Your review has been sent successfully

Red Hat Updates

2834
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

1 October, 2020

● High

2020-1864

All

Description:

Red Hat has released security updates to address several vulnerabilities in the following products:

  • Red Hat Virtualization Manager 4.3 x86_64
  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization Host 4 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
  • Red Hat Satellite 6.7 x86_64
  • Red Hat Satellite Capsule 6.7 x86_64
  • Red Hat OpenShift Service Mesh 1.1 for RHEL 8 x86_64
  • Red Hat CloudForms 5.0 x86_64
  • Red Hat Ansible Automation Platform 1.1 x86_64
  • Red Hat Ansible Automation Platform 1.0 x86_64
  • Red Hat OpenShift Container Platform 4.5 for RHEL 7 x86_64
  • Red Hat OpenShift Container Platform for Power 4.5 for RHEL 7 ppc64le
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.5 for RHEL 7 s390x
  • Red Hat OpenShift Container Platform 4.5 for RHEL 7 x86_64
  • Red Hat OpenShift Container Platform for Power 4.5 for RHEL 7 ppc64le
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.5 for RHEL 7 s390x
  • squid
    • Red Hat Enterprise Linux Server 7 x86_64
    • Red Hat Enterprise Linux Workstation 7 x86_64
    • Red Hat Enterprise Linux for IBM z Systems 7 s390x
    • Red Hat Enterprise Linux for Power, big endian 7 ppc64
    • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • qemu-kvm-rhev
    • Red Hat Virtualization Manager 4.3 x86_64
    • Red Hat Virtualization 4 for RHEL 7 x86_64
    • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
  • OCS 3.11.z async
    • Red Hat Enterprise Linux Server 7 x86_64
    • Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Cross-site scripting (XSS) attack.
  • Man in the middle attack.
  • Execute arbitrary code

Best practice and Recommendations:

The CERT team encourages users to review Red Hat security advisory and apply the necessary updates:

Last updated at 1 October, 2020

Rate the content

rate-icon
up icon