تحديثات Red Hat
3819تاريخ التحذير
مستوى الخطورة
رقم التحذير
القطاع المستهدف
19 يناير, 2020
● عالٍ جدًا
2020-816
الكل
الوصف:
أصدرت Red Hat عدّة تحديثات لمعالجة عددًا من الثغرات في المنتجات التالية:
- Red Hat Enterprise Linux Server 7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Workstation 7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Desktop 7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux for Power, little endian 7 ppc64le
- thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server - TUS 7.7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64
- java-11-openjdk
- git
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64
- java-11-openjdk
- git
- Red Hat Enterprise Linux for Power, big endian 7 ppc64
- java-11-openjdk
- git
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x
- java-11-openjdk
- git
- Red Hat Enterprise Linux for IBM z Systems 7 s390x
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server 6 x86_64
- thunderbird
- Red Hat Enterprise Linux Server 6 i386
- thunderbird
- Red Hat Enterprise Linux Workstation 6 x86_64
- thunderbird
- Red Hat Enterprise Linux Workstation 6 i386
- thunderbird
- Red Hat Enterprise Linux Desktop 6 x86_64
- thunderbird
- Red Hat Enterprise Linux Desktop 6 i386
- thunderbird
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- thunderbird
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- thunderbird
- Red Hat Enterprise Linux for Scientific Computing 7 x86_64
- git
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Thunderbird
- java-11-openjdk
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
- Thunderbird
- java-11-openjdk
- .NET Core
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Thunderbird
- java-11-openjdk
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
- Thunderbird
- java-11-openjdk
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
- Thunderbird
- java-11-openjdk
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
- Thunderbird
- java-11-openjdk
- .NET Core
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- java-11-openjdk
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
- java-11-openjdk
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- java-11-openjdk
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
- java-11-openjdk
- Red Hat Enterprise Linux for x86_64 8 x86_64
- .NET Core
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
- .NET Core
- Red Hat JBoss Middleware Text-Only Advisories for MIDDLEWARE 1 x86_64
- Red Hat Process Automation Manager 7.6.0
- dotNET on RHEL (for RHEL Server) 1 x86_64
- .NET Core
- dotNET on RHEL (for RHEL Workstation) 1 x86_64
- .NET Core
- dotNET on RHEL (for RHEL Compute Node) 1 x86_64
- .NET Core
التهديدات:
يمكن للمهاجم استغلال الثغرات وتنفيذ ما يلي:
- هجمة حجب الخدمة (DoS attack).
- أعطال بالذاكرة.
- هجمة البرمجة عبر المواقع (Cross-site scripting (XSS)).
- تنفيذ برمجيات الخبيثة عن بعد.
الإجراءات الوقائية:
يوصي المركز بتحديث المنتجات المتأثرة، حيث أصدرت Red Hat توضيحًا لهذه التحديثات:
https://access.redhat.com/errata/RHSA-2020:0120
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0123
https://access.redhat.com/errata/RHSA-2020:0124
https://access.redhat.com/errata/RHSA-2020:0127
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0130
https://access.redhat.com/errata/RHSA-2020:0132