Your review has been sent successfully

Red Hat Updates

2579
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

20 April, 2020

● Medium

2020-1159

All

Description:

Red Hat has released security updates to address multiple vulnerabilities in the following products:

  • tigervnc
    • Red Hat Enterprise Linux for x86_64 8 x86_64
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    • Red Hat Enterprise Linux for IBM z Systems 8 s390x
    • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
    • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    • Red Hat Enterprise Linux for ARM 64 8 aarch64
    • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
  • thunderbird
    • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.0 ppc64le
    • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.0 x86_64
    • Red Hat Enterprise Linux for x86_64 8 x86_64
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
    • Red Hat Enterprise Linux Server 7 x86_64
    • Red Hat Enterprise Linux Workstation 7 x86_64
    • Red Hat Enterprise Linux Desktop 7 x86_64
    • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
    • Red Hat Enterprise Linux Server 6 x86_64
    • Red Hat Enterprise Linux Server 6 i386
    • Red Hat Enterprise Linux Workstation 6 x86_64
    • Red Hat Enterprise Linux Workstation 6 i386
    • Red Hat Enterprise Linux Desktop 6 x86_64
    • Red Hat Enterprise Linux Desktop 6 i386
    • Red Hat Enterprise Linux for IBM z Systems 6 s390x
    • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • kernel-alt
    • Red Hat Enterprise Linux for ARM 64 7 aarch64
    • Red Hat Enterprise Linux for Power 9 7 ppc64le
    • Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x
  • chromium-browser
    • Red Hat Enterprise Linux Server 6 x86_64
    • Red Hat Enterprise Linux Server 6 i386
    • Red Hat Enterprise Linux Workstation 6 x86_64
    • Red Hat Enterprise Linux Workstation 6 i386
    • Red Hat Enterprise Linux Desktop 6 x86_64
    • Red Hat Enterprise Linux Desktop 6 i386
    • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • ipmitool
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5 x86_64
    • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5 s390x
    • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5 ppc64
    • Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64
    • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5 ppc64le
  • Red Hat JBoss Enterprise Application Platform
    • JBoss Enterprise Application Platform Text-Only Advisories x86_64
  • Red Hat CodeReady Workspaces 2.1.0 release
    • Red Hat Developer Tools (for RHEL Server) 1 x86_64

Threats:

An attacker could exploit these vulnerabilities by doing the following:

  • Executing arbitrary code
  • Heap buffer overflow
  • Stack buffer overflow
  • Buffer overflow
  • Denial of Service (DoS)
  • Bypass security restrictions

Best practice and Recommendations:

The CERT team encourages users to review Red Hat security advisory and apply the necessary updates:

Last updated at 20 April, 2020

Rate the content

rate-icon
up icon