Your review has been sent successfully

Red Hat Updates

1892
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

18 August, 2020

● High

2020-1650

All

Description:

Red Hat has released security updates to address vulnerabilities in the following products:

  • libvncserver
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
    • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64
    • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le
    • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.1 s390x
    • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64
  • Red Hat JBoss Enterprise Application Platform 7.3.2
    • JBoss Enterprise Application Platform 7.3 for RHEL 6 x86_64
  • Red Hat JBoss Enterprise Application Platform 7.3.2
    • JBoss Enterprise Application Platform 7.3 for RHEL 7 x86_64
  • Red Hat JBoss Enterprise Application Platform 7.3.2
    • JBoss Enterprise Application Platform 7.3 for RHEL 7 x86_64
    • JBoss Enterprise Application Platform 7.3 for RHEL 8 x86_64
    • JBoss Enterprise Application Platform Text-Only Advisories x86_64
  • OpenShift Container Platform 4.5.6
    • Red Hat OpenShift Container Platform 4.5 for RHEL 7 x86_64
    • Red Hat OpenShift Container Platform for Power 4.5 for RHEL 7 ppc64le
    • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.5 for RHEL 7 s390x

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Cross-site scripting (XSS)
  • Bypass of a protection mechanism
  • Unauthorized disclosure of information

Best practice and Recommendations:

The CERT team encourages users to review Red Hat security advisory and apply the necessary updates:

Last updated at 18 August, 2020

Rate the content

rate-icon
up icon