Red Hat Updates
2736Warning Date
Severity Level
Warning Number
Target Sector
23 July, 2020
● High
2020-1538
All
Description:
Red Hat has released security updates to address vulnerabilities in the following products:
- openstack-keystone
- Red Hat OpenStack 10 x86_64
- java-11-openjdk
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.0 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
- java-1.8.0-openjdk
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.0 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
- openstack-keystone
- Red Hat OpenStack 15 x86_64
- Red Hat OpenStack for IBM Power 15 ppc64le
- Red Hat OpenStack 16 for RHEL 8 x86_64
- Red Hat OpenStack for IBM Power 16 ppc64le
- samba
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 8 x86_64
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Unauthorized modification
- Bypass of a protection mechanism
- Buffer overflow
Best practice and Recommendations:
The CERT team encourages users to review Red Hat security advisory and apply the necessary updates:
- https://access.redhat.com/errata/RHSA-2020:3096
- https://access.redhat.com/errata/RHSA-2020:3098
- https://access.redhat.com/errata/RHSA-2020:3099
- https://access.redhat.com/errata/RHSA-2020:3100
- https://access.redhat.com/errata/RHSA-2020:3101
- https://access.redhat.com/errata/RHSA-2020:3102
- https://access.redhat.com/errata/RHSA-2020:3105
- https://access.redhat.com/errata/RHSA-2020:3118
- https://access.redhat.com/errata/RHSA-2020:3119