Advisory for RedHat Security Updates

- NIC-CERT/2023-03/53
- Date: 2023-03-10
- CVE ID: Multiple
- Severity: Critical
Advisory for RedHat Security Updates
A. Description:
A vulnerability has been found in redhat products which could allow an attacker to take control of the affected system.
B. Security Issues Fixed:
Redhathas issued security advisories which contains important updates and fixed vulnerabilities like Red Hat OpenShift Serverless for IBM Z and LinuxONE Red Hat OpenShift Serverless for IBM Power, little endian Red Hat Openshift Serverless
C. Affected Products & Solution:
CVE |
Product |
Synopsis |
CVE-2021-46848 CVE-2022-4415 CVE-2022-35737 CVE-2022-40303 CVE-2022-40304 CVE-2022-41717 CVE-2022-47629 CVE-2022-48303 |
Red Hat Openshift Serverless 1 x86_64 |
Release of OpenShift Serverless 1.27.1 |
CVE-2022-41717 |
Red Hat Openshift Serverless 1 x86_64 Red Hat OpenShift Serverless for IBM Power, little endian 1 ppc64le Red Hat OpenShift Serverless for IBM Z and LinuxONE 1 s390x |
Release of OpenShift Serverless Client kn 1.27.1 |
CVE-2022-41946 CVE-2022-41966 |
Red Hat Integration - Camel Extensions for Quarkus 1 x86_64 |
Red Hat Integration Camel Extension ForQuarkus 2.7-1 security update |
CVE-2021-46848 CVE-2022-1122 CVE-2022-1304 CVE-2022-2056 CVE-2022-2057 CVE-2022-2058 CVE-2022-2519 CVE-2022-2520 CVE-2022-2521 CVE-2022-2867 CVE-2022-2868 CVE-2022-2869 CVE-2022-2879 CVE-2022-2880 CVE-2022-2953 CVE-2022-4415 CVE-2022-4883 CVE-2022-22624 CVE-2022-22628 CVE-2022-22629 CVE-2022-22662 CVE-2022-25308 CVE-2022-25309 CVE-2022-25310 CVE-2022-26700 CVE-2022-26709 CVE-2022-26710 CVE-2022-26716 CVE-2022-26717 CVE-2022-26719 CVE-2022-27404 CVE-2022-27405 CVE-2022-27406 CVE-2022-30293 CVE-2022-35737 CVE-2022-40303 CVE-2022-40304 CVE-2022-41715 CVE-2022-41717 CVE-2022-42010 CVE-2022-42011 CVE-2022-42012 CVE-2022-42898 CVE-2022-43680 CVE-2022-44617 CVE-2022-46285 CVE-2022-47629 CVE-2022-48303 |
OpenShift API for Data Protection 1 x86_64 |
OpenShift API for Data Protection (OADP) 1.1.2 security and bug fix update |
Users are advised to visit following URL and follow the steps to apply fixes.
https://access.redhat.com/articles/11258
D. References:
https://access.redhat.com/security/security-updates/#/
https://access.redhat.com/security/updates/classification/#important