Red Hat Updates
3818Warning Date
Severity Level
Warning Number
Target Sector
19 January, 2020
● Critical
2020-816
All
Description:
Red Hat has released security updates to address multiple vulnerabilities in the following products:
- Red Hat Enterprise Linux Server 7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Workstation 7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Desktop 7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux for Power, little endian 7 ppc64le
- thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server - TUS 7.7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64
- Thunderbird
- java-11-openjdk
- git
- Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64
- java-11-openjdk
- git
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64
- java-11-openjdk
- git
- Red Hat Enterprise Linux for Power, big endian 7 ppc64
- java-11-openjdk
- git
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x
- java-11-openjdk
- git
- Red Hat Enterprise Linux for IBM z Systems 7 s390x
- java-11-openjdk
- git
- Red Hat Enterprise Linux Server 6 x86_64
- thunderbird
- Red Hat Enterprise Linux Server 6 i386
- thunderbird
- Red Hat Enterprise Linux Workstation 6 x86_64
- thunderbird
- Red Hat Enterprise Linux Workstation 6 i386
- thunderbird
- Red Hat Enterprise Linux Desktop 6 x86_64
- thunderbird
- Red Hat Enterprise Linux Desktop 6 i386
- thunderbird
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- thunderbird
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- thunderbird
- Red Hat Enterprise Linux for Scientific Computing 7 x86_64
- git
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Thunderbird
- java-11-openjdk
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
- Thunderbird
- java-11-openjdk
- .NET Core
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Thunderbird
- java-11-openjdk
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
- Thunderbird
- java-11-openjdk
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
- Thunderbird
- java-11-openjdk
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
- Thunderbird
- java-11-openjdk
- .NET Core
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- java-11-openjdk
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
- java-11-openjdk
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- java-11-openjdk
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
- java-11-openjdk
- Red Hat Enterprise Linux for x86_64 8 x86_64
- .NET Core
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
- .NET Core
- Red Hat JBoss Middleware Text-Only Advisories for MIDDLEWARE 1 x86_64
- Red Hat Process Automation Manager 7.6.0
- dotNET on RHEL (for RHEL Server) 1 x86_64
- .NET Core
- dotNET on RHEL (for RHEL Workstation) 1 x86_64
- .NET Core
- dotNET on RHEL (for RHEL Compute Node) 1 x86_64
- .NET Core
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Denial of service (DoS) attack.
- Memory corruption.
- Cross-site scripting (XSS) attack.
- Remote code execution.
Best practice and Recommendations:
The CERT team encourages users to review Red Hat security advisory and apply the necessary updates:
https://access.redhat.com/errata/RHSA-2020:0120
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0123
https://access.redhat.com/errata/RHSA-2020:0124
https://access.redhat.com/errata/RHSA-2020:0127
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0130
https://access.redhat.com/errata/RHSA-2020:0132