Your review has been sent successfully

Red Hat Alert

2794
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

5 May, 2022

● High

2022-4778

All

Description:

Red Hat has released security updates to address several vulnerabilities in the following products:

  • firefox
    • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
    • Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.1 x86_64
    • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
    • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
    • Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.4 x86_64
    • Red Hat Enterprise Linux Server 7 x86_64
    • Red Hat Enterprise Linux Workstation 7 x86_64
    • Red Hat Enterprise Linux Desktop 7 x86_64
    • Red Hat Enterprise Linux for IBM z Systems 7 s390x
    • Red Hat Enterprise Linux for Power, big endian 7 ppc64
    • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
    • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
    • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
    • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
    • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
    • Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.2 x86_64
    • Red Hat Enterprise Linux for x86_64 8 x86_64
    • Red Hat Enterprise Linux for IBM z Systems 8 s390x
    • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Satellite 6.10.5 Async
    • Red Hat Satellite 6.10 x86_64
    • Red Hat Satellite Capsule 6.10 x86_64
    • Red Hat Single Sign-On 7.5.2
    • Red Hat Single Sign-On Text-Only Advisories x86_64
    • Red Hat Single Sign-On 7.5 for RHEL 7 x86_64
    • Red Hat Single Sign-On 7.5 for RHEL 8 x86_64
  • rh-sso-7/sso75-openshift-rhel8 container image
    • Red Hat OpenShift Container Platform 4.10 for RHEL 8 x86_64
    • Red Hat OpenShift Container Platform 4.9 for RHEL 8 x86_64
    • Red Hat OpenShift Container Platform for Power 4.10 for RHEL 8 ppc64le
    • Red Hat OpenShift Container Platform for Power 4.9 for RHEL 8 ppc64le
    • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.10 for RHEL 8 s390x
    • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.9 for RHEL 8 s390x
  • OpenShift Container Platform 4.6.57
    • Red Hat OpenShift Container Platform 4.6 for RHEL 8 x86_64
    • Red Hat OpenShift Container Platform 4.6 for RHEL 7 x86_64
    • Red Hat OpenShift Container Platform for Power 4.6 for RHEL 8 ppc64le
    • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.6 for RHEL 8 s390x
Threats:

An attacker could exploit these vulnerabilities by doing the following:

  • Denial of Service (DoS) attack
  • Privilege escalation
  • Arbitrary code execution
Best practice and Recommendations:
Last updated at 5 May, 2022

Rate the content

rate-icon
up icon