Red Hat has released security to updates to address vulnerabilities in multiple products. Exploitation of these vulnerabilities may allow an attacker to gain escalated privilege.
Users and administrators are encouraged to review Red Hat Security Advisory and apply necessary updates.