Red Hat Updates
1647Warning Date
Severity Level
Warning Number
Target Sector
17 December, 2020
● High
2020-2222
All
Description:
Red Hat has released security updates to address multiple vulnerabilities in the following products:
- Red Hat build of Thorntail 2.7.2
- Red Hat Openshift Application Runtimes Text-Only Advisories x86_64
- firefox
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat Enterprise Linux for IBM z Systems 7 s390x
- Red Hat Enterprise Linux for Power, big endian 7 ppc64
- Red Hat Enterprise Linux for Power, little endian 7 ppc64le
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.0 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.0 x86_64
- Red Hat Fuse 7.8.0
- Red Hat JBoss Middleware Text-Only Advisories for MIDDLEWARE 1 x86_64
- python-XStatic
- Red Hat OpenStack 13 x86_64
- Red Hat OpenStack for IBM Power 13 ppc64le
- memcached
- Red Hat OpenStack 13 x86_64
- Red Hat OpenStack for IBM Power 13 ppc64le
- java-1.8.0-ibm
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat Enterprise Linux for IBM z Systems 7 s390x
- Red Hat Enterprise Linux for Power, big endian 7 ppc64
- Red Hat Enterprise Linux for Scientific Computing 7 x86_64
- Red Hat Enterprise Linux for Power, little endian 7 ppc64le
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat Enterprise Linux for IBM z Systems 7 s390x
- Red Hat Enterprise Linux for Power, big endian 7 ppc64
- Red Hat Enterprise Linux for Scientific Computing 7 x86_64
- Red Hat Enterprise Linux for Power, little endian 7 ppc64le
- openssl
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.0 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.0 x86_64
- web-admin-build
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
- Red Hat Gluster Storage Web Administration (for RHEL Server) 3.1 x86_64
- Red Hat OpenShift Container Platform 3.11 x86_64
- Red Hat OpenShift Container Platform for Power 3.11 ppc64le
- Red Hat OpenShift Container Storage 4 x86_64
- Red Hat OpenShift Container Storage 4 x86_64
- Red Hat OpenShift Container Storage for IBM Power, little endian 4 ppc64le
- Red Hat OpenShift Container Storage for IBM Z and LinuxONE 4 s390x
Threats:
An attacker could exploit these vulnerabilities by doing the following:
- Buffer overflow
- Denial of service (DoS)
- Cross-site scripting (XSS) attack
- SQL injection
- Information disclosure
- Elevate privileges
- Execute arbitrary code
Best practice and Recommendations:
The CERT team encourages users to review Red Hat security advisory and apply the necessary updates:
- https://access.redhat.com/errata/RHSA-2020:5361
- https://access.redhat.com/errata/RHSA-2020:5561
- https://access.redhat.com/errata/RHSA-2020:5562
- https://access.redhat.com/errata/RHSA-2020:5563
- https://access.redhat.com/errata/RHSA-2020:5564
- https://access.redhat.com/errata/RHSA-2020:5565
- https://access.redhat.com/errata/RHSA-2020:5568
- https://access.redhat.com/errata/RHSA-2020:5363
- https://access.redhat.com/errata/RHSA-2020:5581
- https://access.redhat.com/errata/RHSA-2020:5583
- https://access.redhat.com/errata/RHSA-2020:5585
- https://access.redhat.com/errata/RHSA-2020:5586
- https://access.redhat.com/errata/RHSA-2020:5588
- https://access.redhat.com/errata/RHSA-2020:5599
- https://access.redhat.com/errata/RHSA-2020:5605
- https://access.redhat.com/errata/RHSA-2020:5606