Security Alerts

Your review has been sent successfully
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Red Hat Updates

258

Warning Date: 1 March, 2020

Severity Level ● High

Warning Number: 2020-978

Target Sector: All

Description:

Red Hat has released security updates to address vulnerabilities in the following products:

  • jenkins-slave-base-rhel7-container
    • Red Hat OpenShift Container Platform 4.2 for RHEL 7 x86_64
  • ppp
    • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64
    • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
    • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.1 s390x
    • Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
    • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le
    • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
    • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64
    • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
    • Red Hat Enterprise Linux Desktop 6 i386
    • Red Hat Enterprise Linux Desktop 6 x86_64
    • Red Hat Enterprise Linux Desktop 7 x86_64
    • Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64
    • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    • Red Hat Enterprise Linux for ARM 64 8 aarch64
    • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x
    • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
    • Red Hat Enterprise Linux for IBM z Systems 6 s390x
    • Red Hat Enterprise Linux for IBM z Systems 7 s390x
    • Red Hat Enterprise Linux for IBM z Systems 8 s390x
    • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64
    • Red Hat Enterprise Linux for Power, big endian 6 ppc64
    • Red Hat Enterprise Linux for Power, big endian 7 ppc64
    • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le
    • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
    • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
    • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    • Red Hat Enterprise Linux for x86_64 8 x86_64
    • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
    • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
    • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64
    • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
    • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.0 x86_64
    • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le
    • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.0 ppc64le
    • Red Hat Enterprise Linux Server 6 i386
    • Red Hat Enterprise Linux Server 6 x86_64
    • Red Hat Enterprise Linux Server 7 x86_64
    • Red Hat Enterprise Linux Workstation 6 i386
    • Red Hat Enterprise Linux Workstation 6 x86_64
    • Red Hat Enterprise Linux Workstation 7 x86_64
  • java-1.7.0-openjdk
    • Red Hat Enterprise Linux Server 6 x86_64
    • Red Hat Enterprise Linux Server 6 i386
    • Red Hat Enterprise Linux Workstation 6 x86_64
    • Red Hat Enterprise Linux Workstation 6 i386
    • Red Hat Enterprise Linux Desktop 6 x86_64
    • Red Hat Enterprise Linux Desktop 6 i386
    • Red Hat Enterprise Linux for Scientific Computing 6 x86_64

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Escalation of privilege
  • Buffer overflow
  • Denial of service attack (DoS)

Best practice and Recommendations:

The CERT team encourages users to review Red Hat security advisory and apply the necessary updates:

Last updated at 1 March, 2020

Rate the content

rate-icon
up icon