Red Hat Updates
2579Warning Date
Severity Level
Warning Number
Target Sector
20 April, 2020
● Medium
2020-1159
All
Description:
Red Hat has released security updates to address multiple vulnerabilities in the following products:
- tigervnc
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
- thunderbird
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.0 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.0 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat Enterprise Linux for Power, little endian 7 ppc64le
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- kernel-alt
- Red Hat Enterprise Linux for ARM 64 7 aarch64
- Red Hat Enterprise Linux for Power 9 7 ppc64le
- Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x
- chromium-browser
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- ipmitool
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5 ppc64
- Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5 ppc64le
- Red Hat JBoss Enterprise Application Platform
- JBoss Enterprise Application Platform Text-Only Advisories x86_64
- Red Hat CodeReady Workspaces 2.1.0 release
- Red Hat Developer Tools (for RHEL Server) 1 x86_64
Threats:
An attacker could exploit these vulnerabilities by doing the following:
- Executing arbitrary code
- Heap buffer overflow
- Stack buffer overflow
- Buffer overflow
- Denial of Service (DoS)
- Bypass security restrictions
Best practice and Recommendations:
The CERT team encourages users to review Red Hat security advisory and apply the necessary updates:
- https://access.redhat.com/errata/RHSA-2020:1497
- https://access.redhat.com/errata/RHSA-2020:1496
- https://access.redhat.com/errata/RHSA-2020:1495
- https://access.redhat.com/errata/RHSA-2020:1493
- https://access.redhat.com/errata/RHSA-2020:1489
- https://access.redhat.com/errata/RHSA-2020:1488
- https://access.redhat.com/errata/RHSA-2020:1487
- https://access.redhat.com/errata/RHSA-2020:1486
- https://access.redhat.com/errata/RHSA-2020:1479
- https://access.redhat.com/errata/RHSA-2020:1478
- https://access.redhat.com/errata/RHSA-2020:1475