Thank you for subscribing to the LinuxSecurity Linux Advisory Watch newsletter! Staying on top of the latest security advisories issued by the distro(s) you use is essential in maintaining an updated, secure Linux system. Our weekly newsletter is an easy, convenient way to track distribution security advisories - helping you keep your Linux environment safe from malware and other exploits.

Important advisories issued this week include warnings from CentOS, Scientific Linux and Slackware of vulnerabilities in Mozilla Firefox and Mozilla Thunderbird and critical dovecot updates released by CentOS and Scientific Linux. Continue reading to learn about other significant advisories issued this week. Stay healthy, safe and secure - both on and offline!


LinuxSecurity.com Feature Extras:

How To Identify Libraries that are Still Vulnerable to Attacks After Updates - Patch management can be a complex and time-consuming process, and because of this, patches to fix vulnerabilities may not be applied before a hacker is able to breach an organization's security. The majority of organizations are not aware of these vulnerabilities until they have experienced a breach, at which point it is frustrating to learn that deploying a simple patch could have prevented the breach altogether.

TANSTAAFL! The Tragedy of the Commons Meets Open-Source Software - Open-source projects can become victims of their own success. What can developers do to secure their open-source software?


  Debian: DSA-4768-1: firefox-esr security update (Sep 28)
 

Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, cross-site scripting or spoofing the origin of a download.

  Debian: DSA-4767-1: mediawiki security update (Sep 25)
 

Multiple security issues were discovered in MediaWiki, a website engine for collaborative work: SpecialUserRights could leak whether a user existed or not, multiple code paths lacked HTML sanitisation allowing for cross-site scripting and TOTP validation applied insufficient rate

  Debian: DSA-4766-1: rails security update (Sep 24)
 

Multiple security issues were discovered in the Rails web framework which could result in cross-site scripting, information leaks, code execution, cross-site request forgery or bypass of upload limits.

  Fedora 32: pdns 2020-7e9234058f (Oct 1)
 

- Update to 4.3.1 - PowerDNS Security Advisory 2020-05 (CVE-2020-17482) Release notes: https://doc.powerdns.com/authoritative/changelog/4.2.html#change-4.3.1 Security Advisory: advisories/powerdns-advisory-2020-05.html

  Fedora 32: podman 2020-76fcd0ba34 (Oct 1)
 

autobuilt v2.1.0, Security fix for CVE-2020-14370

  Fedora 32: crun 2020-76fcd0ba34 (Oct 1)
 

autobuilt v2.1.0, Security fix for CVE-2020-14370

  Fedora 33: libproxy 2020-15b775b07e (Oct 1)
 

Add fix for PAC buffer overflow

  Fedora 33: dotnet3.1 2020-48fa1ad65c (Oct 1)
 

This update updates .NET Core 3.1 to SDK 3.1.108 and Runtime 3.1.8. This update includes a fix for CVE-2020-1045 Release Notes: https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md

  Fedora 33: nodejs 2020-006c7217c4 (Oct 1)
 

Update to Node.js 14.11.0 September 2020 Security Release - https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/ ---- Node.js 14.10.0 - Fixes an issue preventing compilation against v8-devel

  Fedora 33: libuv 2020-006c7217c4 (Oct 1)
 

Update to Node.js 14.11.0 September 2020 Security Release - https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/ ---- Node.js 14.10.0 - Fixes an issue preventing compilation against v8-devel

  Fedora 32: xen 2020-f668e579be (Sep 30)
 

x86 pv: Crash when handling guest access to MSR_MISC_ENABLE [XSA-333, CVE-2020-25602] (#1881619) Missing unlock in XENMEM_acquire_resource error path [XSA-334, CVE-2020-25598] (#1881616) race when migrating timers between x86 HVM vCPU-s [XSA-336, CVE-2020-25604] (#1881618) PCI passthrough code reading back hardware registers [XSA-337, CVE-2020-25595] (#1881587) once valid event

  Fedora 33: chromium 2020-2d994b986d (Sep 30)
 

Update to 85.0.4183.121. Why? Because security, that's why. It fixes these CVEs: CVE-2020-15960 CVE-2020-15961 CVE-2020-15962 CVE-2020-15963 CVE-2020-15964 CVE-2020-15965 CVE-2020-15966 It also has a fix for an issue where networking... uh... didn't. ---- Update Chromium to 85.0.4183.102. Fix issue where unpackaged components prevented hardware accelerated rendering from

  Fedora 33: edk2 2020-14257cb04d (Sep 30)
 

* Update to edk2 stable 202008

  Fedora 33: community-mysql 2020-77b95c868f (Sep 30)
 

Update built with the new CMake settings Number of files which should have been owned by the testsuite subpackage are now owned by it Started building MeCab plugin

  Fedora 33: mediawiki 2020-6e64e9d79e (Sep 29)
 

https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-September/000260.html https://lists.wikimedia.org/hyperkitty/list/This email address is being protected from spambots. You need JavaScript enabled to view it./message/MUBKHDTKOOFV2IOS4QS3LFINAXBT5INX/

  Fedora 33: mumble 2020-f869e01557 (Sep 28)
 

Mumble 1.3.2. === Client * Fixed: Overlay not starting (#4282) Server * Fixed: keychain-error on macOS for custom certificates (#4345) Known issues * Overlay blocked by BattleEye. A request to whitelist it has been made. * Overlay blocked by CS:GO Trusted Mode

  Fedora 33: pdns 2020-7b1541266c (Sep 28)
 

- Update to 4.3.1 - PowerDNS Security Advisory 2020-05 (CVE-2020-17482) Release notes: https://doc.powerdns.com/authoritative/changelog/4.2.html#change-4.3.1 Security Advisory: advisories/powerdns-advisory-2020-05.html

  Fedora 33: pandoc 2020-c39d7a562c (Sep 28)
 

Security fix for CVE-2020-5238 - ghc-cmark-gfm updated to 0.2.2 which rebases the bundled cmark-gfm to 0.29.0.gfm.1 - also update pandoc-citeproc to 0.17.0.1 https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85

  Fedora 33: pandoc-citeproc 2020-c39d7a562c (Sep 28)
 

Security fix for CVE-2020-5238 - ghc-cmark-gfm updated to 0.2.2 which rebases the bundled cmark-gfm to 0.29.0.gfm.1 - also update pandoc-citeproc to 0.17.0.1 https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85

  Fedora 33: ghc-hakyll 2020-c39d7a562c (Sep 28)
 

Security fix for CVE-2020-5238 - ghc-cmark-gfm updated to 0.2.2 which rebases the bundled cmark-gfm to 0.29.0.gfm.1 - also update pandoc-citeproc to 0.17.0.1 https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85

  Fedora 33: gitit 2020-c39d7a562c (Sep 28)
 

Security fix for CVE-2020-5238 - ghc-cmark-gfm updated to 0.2.2 which rebases the bundled cmark-gfm to 0.29.0.gfm.1 - also update pandoc-citeproc to 0.17.0.1 https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85

  Fedora 33: patat 2020-c39d7a562c (Sep 28)
 

Security fix for CVE-2020-5238 - ghc-cmark-gfm updated to 0.2.2 which rebases the bundled cmark-gfm to 0.29.0.gfm.1 - also update pandoc-citeproc to 0.17.0.1 https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85

  Fedora 33: ghc-cmark-gfm 2020-c39d7a562c (Sep 28)
 

Security fix for CVE-2020-5238 - ghc-cmark-gfm updated to 0.2.2 which rebases the bundled cmark-gfm to 0.29.0.gfm.1 - also update pandoc-citeproc to 0.17.0.1 https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85

  Fedora 32: xawtv 2020-cd5ad916e4 (Sep 27)
 

Update to 3.107

  Fedora 33: f2fs-tools 2020-a0b24e9377 (Sep 27)
 

Update to 1.14.0

  Fedora 31: grub2 2020-e19b87f4f5 (Sep 26)
 

grub2 updates for boothole vulnerabilities in f31/f32.

  Fedora 33: xen 2020-306b84fd07 (Sep 26)
 

x86 pv: Crash when handling guest access to MSR_MISC_ENABLE [XSA-333, CVE-2020-25602] (#1881619) Missing unlock in XENMEM_acquire_resource error path [XSA-334, CVE-2020-25598] (#1881616) race when migrating timers between x86 HVM vCPU-s [XSA-336, CVE-2020-25604] (#1881618) PCI passthrough code reading back hardware registers [XSA-337, CVE-2020-25595] (#1881587) once valid event

  Fedora 33: LibRaw 2020-2d9d628dd2 (Sep 25)
 

Patch for CVE-2020-24890

  Fedora 31: perl-DBI 2020-f30298614a (Sep 25)
 

This release fixes CVE-2020-14392 (a memory corruption in XS functions when Perl stack is reallocated), CVE-2019-20919 (a NULL profile dereference in dbi_profile()), a documentation that old API functions are vulnerable to an overflow, and CVE-2020-14393 (a buffer overlfow on an overlong DBD class name). It also adds a missing dependency on FileHandle Perl module.

  Fedora 31: singularity 2020-c1c4cb96d3 (Sep 25)
 

Upgrade to upstream 3.6.3.

  Fedora 31: libxml2 2020-20ab468a33 (Sep 25)
 

Add fix for CVE-2020-24977 (RHBZ#1877788).

  Fedora 32: singularity 2020-22ab822e3b (Sep 25)
 

Upgrade to upstream 3.6.3.

  Fedora 33: samba 2020-77c15664b0 (Sep 25)
 

Update to Samba 4.13.0 ---- Security fixes for CVE-2020-1472 ---- Update to Samba 4.13.0rc4

  Fedora 33: libproxy 2020-f92d372cf1 (Sep 25)
 

Fix CVE-2020-25219

  Fedora 33: singularity 2020-8111ee0d86 (Sep 25)
 

Upgrade to upstream 3.6.3.

  Fedora 33: zeromq 2020-5460fcf6bd (Sep 25)
 

Fix of #1876738 and #1876689

  Fedora 33: libxml2 2020-dd2fc19b78 (Sep 25)
 

Add fix for CVE-2020-24977 (RHBZ#1877788).

  Fedora 33: mingw-libxml2 2020-be489044df (Sep 25)
 

Add fix for CVE-2020-24977 (RHBZ#1877788, RHBZ#1877789).

  Fedora 33: libssh 2020-ac3e29073f (Sep 25)
 

Update to version 0.9.5 * * Fixes CVE-2020-16135

  Fedora 33: seamonkey 2020-e6f404e2bb (Sep 25)
 

Update to 2.53.4 Lightning, Chatzilla and DOM Inspector are now provided in the same way as for themes and language packs (ie. as "application global" addons). Previously, they were copied into the user profile on each update, which led to some issues. The old copies of those addons are automatically deleted from the user profile at update time (except a case when it was copied by hand, or has

  Fedora 33: dotnet3.1 2020-9ddf1aa50b (Sep 25)
 

Update to .NET Core SDK 3.1.107 and Runtime 3.1.7. This fixes CVE-2020-1597 Release Notes: https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.7/3.1.7.md

  Fedora 33: kernel 2020-468121099e (Sep 25)
 

The 5.8.7 stable kernel update contains a number of important fixes across the tree.

  Fedora 33: mbedtls 2020-e75ade5e38 (Sep 25)
 

- Update to 2.16.8

  Fedora 33: pdns-recursor 2020-1d812d5546 (Sep 25)
 

- Update to 4.3.4

  Fedora 33: python3.5 2020-a085d19eb9 (Sep 25)
 

[Python 3.5.10](https://www.python.org/downloads/release/python-3510/). [Changelog](https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-10). ---- Update to 3.5.10rc1

  Fedora 33: netty 2020-66b5f85ccc (Sep 25)
 

Updates to latest upstream releases.

  Fedora 33: firefox 2020-99834af551 (Sep 25)
 

Update Firefox to 81.0, and NSS to 3.56.0. For details about new functionality and a list of bugs fixed, see: - https://www.mozilla.org/en-US/firefox/81.0/releasenotes/ -

  Fedora 33: nss 2020-99834af551 (Sep 25)
 

Update Firefox to 81.0, and NSS to 3.56.0. For details about new functionality and a list of bugs fixed, see: - https://www.mozilla.org/en-US/firefox/81.0/releasenotes/ -

  Fedora 33: drupal7 2020-fe94df8c34 (Sep 25)
 

- https://www.drupal.org/project/drupal/releases/7.72 - [Drupal core - Critical - Cross Site Request Forgery - SA- CORE-2020-004](https://www.drupal.org/sa-core-2020-004) / CVE-2020-13663 - https://www.drupal.org/project/drupal/releases/7.71

  Fedora 33: mingw-gnutls 2020-de51ee7cc9 (Sep 25)
 

https://lists.gnupg.org/pipermail/gnutls-help/2020-September/004669.html

  Fedora 33: gnutls 2020-d12739ca45 (Sep 25)
 

Update to the new upstream 3.6.15 release.

  Fedora 33: ansible 2020-c3e6f30f53 (Sep 25)
 

Update to upstream bugfix and security release 2.9.13.

  Fedora 33: cryptsetup 2020-8c76e12e62 (Sep 25)
 

Update to cryptsetup 2.3.4. Security fix for CVE-2020-14382

  Fedora 33: python-django 2020-9c6b391162 (Sep 25)
 

update to 3.0.10, fixes CVE-2020-24583, CVE-2020-24584

  Fedora 33: dpdk 2020-8d56b5b55c (Sep 25)
 

Update to latest 19.11 LTS (bz1874499)

  Fedora 33: java-1.8.0-openjdk-aarch32 2020-cc26b6b881 (Sep 25)
 

8u265 update, disable LTO

  Fedora 33: lua 2020-38e35de8aa (Sep 25)
 

Fix CVE-2020-24342 lua: buffer overflow in luaO_pushvfstring

  Fedora 33: chromium 2020-6da740d38c (Sep 25)
 

Update to Chromium 85.0.4183.83. Bugs fixed, security holes patched, and features added. Hold on to your butts. List of CVEs resolved with this update: CVE-2020-6532 CVE-2020-6537 CVE-2020-6538 CVE-2020-6539 CVE-2020-6540 CVE-2020-6541 CVE-2020-6542 CVE-2020-6543 CVE-2020-6544 CVE-2020-6545 CVE-2020-6546 CVE-2020-6547 CVE-2020-6548 CVE-2020-6549 CVE-2020-6550

  Fedora 33: php-symfony4 2020-1c549262f1 (Sep 25)
 

**Version 4.4.13** (2020-09-02) * security **CVE-2020-15094** Remove headers with internal meaning from HttpClient responses (mpdude) * bug #38024 [Console] Fix undefined index for inconsistent command name definition (chalasr) * bug #38023 [DI] fix inlining of non-shared services (nicolas-grekas) * bug #38020 [PhpUnitBridge] swallow deprecations (xabbuh) * bug #38010 [Cache] Psr16Cache

  Fedora 33: ark 2020-f04f41bcc9 (Sep 25)
 

security fix for CVE-2020-24654

  Fedora 33: swtpm 2020-561c908a9a (Sep 25)
 

Disable pkcs11 related test case running into GnuTLS locking bug

  Fedora 33: dovecot 2020-b8ebc4201e (Sep 25)
 

CVE-2020-12100: Parsing mails with a large number of MIME parts could have resulted in excessive CPU usage or a crash due to running out of stack memory. CVE-2020-12673: Dovecot's NTLM implementation does not correctly check message buffer size, which leads to reading past allocation which can lead to crash. CVE-2020-10967: lmtp/submission:

  Fedora 33: mysql-connector-java 2020-35995bb2d3 (Sep 25)
 

Rebased to version 8.0.21

  Fedora 33: libX11 2020-cf0afbd27e (Sep 25)
 

libX11 1.6.12, fixes for CVE-2020-14363 and CVE 2020-14344

  Fedora 33: squid 2020-6c58bff862 (Sep 25)
 

Squid version update to 4.13 and security fixes

  Gentoo: GLSA-202009-18: Bitcoin: Multiple vulnerabilities (Sep 29)
 

Multiple vulnerabilities have been found in Bitcoin, the worst of which could result in a Denial of Service condition.

  Gentoo: GLSA-202009-14: Xen: Buffer overflow (Sep 29)
 

A buffer overflow in Xen might allow remote attacker(s) to execute arbitrary code.

  Gentoo: GLSA-202009-16: LinuxCIFS: Shell injection (Sep 29)
 

A vulnerability in LinuxCIFS may allow a remote code execution via a command line option.

  Gentoo: GLSA-202009-17: gpsd: Arbitrary code execution (Sep 29)
 

A vulnerability in gpsd could allow remote code execution.

  Gentoo: GLSA-202009-15: libuv: Buffer overflow (Sep 29)
 

A buffer overflow in libuv might allow remote attacker(s) to execute arbitrary code.

  Gentoo: GLSA-202009-13: Chromium, Google Chrome: Multiple vulnerabilities (Sep 29)
 

Multiple vulnerabilities have been found in Chromiun and Google Chrome, the worst of which could result in the arbitrary execution of code.

  RedHat: RHSA-2020-4162:01 Important: qemu-kvm-ma security update (Oct 1)
 

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4163:01 Important: thunderbird security update (Oct 1)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-4158:01 Important: thunderbird security update (Oct 1)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-4155:01 Important: thunderbird security update (Oct 1)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-4157:01 Important: thunderbird security update (Oct 1)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4156:01 Important: thunderbird security update (Oct 1)
 

An update for thunderbird is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4154:01 Moderate: Red Hat AMQ Broker 7.4.5 release and (Oct 1)
 

Red Hat AMQ Broker 7.4.5 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3842:01 Moderate: OpenShift Container Platform 4.5.13 (Sep 30)
 

An update for openshift-enterprise-console-container is now available for Red Hat OpenShift Container Platform 4.5. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-3841:01 Important: OpenShift Container Platform 4.5.13 (Sep 30)
 

An update for jenkins is now available for Red Hat OpenShift Container Platform 4.5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4143:01 Moderate: OCS 3.11.z async security, bug fix, (Sep 30)
 

Updated OpenShift Container Storage packages fixing various security issues and other bugs are now available for Red Hat OpenShift Container Storage with 3.11.z Async update. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2020-4137:01 Moderate: security update - Red Hat Ansible Tower (Sep 30)
 

Red Hat Ansible Tower 3.6.6-1 - RHEL7 Container 2. Description: * Fixed an XSS vulnerability (CVE-2020-25626) * Fixed the Red Hat sosreport tool to no longer include the Ansible Tower

  RedHat: RHSA-2020-4136:01 Moderate: security update - Red Hat Ansible Tower (Sep 30)
 

Red Hat Ansible Tower 3.7.3-1 - RHEL7 Container 2. Description: * Updated to the latest version of the git-python library to no longer cause certain jobs to fail

  RedHat: RHSA-2020-4134:01 Moderate: CloudForms 5.0.8 security, (Sep 30)
 

An update is now available for CloudForms Management Engine 5.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4127:01 Important: Satellite 6.7.4 Async Bug Fix Update (Sep 30)
 

Updated Satellite 6.7 packages that fix several bugs are now available for Red Hat Satellite. 2. Relevant releases/architectures: Red Hat Satellite 6.7 - noarch

  RedHat: RHSA-2020-4129:01 Moderate: Red Hat OpenShift Service Mesh 1.1 (Sep 30)
 

An update for servicemesh-proxy is now available for OpenShift Service Mesh 1.1. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-4114:01 Moderate: Red Hat Virtualization security and bug (Sep 30)
 

An update for openvswitch2.11, ovirt-ansible-repositories, ovn2.11, and python-ovirt-engine-sdk4 is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization Engine 4.3. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2020-4115:01 Important: redhat-release-virtualization-host and (Sep 30)
 

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact

  RedHat: RHSA-2020-4111:01 Important: qemu-kvm-rhev security update (Sep 30)
 

An update for qemu-kvm-rhev is now available for Red Hat Virtualization for Red Hat Virtualization Host 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4082:01 Important: squid security update (Sep 30)
 

An update for squid is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-4080:01 Important: firefox security and bug fix update (Sep 30)
 

An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-4079:01 Important: qemu-kvm security update (Sep 30)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-4078:01 Important: qemu-kvm-ma security update (Sep 29)
 

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-4072:01 Moderate: libcroco security update (Sep 29)
 

An update for libcroco is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4076:01 Moderate: nss and nspr security, bug fix, (Sep 29)
 

An update for nss, nss-softokn, nss-util, and nspr is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-4003:01 Moderate: NetworkManager security and bug fix (Sep 29)
 

An update for NetworkManager is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-4005:01 Moderate: libxslt security update (Sep 29)
 

An update for libxslt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3940:01 Moderate: openwsman security update (Sep 29)
 

An update for openwsman is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3908:01 Moderate: cpio security update (Sep 29)
 

An update for cpio is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3906:01 Low: qemu-kvm security, bug fix, (Sep 29)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4031:01 Moderate: freerdp security, bug fix, (Sep 29)
 

An update for freerdp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3971:01 Low: hunspell security update (Sep 29)
 

An update for hunspell is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3877:01 Moderate: audiofile security update (Sep 29)
 

An update for audiofile is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3977:01 Low: evince and poppler security and bug fix (Sep 29)
 

An update for evince and poppler is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-4001:01 Moderate: bluez security update (Sep 29)
 

An update for bluez is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3949:01 Moderate: librabbitmq security update (Sep 29)
 

An update for librabbitmq is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3984:01 Moderate: freeradius security and bug fix update (Sep 29)
 

An update for freeradius is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3978:01 Moderate: glib2 and ibus security and bug fix (Sep 29)
 

An update for glib2 and ibus is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-3952:01 Moderate: expat security update (Sep 29)
 

An update for expat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4035:01 Moderate: webkitgtk4 security, bug fix, (Sep 29)
 

An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3907:01 Low: qemu-kvm-ma security update (Sep 29)
 

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4007:01 Low: systemd security and bug fix update (Sep 29)
 

An update for systemd is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3916:01 Moderate: curl security update (Sep 29)
 

An update for curl is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3944:01 Moderate: unoconv security update (Sep 29)
 

An update for unoconv is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4025:01 Moderate: qt5-qtbase security update (Sep 29)
 

An update for qt5-qtbase is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3973:01 Moderate: spamassassin security update (Sep 29)
 

An update for spamassassin is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4004:01 Important: tomcat security and bug fix update (Sep 29)
 

An update for tomcat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-3922:01 Low: libsndfile security update (Sep 29)
 

An update for libsndfile is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4060:01 Important: kernel security, bug fix, (Sep 29)
 

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-3878:01 Low: dnsmasq security and bug fix update (Sep 29)
 

An update for dnsmasq is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4032:01 Moderate: dbus security update (Sep 29)
 

An update for dbus is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4030:01 Low: exiv2 security update (Sep 29)
 

An update for exiv2 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3901:01 Low: libpng security update (Sep 29)
 

An update for libpng is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4026:01 Moderate: mariadb security and bug fix update (Sep 29)
 

An update for mariadb is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4000:01 Moderate: libvirt security and bug fix update (Sep 29)
 

An update for libvirt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3970:01 Low: mod_auth_openidc security update (Sep 29)
 

An update for mod_auth_openidc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-4039:01 Moderate: OpenEXR security update (Sep 29)
 

An update for OpenEXR is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3898:01 Moderate: cloud-init security, bug fix, (Sep 29)
 

An update for cloud-init is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3915:01 Moderate: libssh2 security update (Sep 29)
 

An update for libssh2 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3981:01 Moderate: samba security, bug fix, (Sep 29)
 

An update for samba is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3943:01 Low: libwmf security and bug fix update (Sep 29)
 

An update for libwmf is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3972:01 Moderate: subversion security update (Sep 29)
 

An update for subversion is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3902:01 Moderate: libtiff security update (Sep 29)
 

An update for libtiff is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4040:01 Moderate: libexif security, bug fix, (Sep 29)
 

An update for libexif is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4024:01 Moderate: okular security update (Sep 29)
 

An update for okular is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3888:01 Moderate: python3 security update (Sep 29)
 

An update for python3 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3887:01 Moderate: python-pillow security update (Sep 29)
 

An update for python-pillow is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  RedHat: RHSA-2020-3996:01 Moderate: libxml2 security and bug fix update (Sep 29)
 

An update for libxml2 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3936:01 Moderate: ipa security, bug fix, (Sep 29)
 

An update for ipa is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4041:01 Moderate: openldap security update (Sep 29)
 

An update for openldap is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3966:01 Moderate: fontforge security update (Sep 29)
 

An update for fontforge is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4011:01 Moderate: e2fsprogs security and bug fix update (Sep 29)
 

An update for e2fsprogs is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3958:01 Moderate: httpd security, bug fix, (Sep 29)
 

An update for httpd is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3911:01 Moderate: python security update (Sep 29)
 

An update for python is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3864:01 Moderate: cups security and bug fix update (Sep 29)
 

An update for cups is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3876:01 Moderate: libvpx security update (Sep 29)
 

An update for libvpx is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3868:01 Moderate: SDL security update (Sep 29)
 

An update for SDL is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3869:01 Low: pcp security, bug fix, and enhancement update (Sep 29)
 

An update for pcp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3848:01 Low: libmspack security update (Sep 29)
 

An update for libmspack is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3875:01 Moderate: tigervnc security and bug fix update (Sep 29)
 

An update for tigervnc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3873:01 Moderate: libsrtp security and bug fix update (Sep 29)
 

An update for libsrtp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-3861:01 Low: glibc security, bug fix, (Sep 29)
 

An update for glibc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from

  RedHat: RHSA-2020-4062:01 Important: kernel-rt security and bug fix update (Sep 29)
 

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-4053:01 Important: qemu-kvm security update (Sep 29)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4052:01 Important: qemu-kvm security update (Sep 29)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4059:01 Important: virt:rhel security update (Sep 29)
 

An update for the virt:rhel module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4047:01 Important: qemu-kvm-ma security update (Sep 29)
 

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4051:01 Important: qemu-kvm security update (Sep 29)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.

  RedHat: RHSA-2020-4050:01 Important: qemu-kvm security update (Sep 29)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.

  RedHat: RHSA-2020-4049:01 Important: virt:rhel security update (Sep 29)
 

An update for the virt:rhel module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4048:01 Important: qemu-kvm security update (Sep 29)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4055:01 Important: qemu-kvm security update (Sep 29)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4058:01 Important: virt:rhel security update (Sep 29)
 

An update for the virt:rhel module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-4054:01 Important: qemu-kvm security update (Sep 29)
 

An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3835:01 Important: firefox security update (Sep 24)
 

An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-3832:01 Important: firefox security update (Sep 24)
 

An update for firefox is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

  RedHat: RHSA-2020-3833:01 Important: firefox security update (Sep 24)
 

An update for firefox is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3836:01 Important: kernel security update (Sep 24)
 

An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  RedHat: RHSA-2020-3834:01 Important: firefox security update (Sep 24)
 

An update for firefox is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

  SUSE: 2020:2823-1 important: nodejs10 (Oct 1)
 

An update that solves two vulnerabilities and has one errata is now available.

  SUSE: 2020:2822-1 important: xen (Oct 1)
 

An update that fixes 12 vulnerabilities is now available.

  SUSE: 2020:2814-1 moderate: permissions (Oct 1)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:2812-1 important: nodejs12 (Oct 1)
 

An update that solves three vulnerabilities and has one errata is now available.

  SUSE: 2020:2813-1 important: nodejs12 (Oct 1)
 

An update that solves three vulnerabilities and has one errata is now available.

  SUSE: 2020:2807-1 moderate: aspell (Sep 30)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2806-1 moderate: tar (Sep 30)
 

An update that fixes two vulnerabilities is now available.

  SUSE: 2020:2800-1 critical: nodejs8 (Sep 30)
 

An update that solves four vulnerabilities and has two fixes is now available.

  SUSE: 2020:2788-1 important: xen (Sep 29)
 

An update that solves 11 vulnerabilities and has one errata is now available.

  SUSE: 2020:2790-1 important: xen (Sep 29)
 

An update that solves 10 vulnerabilities and has one errata is now available.

  SUSE: 2020:2785-1 moderate: pdns (Sep 29)
 

An update that fixes one vulnerability, contains one feature is now available.

  SUSE: 2020:2787-1 important: xen (Sep 29)
 

An update that fixes 9 vulnerabilities is now available.

  SUSE: 2020:2792-1 moderate: bcm43xx-firmware (Sep 29)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:2791-1 important: xen (Sep 29)
 

An update that solves 10 vulnerabilities and has one errata is now available.

  SUSE: 2020:2786-1 important: xen (Sep 29)
 

An update that solves 10 vulnerabilities and has one errata is now available.

  SUSE: 2020:2789-1 important: xen (Sep 29)
 

An update that fixes 8 vulnerabilities is now available.

  SUSE: 2020:2784-1 moderate: python-pip (Sep 29)
 

An update that fixes one vulnerability, contains one feature is now available.

  SUSE: 2020:2776-1 moderate: go1.15 (Sep 29)
 

An update that solves one vulnerability, contains one feature and has two fixes is now available.

  SUSE: 2020:14502-1 important: MozillaFirefox (Sep 28)
 

An update that fixes four vulnerabilities is now available.

  SUSE: 2020:2770-1 critical: dpdk (Sep 28)
 

An update that fixes 5 vulnerabilities is now available.

  SUSE: 2020:2767-1 critical: dpdk (Sep 28)
 

An update that fixes 5 vulnerabilities is now available.

  SUSE: 2020:2769-1 critical: dpdk (Sep 28)
 

An update that fixes 5 vulnerabilities is now available.

  SUSE: 2020:2768-1 critical: dpdk (Sep 28)
 

An update that fixes 5 vulnerabilities is now available.

  SUSE: 2020:2760-1 important: libqt5-qtbase (Sep 28)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:2761-1 moderate: go1.14 (Sep 28)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:2759-1 important: MozillaFirefox (Sep 26)
 

An update that fixes four vulnerabilities is now available.

  SUSE: 2020:2751-1 important: libqt5-qtbase (Sep 25)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:2748-1 important: libqt5-qtbase (Sep 25)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:2749-1 important: MozillaFirefox (Sep 25)
 

An update that fixes 7 vulnerabilities is now available.

  SUSE: 2020:2747-1 important: MozillaFirefox (Sep 25)
 

An update that fixes four vulnerabilities is now available.

  SUSE: 2020:2750-1 moderate: ImageMagick (Sep 25)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2743-1 important: qemu (Sep 24)
 

An update that fixes four vulnerabilities is now available.

  SUSE: 2020:2744-1 moderate: tiff (Sep 24)
 

An update that fixes one vulnerability is now available.

  SUSE: 2020:2742-1 important: libqt5-qtbase (Sep 24)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:2741-1 important: libqt5-qtbase (Sep 24)
 

An update that solves one vulnerability and has one errata is now available.

  SUSE: 2020:2733-1 moderate: bcm43xx-firmware (Sep 24)
 

An update that contains security fixes can now be installed.

  SUSE: 2020:2731-1 moderate: conmon, fuse-overlayfs, libcontainers-common, podman (Sep 24)
 

An update that solves one vulnerability, contains one feature and has 6 fixes is now available.

  Ubuntu 4563-1: NTP vulnerability (Oct 1)
 

NTP could be made to crash.

  Ubuntu 4562-1: kramdown vulnerability (Sep 30)
 

kramdown could be made to crash, run programs, or leak sensitive information if it opened a specially crafted file.

  Ubuntu 4561-1: Rack vulnerabilities (Sep 30)
 

Rack could be made to expose sensitive information over the network.

  Ubuntu 4560-1: Gon gem vulnerability (Sep 30)
 

Gon gem could be made to run programs if it received specially crafted network traffic.

  Ubuntu 4559-1: Samba update (Sep 30)
 

Several security improvements were added to Samba.

  Ubuntu 4557-1: Tomcat vulnerabilities (Sep 30)
 

Several security issues were fixed in Tomcat.

  Ubuntu 4558-1: libapreq2 vulnerabilities (Sep 30)
 

libapreq2 could be made to crash if it received specially crafted network traffic.

  Ubuntu 4556-1: netqmail vulnerabilities (Sep 29)
 

netqmail could be made to crash or run programs as any user (except root) if it received specially crafted network traffic.

  Ubuntu 4547-2: SSVNC vulnerabilities (Sep 28)
 

Several security issues were fixed in SSVNC.

  Ubuntu 4554-1: libPGF vulnerability (Sep 28)
 

libPGF could be made to crash if it opened a specially crafted file.

  Ubuntu 4551-1: Squid vulnerabilities (Sep 28)
 

Several security issues were fixed in Squid.

  Ubuntu 4550-1: DPDK vulnerabilities (Sep 28)
 

Several security issues were fixed in DPDK.

  Ubuntu 4552-1: Pam-python vulnerability (Sep 28)
 

Pam-python could be made to crash or run programs as an administrator if certain environment variables are set.

  Ubuntu 4553-1: Teeworlds vulnerability (Sep 28)
 

Teeworlds could be made to crash if it received specially crafted network traffic.

  Ubuntu 4547-1: iTALC vulnerabilities (Sep 28)
 

Several security issues were fixed in iTALC.

  Ubuntu 4548-1: libuv vulnerability (Sep 28)
 

libuv could be made to crash or execute arbitrary code if it received a specially crafted path.

  Ubuntu 4549-1: ImageMagick vulnerabilities (Sep 28)
 

ImageMagick could be made to crash if it opened a specially crafted file.

  Ubuntu 3968-3: Sudo vulnerabilities (Sep 28)
 

Several security issues were fixed in Sudo.

  Ubuntu 4546-1: Firefox vulnerabilities (Sep 28)
 

Firefox could be made to crash or run programs as your login if it opened a malicious website.

  Ubuntu 4545-1: libquicktime vulnerabilities (Sep 25)
 

Several security issues were fixed in libquicktime.

  Ubuntu 4541-1: Gnuplot vulnerabilities (Sep 25)
 

Several security issues were fixed in Gnuplot.

  Ubuntu 4543-1: Sanitize vulnerability (Sep 25)
 

Sanitize could be made to perform XSS attacks if it received specially crafted input.

  Ubuntu 4542-1: MiniUPnPd vulnerabilities (Sep 25)
 

Several security issues were fixed in MiniUPnPd.

  Ubuntu 4540-1: atftpd vulnerabilities (Sep 24)
 

Several security issues were fixed in atftpd.

  Ubuntu 4539-1: AWL vulnerability (Sep 24)
 

DAViCal Andrew's Web Libraries could be made to run programs as your login if it received specially crafted input.

  Ubuntu 4536-1: SPIP vulnerabilities (Sep 24)
 

Several security issues were fixed in SPIP.

  Ubuntu 4538-1: PackageKit vulnerabilities (Sep 24)
 

Several security issues were fixed in PackageKit.

  Ubuntu 4537-1: Aptdaemon vulnerability (Sep 24)
 

Aptdaemon could be made to expose sensitive information.

  Debian LTS: DLA-2392-1: jruby security update (Oct 1)
 

A potential HTTP request smuggling vulnerability in WEBrick was reported. WEBrick (bundled along with jruby) was too tolerant against

  Debian LTS: DLA-2391-1: ruby2.3 security update (Oct 1)
 

A potential HTTP request smuggling vulnerability in WEBrick was reported. WEBrick (bundled along with ruby2.3) was too tolerant against

  Debian LTS: DLA-2390-1: ruby-json-jwt security update (Oct 1)
 

The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string. Therefore, there was a need to explicitly specify the number

  Debian LTS: DLA-2389-1: ruby-rack-cors security update (Oct 1)
 

This package allowed ../ directory traversal to access private resources because resource matching did not ensure that pathnames were in a canonical format.

  Debian LTS: DLA-2387-2: firefox-esr regression update (Sep 29)
 

This update fixes a problem that caused Firefox to fail to build on the arm64 and armhf architectures. For Debian 9 stretch, this problem has been fixed in version

  Debian LTS: DLA-2388-1: nss security update (Sep 29)
 

Various vulnerabilities were fixed in nss, the Network Security Service libraries. CVE-2018-12404

  Debian LTS: DLA-2387-1: firefox-esr security update (Sep 28)
 

Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, cross-site scripting or spoofing the origin of a download.

  Debian LTS: DLA-2386-1: libdbi-perl security update (Sep 28)
 

Several vulnerabilities were discovered in the Perl5 Database Interface (DBI). An attacker could trigger a denial-of-service (DoS) and possibly execute arbitrary code.

  Debian LTS: DLA-2385-1: linux-4.19 security update (Sep 28)
 

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, or information leak.

  Debian LTS: DLA-2377-1: qt4-x11 security update (Sep 28)
 

Several vulnerabilities were fixed in qt4-x11, the legacy version of the Qt toolkit. CVE-2018-15518

  Debian LTS: DLA-2376-1: qtbase-opensource-src security update (Sep 28)
 

Several vulnerabilities were fixed in the Qt toolkit. CVE-2018-19872

  Debian LTS: DLA-2384-1: yaws security update (Sep 26)
 

Two issues have been found in yaws, a high performance HTTP 1.1 webserver written in Erlang.

  Debian LTS: DLA-2383-1: nfdump security update (Sep 26)
 

Two issues have been found in nfdump, a netflow capture daemon. Both issues are related to either a buffer overflow or an integer overflow, which could result in a denial of service or a local code

  Debian LTS: DLA-2382-1: curl security update (Sep 26)
 

An issue has been found in curl, a command line tool for transferring data with URL syntax. In rare circumstances, when using the multi API of curl in combination

  ArchLinux: 202009-11: podman: information disclosure (Sep 29)
 

The package podman before version 2.1.0-1 is vulnerable to information disclosure.

  ArchLinux: 202009-10: firefox: multiple issues (Sep 29)
 

The package firefox before version 81.0-1 is vulnerable to multiple issues including arbitrary code execution, content spoofing, cross-site scripting and denial of service.

  ArchLinux: 202009-9: chromium: multiple issues (Sep 29)
 

The package chromium before version 85.0.4183.121-1 is vulnerable to multiple issues including access restriction bypass, arbitrary code execution, information disclosure and insufficient validation.

  ArchLinux: 202009-8: libvirt: privilege escalation (Sep 29)
 

The package libvirt before version 6.5.0-2 is vulnerable to privilege escalation.

  openSUSE: 2020:1587-1: moderate: go1.14 (Oct 1)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:1586-1: important: the Linux Kernel (Oct 1)
 

An update that solves 9 vulnerabilities and has 103 fixes is now available.

  openSUSE: 2020:1584-1: moderate: go1.14 (Oct 1)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:1579-1: moderate: cifs-utils (Sep 30)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:1578-1: moderate: brotli (Sep 29)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1575-1: important: rubygem-actionpack-5_1 (Sep 29)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1574-1: important: MozillaFirefox (Sep 29)
 

An update that fixes four vulnerabilities is now available.

  openSUSE: 2020:1568-1: important: libqt5-qtbase (Sep 28)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:1564-1: important: libqt5-qtbase (Sep 28)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:1559-1: moderate: conmon, fuse-overlayfs, libcontainers-common, podman (Sep 28)
 

An update that solves one vulnerability and has 6 fixes is now available.

  openSUSE: 2020:1561-1: moderate: tiff (Sep 28)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1560-1: moderate: bcm43xx-firmware (Sep 28)
 

An update that contains security fixes can now be installed.

  openSUSE: 2020:1556-1: moderate: pdns (Sep 28)
 

An update that solves one vulnerability and has two fixes is now available.

  openSUSE: 2020:1556-1: moderate: pdns (Sep 28)
 

An update that solves one vulnerability and has two fixes is now available.

  openSUSE: 2020:1555-1: important: MozillaFirefox (Sep 27)
 

An update that fixes four vulnerabilities is now available.

  openSUSE: 2020:1552-1: moderate: conmon, fuse-overlayfs, libcontainers-common, podman (Sep 27)
 

An update that solves one vulnerability and has 6 fixes is now available.

  openSUSE: 2020:1550-1: important: chromium (Sep 27)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2020:1542-1: important: chromium (Sep 26)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2020:1539-1: moderate: openldap2 (Sep 26)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1536-1: important: rubygem-actionpack-5_1 (Sep 26)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1534-1: moderate: openldap2 (Sep 26)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1535-1: moderate: ovmf (Sep 26)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:1530-1: moderate: libqt4 (Sep 25)
 

An update that solves four vulnerabilities and has one errata is now available.

  openSUSE: 2020:1533-1: important: rubygem-actionpack-5_1 (Sep 25)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1529-1: moderate: singularity (Sep 25)
 

An update that fixes two vulnerabilities is now available.

  openSUSE: 2020:1527-1: important: chromium (Sep 25)
 

An update that fixes 7 vulnerabilities is now available.

  openSUSE: 2020:1526-1: important: samba (Sep 25)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1523-1: moderate: jasper (Sep 25)
 

An update that fixes 14 vulnerabilities is now available.

  openSUSE: 2020:1525-1: moderate: ovmf (Sep 25)
 

An update that solves one vulnerability and has one errata is now available.

  openSUSE: 2020:1516-1: moderate: roundcubemail (Sep 24)
 

An update that solves 6 vulnerabilities and has two fixes is now available.

  openSUSE: 2020:1517-1: moderate: jasper (Sep 24)
 

An update that fixes 14 vulnerabilities is now available.

  openSUSE: 2020:1514-1: important: chromium (Sep 24)
 

An update that fixes 19 vulnerabilities is now available.

  openSUSE: 2020:1513-1: important: samba (Sep 24)
 

An update that fixes one vulnerability is now available.

  openSUSE: 2020:1511-1: important: virtualbox (Sep 24)
 

An update that fixes 25 vulnerabilities is now available.

  Mageia 2020-0381: mediawiki security update (Sep 30)
 

Multiple security issues were discovered in MediaWiki: SpecialUserRights could leak whether a user existed or not, multiple code paths lacked HTML sanitisation allowing for cross-site scripting and TOTP validation applied insufficient rate limiting against brute force attempts (CVE-2020-25812, CVE-2020-25813, CVE-2020-25814, CVE-2020-25815, CVE-2020-25827,

  Mageia 2020-0380: samba security update (Sep 30)
 

When Samba is used as a domain controller, an unauthenticated attacker on the network can gain administrator access by exploiting a netlogon protocol flaw (CVE-2020-1472). Note that Samba installations are not vulnerable unless they have the smb.conf

  Mageia 2020-0379: gnutls security update (Sep 30)
 

An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure (CVE-2020-24659).

  Mageia 2020-0378: Thunderbird security update (Sep 30)
 

AppCache manifest poisoning due to url encoded character processing (CVE-2020-12415). Use-after-free in WebRTC VideoBroadcaster (CVE-2020-12416).

  Mageia 2020-0377: firefox security update (Sep 30)
 

Mozilla developer Jason Kratzer reported memory safety bugs present in Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2020-15673).

  Mageia 2020-0376: cifs-utils security update (Sep 27)
 

The mount.cifs utility has a shell injection issue where one can embed shell commands via the username mount option. Those commands will be run via popen() in the context of the user calling mount (CVE-2020-14342). References:

  Mageia 2020-0375: pdns security update (Sep 27)
 

An issue has been found in PowerDNS Authoritative Server before 4.3.1 where an authorized user with the ability to insert crafted records into a zone might be able to leak the content of uninitialized memory. Such a user could be a customer inserting data via a control panel, or somebody with access to the REST API. Crafted records cannot be inserted via AXFR (CVE-2020-17482).

  Mageia 2020-0374: novnc security update (Sep 27)
 

An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name. (CVE-2017-18635) References:

  Mageia 2020-0373: libproxy security update (Sep 27)
 

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion. (CVE-2020-25219)

  Mageia 2020-0372: nodejs security update (Sep 27)
 

The nodejs package has been updated to the latest version in the 10.x branch, which is 10.22.1 at this time. It fixes several security issues and other bugs. See the upstream changelog and advisories for details. References:

  Mageia 2020-0371: kio-extras security update (Sep 27)
 

fishProtocol::establishConnection in fish/fish.cpp in KDE kio-extras through 20.04.0 makes a cacheAuthentication call even if the user had not set the keepPassword option. This may lead to unintended KWallet storage of the password (CVE-2020-12755).

  Mageia 2020-0370: mbedtls security update (Sep 27)
 

mbedtls 2.16.8 fixes three security vulnerabilities which could affect earlier releases: Local side channel attack on classical CBC decryption in (D)TLS (CVE-2020-16150).