Your review has been sent successfully

Red Hat Alert

2289
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

7 September, 2022

● High

2022-5202

All

Description:

Red Hat has released security updates to address several vulnerabilities in the following products:

  • open-vm-tools
    • Red Hat Enterprise Linux for x86_64 9 x86_64
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
    • Red Hat Enterprise Linux for ARM 64 9 aarch64
    • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
    • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
    • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
    • Red Hat Enterprise Linux for x86_64 8 x86_64
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
    • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
    • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
    • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
    • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
    • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
    • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
    • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
  • OpenShift Virtualization 4.10.5 Images
    • Red Hat Container Native Virtualization 4.10 for RHEL 8 x86_64
    • Red Hat Container Native Virtualization 4.10 for RHEL 7 x86_64
Threats:

An attacker could exploit these vulnerabilities by doing the following:

  • Execute arbitrary code
  • Escalate root privilege
Best practice and Recommendations:
Last updated at 7 September, 2022

Rate the content

rate-icon
up icon