01 Important: kernel-rt security and bug fix update (Aug 11)
 

An update for kernel-rt is now available for Red Hat Enterprise MRG 2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-3387:01 Important: java-1.7.1-ibm security update (Aug 10)
 

An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3388:01 Important: java-1.7.1-ibm security update (Aug 10)
 

An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3386:01 Important: java-1.8.0-ibm security update (Aug 10)
 

An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3385:01 Important: libvncserver security update (Aug 10)
 

An update for libvncserver is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-3383:01 Important: Red Hat JBoss Enterprise Application (Aug 10)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3382:01 Important: Red Hat JBoss Enterprise Application (Aug 10)
 

An update is now available for Red Hat JBoss Enterprise Application Platform 6.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3379:01 Important: bind security update (Aug 10)
 

An update for bind is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3378:01 Important: bind security update (Aug 10)
 

An update for bind is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3377:01 Critical: chromium-browser security update (Aug 10)
 

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-3372:01 Moderate: Red Hat OpenShift Service Mesh (Aug 6)
 

An update for 3scale-istio-adapter-rhel8-container is now available for OpenShift Service Mesh. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-3369:01 Moderate: Red Hat OpenShift Service Mesh security (Aug 6)
 

An update is now available for OpenShift Service Mesh 1.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3370:01 Low: Red Hat OpenShift Jaeger 1.17.6 container (Aug 6)
 

An update is now available for Jaeger-1.17. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3358:01 Critical: CloudForms 5.0.7 bug fix and (Aug 6)
 

An update is now available for CloudForms Management Engine 5.11. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3345:01 Important: thunderbird security update (Aug 6)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-3344:01 Important: thunderbird security update (Aug 6)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-3341:01 Important: thunderbird security update (Aug 6)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-3342:01 Important: thunderbird security update (Aug 6)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3343:01 Important: thunderbird security update (Aug 6)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  SUSE: 2020:2233-1 important: libvirt (Aug 13)
 

An update that solves one vulnerability and has three fixes is now available.

  SUSE: 2020:2235-1 moderate: libreoffice (Aug 13)
 

An update that solves two vulnerabilities and has 6 fixes is now available.

  SUSE: 2020:2234-1 important: xen (Aug 13)
 

An update that fixes 5 vulnerabilities is now available.

  SUSE: 2020:2232-1 important: webkit2gtk3 (Aug 13)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2020:2225-1 moderate: xerces-c (Aug 13)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2217-1 moderate: libreoffice (Aug 12)
 

An update that solves two vulnerabilities and has 6 fixes is now available.

  SUSE: 2020:2216-1 important: python36 (Aug 12)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:2194-1 moderate: dpdk (Aug 11)
 

An update that solves two vulnerabilities and has two fixes is now available.

  SUSE: 2020:2196-1 important: libX11 (Aug 11)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2197-1 important: libX11 (Aug 11)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:14448-1 important: xen (Aug 11)
 

An update that fixes 7 vulnerabilities is now available.

  SUSE: 2020:2199-1 important: webkit2gtk3 (Aug 11)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2020:2198-1 important: webkit2gtk3 (Aug 11)
 

An update that fixes 6 vulnerabilities is now available.

  SUSE: 2020:2200-1 important: google-compute-engine (Aug 11)
 

An update that fixes three vulnerabilities is now available.

  SUSE: 2020:14447-1 important: xorg-x11-libX11 (Aug 11)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2179-1 important: MozillaThunderbird (Aug 10)
 

An update that fixes four vulnerabilities is now available.

  SUSE: 2020:2172-1 moderate: perl-XML-Twig (Aug 7)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2173-1 moderate: perl-XML-Twig (Aug 7)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2171-1 important: xen (Aug 7)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:2166-1 important: xen (Aug 7)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:2167-1 important: LibVNCServer (Aug 7)
 

An update that fixes 12 vulnerabilities is now available.

  SUSE: 2020:2160-1 important: xen (Aug 6)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:2157-1 important: python-ipaddress (Aug 6)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2156-1 important: the Linux Kernel (Aug 6)
 

An update that solves 32 vulnerabilities and has 122 fixes is now available.

  SUSE: 2020:2159-1 important: xen (Aug 6)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:2158-1 important: xen (Aug 6)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:2152-1 important: the Linux Kernel (Aug 6)
 

An update that solves 11 vulnerabilities and has 12 fixes is now available.

  SUSE: 2020:2149-1 moderate: postgresql10 and postgresql12 (Aug 6)
 

An update that solves one vulnerability and has two fixes is now available.

  SUSE: 2020:2147-1 important: MozillaFirefox (Aug 6)
 

An update that fixes 10 vulnerabilities is now available.

  SUSE: 2020:2141-1 important: xen (Aug 6)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:2140-1 important: rubygem-actionview-4_2 (Aug 6)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2142-1 important: xrdp (Aug 6)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2143-1 important: java-11-openjdk (Aug 6)
 

An update that fixes 8 vulnerabilities is now available.

  SUSE: 2020:2144-1 moderate: wireshark (Aug 6)
 

An update that fixes three vulnerabilities is now available.

  Ubuntu 4458-1: Apache HTTP Server vulnerabilities (Aug 13)
 

Several security issues were fixed in Apache HTTP Server.

  Ubuntu 4457-1: Software Properties vulnerability (Aug 12)
 

Software Properties could be made to manipulate the display.

  Ubuntu 4456-1: Dovecot vulnerabilities (Aug 12)
 

Several security issues were fixed in Dovecot.

  Ubuntu 4454-2: Samba vulnerability (Aug 10)
 

Samba could be made to crash if it received specially crafted network traffic.

  Ubuntu 4455-1: NSS vulnerabilities (Aug 10)
 

Several security issues were fixed in NSS.

  Ubuntu 4454-1: Samba vulnerability (Aug 10)
 

Samba could be made to crash if it received specially crafted network traffic.

  Ubuntu 4451-2: ppp vulnerability (Aug 6)
 

ppp could be made to load arbitrary kernel modules and possibly run programs.

  Debian LTS: DLA-2278-2: squid3 regression update (Aug 13)
 

The update of squid3 released as DLA-2278-1 contained an incomplete fix for CVE-2019-12523 that prevented services which rely on the icap or ecap protocol to function properly. Updated squid3 packages are now available to correct this issue.

  Debian LTS: DLA-2325-1: openjdk-8 security update (Aug 13)
 

Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, bypass of access/sandbox restrictions or information disclosure.

  Debian LTS: DLA-2324-1: linux-latest-4.19 new package (Aug 12)
 

Linux 4.19 has been packaged for Debian 9 as linux-4.19. This provides a supported upgrade path for systems that currently use kernel packages from the "stretch-backports" suite.

  Debian LTS: DLA-2323-1: linux-4.19 new package (Aug 12)
 

Linux 4.19 has been packaged for Debian 9 as linux-4.19. This provides a supported upgrade path for systems that currently use kernel packages from the "stretch-backports" suite.

  Debian LTS: DLA-2321-1: firmware-nonfree new upstream version (Aug 11)
 

The firmware-nonfree package has been updated to include additional firmware that may be requested by some drivers in Linux 4.19. Along with additional kernel packages that will be announced later,

  Debian LTS: DLA-2320-1: golang-github-seccomp-libseccomp-golang (Aug 11)
 

A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

  Debian LTS: DLA-2319-1: xrdp security update (Aug 9)
 

xrdp-sesman service in xrdp can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them

  Debian LTS: DLA-2316-1: ruby-kramdown security update (Aug 9)
 

ruby-kramdown processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is

  Debian LTS: DLA-2318-1: wpa security update (Aug 8)
 

The following CVE(s) have been reported against src:wpa. CVE-2019-10064

  Debian LTS: DLA-2317-1: pillow security update (Aug 8)
 

It was noticed that in Pillow before 7.1.0, there are multiple out-of-bounds reads in libImaging/FliDecode.c. For Debian 9 stretch, this problem has been fixed in version

  Debian LTS: DLA-2315-1: gupnp security update (Aug 6)
 

Yunus adrc found an issue in the SUBSCRIBE method of UPnP, a network protocol for devices to automatically discover and communicate with each other. Insuficient checks on this method allowed attackers to use vulnerable UPnP services for DoS attacks or possibly to bypass

  Debian LTS: DLA-2314-1: clamav security update (Aug 6)
 

Several vulnerabilities have been found in the ClamAV antivirus toolkit: CVE-2020-3327

  CentOS: CESA-2020-3253: Important CentOS 7 firefox (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:3253

  CentOS: CESA-2020-3344: Important CentOS 7 thunderbird (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:3344

  CentOS: CESA-2020-3233: Important CentOS 6 firefox (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:3233

  CentOS: CESA-2020-3345: Important CentOS 6 thunderbird (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:3345

  CentOS: CESA-2020-3284: Important CentOS 6 postgresql-jdbc (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:3284

  CentOS: CESA-2020-2985: Important CentOS 6 java-1.8.0-openjdk (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:2985

  CentOS: CESA-2020-2968: Important CentOS 7 java-1.8.0-openjdk (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:2968

  CentOS: CESA-2020-2969: Important CentOS 7 java-11-openjdk (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:2969

  CentOS: CESA-2020-3281: Important CentOS 7 libvncserver (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:3281

  CentOS: CESA-2020-3285: Important CentOS 7 postgresql-jdbc (Aug 7)
 

Upstream details at : https://access.redhat.com/errata/RHSA-2020:3285

  SciLinux: SLSA-2020-3345-1 Important: thunderbird on SL6.x i386/x86_64 (Aug 6)
 

chromium-browser: Use after free in ANGLE (CVE-2020-6463) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) * Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659) SL6 x86_64 thunderbird-68.11.0-1.el6_10.x86_64.rpm thunderbird-d [More...]

  SciLinux: SLSA-2020-3344-1 Important: thunderbird on SL7.x x86_64 (Aug 6)
 

chromium-browser: Use after free in ANGLE (CVE-2020-6463) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) * Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659) SL7 x86_64 thunderbird-68.11.0-1.el7_8.x86_64.rpm thunderbird-de [More...]

  openSUSE: 2020:1196-1: important: xen (Aug 13)
 

An update that contains security fixes can now be installed.

  openSUSE: 2020:1190-1: important: xen (Aug 12)
 

An update that contains security fixes can now be installed.

  openSUSE: 2020:1194-1: moderate: go1.13 (Aug 12)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:1191-1: important: java-11-openjdk (Aug 12)
 

An update that fixes 8 vulnerabilities is now available.

  openSUSE: 2020:1188-1: moderate: wireshark (Aug 12)
 

An update that fixes three vulnerabilities is now available.

  openSUSE: 2020:1189-1: important: MozillaFirefox (Aug 12)
 

An update that fixes 10 vulnerabilities is now available.

  openSUSE: 2020:1182-1: important: libX11 (Aug 12)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1183-1: moderate: ark (Aug 12)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1179-1: important: MozillaThunderbird (Aug 11)
 

An update that fixes four vulnerabilities is now available.

  openSUSE: 2020:1178-1: moderate: go1.13 (Aug 10)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:1177-1: moderate: perl-XML-Twig (Aug 10)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1175-1: important: java-11-openjdk (Aug 9)
 

An update that fixes 8 vulnerabilities is now available.

  openSUSE: 2020:1172-1: moderate: opera (Aug 9)
 

An update that fixes 26 vulnerabilities is now available.

  openSUSE: 2020:1169-1: important: grub2 (Aug 8)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2020:1168-1: important: grub2 (Aug 8)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2020:1164-1: important: libX11 (Aug 8)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1162-1: important: libX11 (Aug 7)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1161-1: Security update of chromium (Aug 7)
 

An update that fixes 6 vulnerabilities is now available.

  openSUSE: 2020:1156-1: moderate: python-rtslib-fb (Aug 7)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1155-1: important: MozillaFirefox (Aug 6)
 

An update that fixes 10 vulnerabilities is now available.

  openSUSE: 2020:1154-1: Security update of chromium (Aug 6)
 

An update that fixes 6 vulnerabilities is now available.

  openSUSE: 2020:1153-1: important: the Linux Kernel (Aug 6)
 

An update that solves 19 vulnerabilities and has 92 fixes is now available.