Red Hat has released security update to address vulnerabilities to its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system.
Users and administrators are encouraged to review Red Hat Security Advisories and apply necessary updates.