Red Hat Security Advisory 2021-3119-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory addresses a wide array of vulnerabilities.
8c577ec58c64d9ea6cb3ad4e7638b48764a7aa10e5ac0a3c83fe0be868a0d325
Red Hat Security Advisory 2021-2479-01 - Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include a cross site scripting vulnerability.
407dd58a4d56a1577f85a63f8d3249362ebd855a9d2e9461bef124d76718dfe1
Red Hat Security Advisory 2021-2121-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
2f1653e51f042c6274ffefb7f0845f74fde0e3cccec0fb22ff11ef5cc0c26b34
Red Hat Security Advisory 2021-2136-01 - An Openshift Logging bug fix release addresses an index validation issue.
8f9746dfa68f5ebe03798d9f8686052c21773b749d26577fe45138585199782b
Red Hat Security Advisory 2021-1586-01 - GNOME is the default desktop environment of Red Hat Enterprise Linux. Issues addressed include code execution, insecure permissions, out of bounds write, and use-after-free vulnerabilities.
83850ab16175a11b58bb98d158fec9786cbf3c1014ed6eabb5bf6fd703ec9fd0
Ubuntu Security Notice 4049-2 - USN-4049-1 fixed a vulnerability in GLib. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that GLib created directories and files without properly restricting permissions. An attacker could possibly use this issue to access sensitive information. Various other issues were also addressed.
7bb8afdb97bdf4f0761af9b6cc42925be984c923a95c9f2707e0b01889cb1d75
Ubuntu Security Notice 4049-1 - It was discovered that GLib created directories and files without properly restricting permissions. An attacker could possibly use this issue to access sensitive information.
f0c857a88de44107aba3d0092d1157ab8adf60d6d5476e9aa578cd12871ee05b