exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-2951-01

Red Hat Security Advisory 2023-2951-01
Posted May 16, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-2951-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, out of bounds read, and use-after-free vulnerabilities.

tags | advisory, denial of service, overflow, kernel, vulnerability, memory leak
systems | linux, redhat
advisories | CVE-2021-26341, CVE-2021-33655, CVE-2021-33656, CVE-2022-1462, CVE-2022-1679, CVE-2022-1789, CVE-2022-20141, CVE-2022-2196, CVE-2022-25265, CVE-2022-2663, CVE-2022-3028, CVE-2022-30594, CVE-2022-3239, CVE-2022-3522
SHA-256 | a51622249e184c96a3bb9f730d3aa3ba191710f9d6042ba82c981d273f9298b0

Red Hat Security Advisory 2023-2951-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security, bug fix, and enhancement update
Advisory ID: RHSA-2023:2951-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:2951
Issue date: 2023-05-16
CVE Names: CVE-2021-26341 CVE-2021-33655 CVE-2021-33656
CVE-2022-1462 CVE-2022-1679 CVE-2022-1789
CVE-2022-2196 CVE-2022-2663 CVE-2022-3028
CVE-2022-3239 CVE-2022-3522 CVE-2022-3524
CVE-2022-3564 CVE-2022-3566 CVE-2022-3567
CVE-2022-3619 CVE-2022-3623 CVE-2022-3625
CVE-2022-3628 CVE-2022-3707 CVE-2022-4129
CVE-2022-20141 CVE-2022-25265 CVE-2022-30594
CVE-2022-39188 CVE-2022-39189 CVE-2022-41218
CVE-2022-41674 CVE-2022-42703 CVE-2022-42720
CVE-2022-42721 CVE-2022-42722 CVE-2022-43750
CVE-2022-47929 CVE-2023-0394 CVE-2023-0461
CVE-2023-1195 CVE-2023-1582 CVE-2023-23454
====================================================================
1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux CRB (v. 8) - aarch64, ppc64le, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

The following packages have been upgraded to a later upstream version:
kernel (4.18.0). (BZ#2122230, BZ#2122267)

Security Fix(es):

* use-after-free caused by l2cap_reassemble_sdu() in
net/bluetooth/l2cap_core.c (CVE-2022-3564)

* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)

* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct
branch (CVE-2021-26341)

* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory
(CVE-2021-33655)

* when setting font with malicious data by ioctl PIO_FONT, kernel will
write memory out of bounds (CVE-2021-33656)

* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)

* use-after-free in ath9k_htc_probe_device() could cause an escalation of
privileges (CVE-2022-1679)

* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)

* KVM: nVMX: missing IBPB when exiting from nested guest can lead to
Spectre v2 attacks (CVE-2022-2196)

* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)

* race condition in xfrm_probe_algs can lead to OOB read/write
(CVE-2022-3028)

* media: em28xx: initialize refcount before kref_get (CVE-2022-3239)

* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)

* memory leak in ipv6_renew_options() (CVE-2022-3524)

* data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)

* data races around sk->sk_prot (CVE-2022-3567)

* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c
(CVE-2022-3619)

* denial of service in follow_page_pte in mm/gup.c due to poisoned pte
entry (CVE-2022-3623)

* use-after-free after failed devlink reload in devlink_param_get
(CVE-2022-3625)

* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)

* Double-free in split_2MB_gtt_entry when function
intel_gvt_dma_map_guest_page failed (CVE-2022-3707)

* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer
dereference (CVE-2022-4129)

* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet
sockets (CVE-2022-20141)

* Executable Space Protection Bypass (CVE-2022-25265)

* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP
option (CVE-2022-30594)

* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to
stale TLB entry (CVE-2022-39188)

* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading
to guest malfunctioning (CVE-2022-39189)

* Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218)

* u8 overflow problem in cfg80211_update_notlisted_nontrans()
(CVE-2022-41674)

* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)

* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)

* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c
(CVE-2022-42721)

* Denial of service in beacon protection for P2P-device (CVE-2022-42722)

* memory corruption in usbmon driver (CVE-2022-43750)

* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)

* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)

* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c
(CVE-2023-1195)

* Soft lockup occurred during __page_mapcount (CVE-2023-1582)

* slab-out-of-bounds read vulnerabilities in cbq_classify (CVE-2023-23454)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.8 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

2055499 - CVE-2022-25265 kernel: Executable Space Protection Bypass
2061703 - CVE-2021-26341 hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch
2078466 - CVE-2022-1462 kernel: possible race condition in drivers/tty/tty_buffers.c
2079311 - VMs hang after migration
2084125 - CVE-2022-1679 kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges
2085300 - CVE-2022-30594 kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
2090723 - CVE-2022-1789 kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva
2108691 - CVE-2021-33655 kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory
2108696 - CVE-2021-33656 kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds
2114937 - CVE-2022-20141 kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets
2116444 - kernel: Backport vfork support for time namespaces
2122228 - CVE-2022-3028 kernel: race condition in xfrm_probe_algs can lead to OOB read/write
2122960 - CVE-2022-41218 kernel: Report vmalloc UAF in dvb-core/dmxdev
2123056 - CVE-2022-2663 kernel: netfilter: nf_conntrack_irc message handling issue
2123854 - Backport kernel audit enhancements and fixes up to upstream v6.1
2124788 - CVE-2022-39189 kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning
2127985 - CVE-2022-3239 kernel: media: em28xx: initialize refcount before kref_get
2130141 - CVE-2022-39188 kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry
2131339 - CVE-2022-4269 kernel: net: CPU soft lockup in TC mirred egress-to-ingress action [rhel-8.8.0]
2131391 - fuse readdir cache sometimes corrupted
2133483 - CVE-2022-42703 kernel: use-after-free related to leaf anon_vma double reuse
2134377 - CVE-2022-41674 kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()
2134451 - CVE-2022-42720 kernel: use-after-free in bss_ref_get in net/wireless/scan.c
2134506 - CVE-2022-42721 kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c
2134517 - CVE-2022-42722 kernel: Denial of service in beacon protection for P2P-device
2134528 - CVE-2022-4129 kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference
2137979 - CVE-2022-3707 kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed
2139728 - [Azure][RHEL8] Live resize of disk does not trigger a rescan of the device capacity
2140163 - error 524 from seccomp(2) when trying to load filter
2143893 - CVE-2022-3566 kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt
2143943 - CVE-2022-3567 kernel: data races around sk->sk_prot
2144720 - CVE-2022-3625 kernel: use-after-free after failed devlink reload in devlink_param_get
2150947 - CVE-2022-3524 kernel: memory leak in ipv6_renew_options()
2150960 - CVE-2022-3628 kernel: USB-accessible buffer overflow in brcmfmac
2150979 - CVE-2022-3522 kernel: race condition in hugetlb_no_page() in mm/hugetlb.c
2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
2151270 - CVE-2022-43750 kernel: memory corruption in usbmon driver
2152133 - In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16
2154171 - CVE-2023-1195 kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c
2154235 - CVE-2022-3619 kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c
2154880 - [rhel8] LTP: read_all_sys - RIP: 0010:intel_rps_get_max_frequency+0x5/0x40 [i915]
2159969 - backport vsock fixes for RHEL-8.8
2160023 - CVE-2022-2196 kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks
2162120 - CVE-2023-0394 kernel: NULL pointer dereference in rawv6_push_pending_frames
2165721 - CVE-2022-3623 kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry
2166364 - NFS hang on large dirs with kenel 4.18.0-448.el8.x86_64
2168246 - CVE-2022-47929 kernel: NULL pointer dereference in traffic control subsystem
2168297 - CVE-2023-23454 kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets
2180936 - CVE-2023-1582 kernel: Soft lockup occurred during __page_mapcount

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
kernel-4.18.0-477.10.1.el8_8.src.rpm

aarch64:
bpftool-4.18.0-477.10.1.el8_8.aarch64.rpm
bpftool-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-core-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-cross-headers-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-core-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-devel-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-modules-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-modules-extra-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-devel-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-headers-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-modules-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-modules-extra-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-tools-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-tools-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-tools-libs-4.18.0-477.10.1.el8_8.aarch64.rpm
perf-4.18.0-477.10.1.el8_8.aarch64.rpm
perf-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
python3-perf-4.18.0-477.10.1.el8_8.aarch64.rpm
python3-perf-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm

noarch:
kernel-abi-stablelists-4.18.0-477.10.1.el8_8.noarch.rpm
kernel-doc-4.18.0-477.10.1.el8_8.noarch.rpm

ppc64le:
bpftool-4.18.0-477.10.1.el8_8.ppc64le.rpm
bpftool-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-core-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-cross-headers-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-core-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-devel-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-modules-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-devel-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-headers-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-modules-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-modules-extra-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-tools-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-tools-libs-4.18.0-477.10.1.el8_8.ppc64le.rpm
perf-4.18.0-477.10.1.el8_8.ppc64le.rpm
perf-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
python3-perf-4.18.0-477.10.1.el8_8.ppc64le.rpm
python3-perf-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm

s390x:
bpftool-4.18.0-477.10.1.el8_8.s390x.rpm
bpftool-debuginfo-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-core-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-cross-headers-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-core-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-debuginfo-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-devel-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-modules-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-modules-extra-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debuginfo-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-devel-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-headers-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-modules-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-modules-extra-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-tools-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-tools-debuginfo-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-core-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-devel-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-modules-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-477.10.1.el8_8.s390x.rpm
perf-4.18.0-477.10.1.el8_8.s390x.rpm
perf-debuginfo-4.18.0-477.10.1.el8_8.s390x.rpm
python3-perf-4.18.0-477.10.1.el8_8.s390x.rpm
python3-perf-debuginfo-4.18.0-477.10.1.el8_8.s390x.rpm

x86_64:
bpftool-4.18.0-477.10.1.el8_8.x86_64.rpm
bpftool-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-core-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-cross-headers-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-core-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-devel-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-modules-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-modules-extra-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-devel-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-headers-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-modules-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-modules-extra-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-tools-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-tools-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-tools-libs-4.18.0-477.10.1.el8_8.x86_64.rpm
perf-4.18.0-477.10.1.el8_8.x86_64.rpm
perf-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
python3-perf-4.18.0-477.10.1.el8_8.x86_64.rpm
python3-perf-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm

Red Hat Enterprise Linux CRB (v. 8):

aarch64:
bpftool-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-tools-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-tools-libs-devel-4.18.0-477.10.1.el8_8.aarch64.rpm
perf-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm
python3-perf-debuginfo-4.18.0-477.10.1.el8_8.aarch64.rpm

ppc64le:
bpftool-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-477.10.1.el8_8.ppc64le.rpm
perf-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm
python3-perf-debuginfo-4.18.0-477.10.1.el8_8.ppc64le.rpm

x86_64:
bpftool-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-tools-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-tools-libs-devel-4.18.0-477.10.1.el8_8.x86_64.rpm
perf-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm
python3-perf-debuginfo-4.18.0-477.10.1.el8_8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-26341
https://access.redhat.com/security/cve/CVE-2021-33655
https://access.redhat.com/security/cve/CVE-2021-33656
https://access.redhat.com/security/cve/CVE-2022-1462
https://access.redhat.com/security/cve/CVE-2022-1679
https://access.redhat.com/security/cve/CVE-2022-1789
https://access.redhat.com/security/cve/CVE-2022-2196
https://access.redhat.com/security/cve/CVE-2022-2663
https://access.redhat.com/security/cve/CVE-2022-3028
https://access.redhat.com/security/cve/CVE-2022-3239
https://access.redhat.com/security/cve/CVE-2022-3522
https://access.redhat.com/security/cve/CVE-2022-3524
https://access.redhat.com/security/cve/CVE-2022-3564
https://access.redhat.com/security/cve/CVE-2022-3566
https://access.redhat.com/security/cve/CVE-2022-3567
https://access.redhat.com/security/cve/CVE-2022-3619
https://access.redhat.com/security/cve/CVE-2022-3623
https://access.redhat.com/security/cve/CVE-2022-3625
https://access.redhat.com/security/cve/CVE-2022-3628
https://access.redhat.com/security/cve/CVE-2022-3707
https://access.redhat.com/security/cve/CVE-2022-4129
https://access.redhat.com/security/cve/CVE-2022-20141
https://access.redhat.com/security/cve/CVE-2022-25265
https://access.redhat.com/security/cve/CVE-2022-30594
https://access.redhat.com/security/cve/CVE-2022-39188
https://access.redhat.com/security/cve/CVE-2022-39189
https://access.redhat.com/security/cve/CVE-2022-41218
https://access.redhat.com/security/cve/CVE-2022-41674
https://access.redhat.com/security/cve/CVE-2022-42703
https://access.redhat.com/security/cve/CVE-2022-42720
https://access.redhat.com/security/cve/CVE-2022-42721
https://access.redhat.com/security/cve/CVE-2022-42722
https://access.redhat.com/security/cve/CVE-2022-43750
https://access.redhat.com/security/cve/CVE-2022-47929
https://access.redhat.com/security/cve/CVE-2023-0394
https://access.redhat.com/security/cve/CVE-2023-0461
https://access.redhat.com/security/cve/CVE-2023-1195
https://access.redhat.com/security/cve/CVE-2023-1582
https://access.redhat.com/security/cve/CVE-2023-23454
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBZGNu39zjgjWX9erEAQjR8A//doUSB647itItEwNVjnWUYBQhY5vM+LNx
0bBO7uUOtEno6Fo0yus1y7uVRoR6AjNghnL+4TumuMh9c5OGYrpCE3ij3ImN/RSX
zbImH13s1HaeyPxXroEUhwTcAwODXicrqMu0MYOe3rqC66q+Bf7nfdxBn5KubgzX
0niXjah23bXzlQ61vsDYm/0ctUommRZyMaDFD2Pm6OycaKOJOCudiFx3sj+p0Bxw
x2lDXyZpKoSpkHj9xGTzU99AvmQO/HmGjuDtx6tBH9IHRZSQWfPwqxsNUvpc7lp7
ZWbxrOl7IyJPMGqUXP6knpXsd+/rxEck2RlKyCCNQM75h6EYgYtt1NzXuQkhUj2S
yRHr36YTfhXqfXTlrCHPzDca11PmYpNLwQ21PjePgmB2/eHypOxUKVT67sZY+RLp
saJacLhc5xw+Wv/aV+NOrReZtT70M8HgGEA4U7NdStJh2uOBOzMGyRTIUCXtbHLT
S/65Gp6+54Ez2xWD6Cgwb/R6iS4AQv0IzE4ggi5Im0BvOXgae54DBn8hqcCHOi+0
UdiB0+ILRt+m/24rxPUEuDY2N+/f/9HKyZ7FD92lBJZ8S9x1EeOEvXXmVtFwMuAE
Oxt2DDjydHtoP/GrbaTNvGHOZdjCIXtKZp9aVCBtqGjIKqIzF8TwKX7+drdMS9hn
7ISc7Ji2irg=bvSS
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close