Multiple vulnerabilities in Red Hat Enterprise Linux (capstone) and Red Hat OpenShift (rhcos) can be exploited by an attacker to execute arbitrary code, perform denial of service attacks, manipulate files, and disclose information.
| Vendor | Product | Versions |
|---|---|---|
| red hat | red hat enterprise linux (capstone) and openshift (rhcos) | — |