exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-0814-01

Red Hat Security Advisory 2023-0814-01
Posted Feb 21, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-0814-01 - The Cryostat 2 on RHEL 8 container images have been updated to fix "CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key" and to address the following security advisory: RHSA-2023:0625 Users of Cryostat 2 on RHEL 8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images. Issues addressed include bypass, code execution, and integer overflow vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2022-1996, CVE-2022-47629
SHA-256 | 822068571c4d03dfe6ece3eb444486f7370f3741488374f68f1c709b2396cce1

Red Hat Security Advisory 2023-0814-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat build of Cryostat security update
Advisory ID: RHSA-2023:0814-01
Product: Cryostat
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0814
Issue date: 2023-02-20
CVE Names: CVE-2022-1996 CVE-2022-47629
====================================================================
1. Summary:

Updated Cryostat 2 on RHEL 8 container images are now available

2. Description:

The Cryostat 2 on RHEL 8 container images have been updated to fix
"CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled
Key" and to address the following security advisory: RHSA-2023:0625 (see
References)

Users of Cryostat 2 on RHEL 8 container images are advised to upgrade to
these updated images, which contain backported patches to correct these
security issues, fix these bugs and add these enhancements. Users of these
images are also encouraged to rebuild all container images that depend on
these images.

You can find images updated by this advisory in Red Hat Container Catalog
(see References).

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2094982 - CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key
2161571 - CVE-2022-47629 libksba: integer overflow to code execution

5. References:

https://access.redhat.com/security/cve/CVE-2022-1996
https://access.redhat.com/security/cve/CVE-2022-47629
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/errata/RHSA-2023:0625
https://access.redhat.com/containers

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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az/w
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    19 Files
  • 25
    Jun 25th
    5 Files
  • 26
    Jun 26th
    13 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close