Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2022-1550-01

Red Hat Security Advisory 2022-1550-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds write and use-after-free vulnerabilities.

Packet Storm
#vulnerability#linux#red_hat#js

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2022:1550-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:1550
Issue date: 2022-04-26
CVE Names: CVE-2021-4028 CVE-2022-25636
=====================================================================

  1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

  • kernel: use-after-free in RDMA listen() (CVE-2021-4028)

  • kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

  • Backport DFS fixes from upstream (BZ#2056329)

  • [RHEL8.5] lpfc driver often fails to detect storage directly connected to
    Broadcom FC HBA (BZ#2058193)

  • nf_reinject calls nf_queue_entry_free on an already freed entry->state
    (BZ#2061446)

  • gfs2 blocking in gdlm_lock (BZ#2069750)

  1. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

2027201 - CVE-2021-4028 kernel: use-after-free in RDMA listen()
2056830 - CVE-2022-25636 kernel: heap out of bounds write in nf_dup_netdev.c

  1. Package List:

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
kernel-4.18.0-348.23.1.el8_5.src.rpm

aarch64:
bpftool-4.18.0-348.23.1.el8_5.aarch64.rpm
bpftool-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-core-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-cross-headers-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debug-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debug-core-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debug-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debug-devel-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debug-modules-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debug-modules-extra-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-devel-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-headers-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-modules-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-modules-extra-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-tools-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-tools-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-tools-libs-4.18.0-348.23.1.el8_5.aarch64.rpm
perf-4.18.0-348.23.1.el8_5.aarch64.rpm
perf-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
python3-perf-4.18.0-348.23.1.el8_5.aarch64.rpm
python3-perf-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm

noarch:
kernel-abi-stablelists-4.18.0-348.23.1.el8_5.noarch.rpm
kernel-doc-4.18.0-348.23.1.el8_5.noarch.rpm

ppc64le:
bpftool-4.18.0-348.23.1.el8_5.ppc64le.rpm
bpftool-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-core-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-cross-headers-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debug-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debug-core-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debug-devel-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debug-modules-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-devel-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-headers-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-modules-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-modules-extra-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-tools-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-tools-libs-4.18.0-348.23.1.el8_5.ppc64le.rpm
perf-4.18.0-348.23.1.el8_5.ppc64le.rpm
perf-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
python3-perf-4.18.0-348.23.1.el8_5.ppc64le.rpm
python3-perf-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm

s390x:
bpftool-4.18.0-348.23.1.el8_5.s390x.rpm
bpftool-debuginfo-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-core-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-cross-headers-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-debug-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-debug-core-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-debug-debuginfo-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-debug-devel-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-debug-modules-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-debug-modules-extra-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-debuginfo-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-devel-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-headers-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-modules-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-modules-extra-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-tools-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-tools-debuginfo-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-zfcpdump-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-zfcpdump-core-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-zfcpdump-devel-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-zfcpdump-modules-4.18.0-348.23.1.el8_5.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-348.23.1.el8_5.s390x.rpm
perf-4.18.0-348.23.1.el8_5.s390x.rpm
perf-debuginfo-4.18.0-348.23.1.el8_5.s390x.rpm
python3-perf-4.18.0-348.23.1.el8_5.s390x.rpm
python3-perf-debuginfo-4.18.0-348.23.1.el8_5.s390x.rpm

x86_64:
bpftool-4.18.0-348.23.1.el8_5.x86_64.rpm
bpftool-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-core-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-cross-headers-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debug-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debug-core-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debug-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debug-devel-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debug-modules-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debug-modules-extra-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-devel-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-headers-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-modules-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-modules-extra-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-tools-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-tools-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-tools-libs-4.18.0-348.23.1.el8_5.x86_64.rpm
perf-4.18.0-348.23.1.el8_5.x86_64.rpm
perf-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
python3-perf-4.18.0-348.23.1.el8_5.x86_64.rpm
python3-perf-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64:
bpftool-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debug-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-tools-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
kernel-tools-libs-devel-4.18.0-348.23.1.el8_5.aarch64.rpm
perf-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm
python3-perf-debuginfo-4.18.0-348.23.1.el8_5.aarch64.rpm

ppc64le:
bpftool-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-348.23.1.el8_5.ppc64le.rpm
perf-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm
python3-perf-debuginfo-4.18.0-348.23.1.el8_5.ppc64le.rpm

x86_64:
bpftool-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debug-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-tools-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
kernel-tools-libs-devel-4.18.0-348.23.1.el8_5.x86_64.rpm
perf-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm
python3-perf-debuginfo-4.18.0-348.23.1.el8_5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2021-4028
https://access.redhat.com/security/cve/CVE-2022-25636
https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=8sWg
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

RHSA-2022:1436: Red Hat Security Advisory: OpenJDK 17.0.3 security update for Portable Linux Builds

The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Im...

RHSA-2022:1437: Red Hat Security Advisory: OpenJDK 17.0.3 security update for Windows Builds

The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Improper E...

RHSA-2022:1435: Red Hat Security Advisory: OpenJDK 11.0.15 security update for Portable Linux Builds

The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: De...

RHSA-2022:1439: Red Hat Security Advisory: OpenJDK 11.0.15 security update for Windows Builds

The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective...

RHSA-2022:1492: Red Hat Security Advisory: OpenJDK 8u332 Windows builds release and security update

The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defecti...

RHSA-2022:1438: Red Hat Security Advisory: OpenJDK 8u332 security update for Portable Linux Builds

The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: ...

RHSA-2022:1643: Red Hat Security Advisory: xmlrpc-c security update

An update for xmlrpc-c is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25235: expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution

RHSA-2022:1644: Red Hat Security Advisory: xmlrpc-c security update

An update for xmlrpc-c is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25235: expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution

RHSA-2022:1642: Red Hat Security Advisory: zlib security update

An update for zlib is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-25032: zlib: A flaw found in zlib when compressing (not decompressing) certain inputs

Red Hat Security Advisory 2022-1628-01

Red Hat Security Advisory 2022-1628-01 - Red Hat Gluster Storage Web Administration includes a fully automated setup based on Ansible and provides deep metrics and insights into active Gluster storage pools by using the Grafana platform. Red Hat Gluster Storage Web Administration provides a dashboard view that allows an administrator to get a view of overall gluster health in terms of hosts, volumes, bricks, and other components of GlusterFS.

Red Hat Security Advisory 2022-1420-01

Red Hat Security Advisory 2022-1420-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.11.665. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-1626-01

Red Hat Security Advisory 2022-1626-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.8.6 serves as a replacement for Red Hat AMQ Broker 7.8.5, and includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2022-1627-01

Red Hat Security Advisory 2022-1627-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.9.4 serves as a replacement for Red Hat AMQ Broker 7.9.3, and includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2022-1619-01

Red Hat Security Advisory 2022-1619-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-1599-01

Red Hat Security Advisory 2022-1599-01 - The convert2rhel package provides the Convert2RHEL utility, which performs operating system conversion. During the conversion process, Convert2RHEL replaces all RPM packages from the original Linux distribution with their Red Hat Enterprise Linux versions.

Red Hat Security Advisory 2022-1617-01

Red Hat Security Advisory 2022-1617-01 - The convert2rhel package provides the Convert2RHEL utility, which performs operating system conversion. During the conversion process, Convert2RHEL replaces all RPM packages from the original Linux distribution with their Red Hat Enterprise Linux version.

Red Hat Security Advisory 2022-1618-01

Red Hat Security Advisory 2022-1618-01 - The convert2rhel package provides the Convert2RHEL utility, which performs operating system conversion. During the conversion process, Convert2RHEL replaces all RPM packages from the original Linux distribution with their Red Hat Enterprise Linux version.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution