Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:6162: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Important: systemd security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

  • systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64

Fixes

  • BZ - 2109926 - CVE-2022-2526 systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2

SRPM

systemd-239-31.el8_2.9.src.rpm

SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1

x86_64

systemd-239-31.el8_2.9.i686.rpm

SHA-256: 980b9cee8a7a68c17584fff847d47ea59749f0315b47264c7ca28f3a51208ba6

systemd-239-31.el8_2.9.x86_64.rpm

SHA-256: 5017059b49b046a5af96fe622c26360e1fc0cdecd88ad38c12ee7b8d6230639f

systemd-container-239-31.el8_2.9.i686.rpm

SHA-256: 8fe010f6a57cf8fb00f9f271df2285f2657a0496f18342748b4612edbaf20edf

systemd-container-239-31.el8_2.9.x86_64.rpm

SHA-256: 3c9d75f16bba60fbcf758f814a866c6d88fef12e666980a844a7bb03bb5a4244

systemd-container-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 9e1eaf9b97ee067df7bd7ab8fbe98238b7c6a8eca3fe036fea381b39da3ee1ba

systemd-container-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: e3d98ceb86317ec6128dbce29a79f25896277fae2ed2f73026292a36d24a5a5a

systemd-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 28f3db18ab2b734f3f3614788a2fb273e0d76685a84996df100fe3908b2f8170

systemd-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 91b10ac27ba67ab69f93588e6648bd3c9708dca11c53fda7208069be25eb7023

systemd-debugsource-239-31.el8_2.9.i686.rpm

SHA-256: a8c06912ad7d1fa8966cc9bdd23072b0d66c35bdaad5952a4a405ac58c12ccde

systemd-debugsource-239-31.el8_2.9.x86_64.rpm

SHA-256: 51d188fe3012d40b2987844b0be6df0b152bb6e33f95551f9db0aa3d34ca2a46

systemd-devel-239-31.el8_2.9.i686.rpm

SHA-256: 944f9b7bea2dc32ff5535f25da9fbeaef0618de9ecc3a4cd45b2a8b3a2149330

systemd-devel-239-31.el8_2.9.x86_64.rpm

SHA-256: b9ac84a108574e467bab62b376837eaa7ab817ae3475e78e032ed2fb28392b00

systemd-journal-remote-239-31.el8_2.9.x86_64.rpm

SHA-256: fd67d87f6df794704d0a21a02b893feb738d44d0fd015e07ea0fb1eb21aee0ea

systemd-journal-remote-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 3cc6d3ace7d574ff19f8c52d4dc215be56025391093daf63227e2120c89c4e72

systemd-journal-remote-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 5fddeca31a41ea1fcf2fbadd57d2f8f0469f6f72ca6c46a9f289e8d1c9019fdf

systemd-libs-239-31.el8_2.9.i686.rpm

SHA-256: 340085884444b289d9768b1d3af927da56dd3f63f4a0a5d8cafb8a544675267b

systemd-libs-239-31.el8_2.9.x86_64.rpm

SHA-256: 7c5ef8f463e3476945a47ba4f2b0516d9378576d685c8a8c6f90482a9bb4d0fc

systemd-libs-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: c45788e8f29d2a995dd68022dc517d825e51bad38542587191ab9fe600214089

systemd-libs-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 80456bf449050eaa4f879d86dbc0c8896dad62558458eae5c980bba60391b7d4

systemd-pam-239-31.el8_2.9.x86_64.rpm

SHA-256: d01523d52f6c6c24e395d51f2c01c54aeadbaa6bd07205e94f48486622713a4f

systemd-pam-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: bb2960e08225c146d2c6d75462941a310e9e8113055983aa867f844043acf9dc

systemd-pam-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 1147797c47143f9bb7bda7ae9708c553adf2afd216c14d224149e752828246a9

systemd-tests-239-31.el8_2.9.x86_64.rpm

SHA-256: 5f0bcd48c40c63e9f38f08160ee884c149a6cf5072f71741a1f8096824e04224

systemd-tests-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: dc9e08d7b6c77794c746b068936e6f728db753340be73bd67bf7eb95a3556988

systemd-tests-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 4937869bf8fd91b8f33ab382b0e105026b60e9b3af47ba24a25ddb1843eab0be

systemd-udev-239-31.el8_2.9.x86_64.rpm

SHA-256: 10a035322e4e800e88f05c3d66ff78b50c76a031a83392bb9e4bc3da32022c94

systemd-udev-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 443f0820fe7c4cfd2c648d2909283ffc5d8353aae946f967d2b8eb1ed0b85c0d

systemd-udev-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 3aaa671dce4ff696a4295a8fc3c75f73d28fd43623778e9a7c7353fc38c5a615

Red Hat Enterprise Linux Server - AUS 8.2

SRPM

systemd-239-31.el8_2.9.src.rpm

SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1

x86_64

systemd-239-31.el8_2.9.i686.rpm

SHA-256: 980b9cee8a7a68c17584fff847d47ea59749f0315b47264c7ca28f3a51208ba6

systemd-239-31.el8_2.9.x86_64.rpm

SHA-256: 5017059b49b046a5af96fe622c26360e1fc0cdecd88ad38c12ee7b8d6230639f

systemd-container-239-31.el8_2.9.i686.rpm

SHA-256: 8fe010f6a57cf8fb00f9f271df2285f2657a0496f18342748b4612edbaf20edf

systemd-container-239-31.el8_2.9.x86_64.rpm

SHA-256: 3c9d75f16bba60fbcf758f814a866c6d88fef12e666980a844a7bb03bb5a4244

systemd-container-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 9e1eaf9b97ee067df7bd7ab8fbe98238b7c6a8eca3fe036fea381b39da3ee1ba

systemd-container-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: e3d98ceb86317ec6128dbce29a79f25896277fae2ed2f73026292a36d24a5a5a

systemd-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 28f3db18ab2b734f3f3614788a2fb273e0d76685a84996df100fe3908b2f8170

systemd-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 91b10ac27ba67ab69f93588e6648bd3c9708dca11c53fda7208069be25eb7023

systemd-debugsource-239-31.el8_2.9.i686.rpm

SHA-256: a8c06912ad7d1fa8966cc9bdd23072b0d66c35bdaad5952a4a405ac58c12ccde

systemd-debugsource-239-31.el8_2.9.x86_64.rpm

SHA-256: 51d188fe3012d40b2987844b0be6df0b152bb6e33f95551f9db0aa3d34ca2a46

systemd-devel-239-31.el8_2.9.i686.rpm

SHA-256: 944f9b7bea2dc32ff5535f25da9fbeaef0618de9ecc3a4cd45b2a8b3a2149330

systemd-devel-239-31.el8_2.9.x86_64.rpm

SHA-256: b9ac84a108574e467bab62b376837eaa7ab817ae3475e78e032ed2fb28392b00

systemd-journal-remote-239-31.el8_2.9.x86_64.rpm

SHA-256: fd67d87f6df794704d0a21a02b893feb738d44d0fd015e07ea0fb1eb21aee0ea

systemd-journal-remote-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 3cc6d3ace7d574ff19f8c52d4dc215be56025391093daf63227e2120c89c4e72

systemd-journal-remote-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 5fddeca31a41ea1fcf2fbadd57d2f8f0469f6f72ca6c46a9f289e8d1c9019fdf

systemd-libs-239-31.el8_2.9.i686.rpm

SHA-256: 340085884444b289d9768b1d3af927da56dd3f63f4a0a5d8cafb8a544675267b

systemd-libs-239-31.el8_2.9.x86_64.rpm

SHA-256: 7c5ef8f463e3476945a47ba4f2b0516d9378576d685c8a8c6f90482a9bb4d0fc

systemd-libs-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: c45788e8f29d2a995dd68022dc517d825e51bad38542587191ab9fe600214089

systemd-libs-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 80456bf449050eaa4f879d86dbc0c8896dad62558458eae5c980bba60391b7d4

systemd-pam-239-31.el8_2.9.x86_64.rpm

SHA-256: d01523d52f6c6c24e395d51f2c01c54aeadbaa6bd07205e94f48486622713a4f

systemd-pam-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: bb2960e08225c146d2c6d75462941a310e9e8113055983aa867f844043acf9dc

systemd-pam-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 1147797c47143f9bb7bda7ae9708c553adf2afd216c14d224149e752828246a9

systemd-tests-239-31.el8_2.9.x86_64.rpm

SHA-256: 5f0bcd48c40c63e9f38f08160ee884c149a6cf5072f71741a1f8096824e04224

systemd-tests-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: dc9e08d7b6c77794c746b068936e6f728db753340be73bd67bf7eb95a3556988

systemd-tests-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 4937869bf8fd91b8f33ab382b0e105026b60e9b3af47ba24a25ddb1843eab0be

systemd-udev-239-31.el8_2.9.x86_64.rpm

SHA-256: 10a035322e4e800e88f05c3d66ff78b50c76a031a83392bb9e4bc3da32022c94

systemd-udev-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 443f0820fe7c4cfd2c648d2909283ffc5d8353aae946f967d2b8eb1ed0b85c0d

systemd-udev-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 3aaa671dce4ff696a4295a8fc3c75f73d28fd43623778e9a7c7353fc38c5a615

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2

SRPM

systemd-239-31.el8_2.9.src.rpm

SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1

s390x

systemd-239-31.el8_2.9.s390x.rpm

SHA-256: 9d3dd7d6ab6a1ba47db3a6aa09d4a85481f5730b19468371214295b2d74d6327

systemd-container-239-31.el8_2.9.s390x.rpm

SHA-256: de8d2f5ab7c55a79407bf43dd10a66f400a0e4fbcbd2556e08293d84090060b5

systemd-container-debuginfo-239-31.el8_2.9.s390x.rpm

SHA-256: d27f69356c5289a1f5e5dcc0f07e783ce109b794a6ae2c6eb73c7c421ac9b459

systemd-debuginfo-239-31.el8_2.9.s390x.rpm

SHA-256: 694cf1b5c84a4bd993f7de0177cc37473ca44175350c60cae2146d6b6dc993ea

systemd-debugsource-239-31.el8_2.9.s390x.rpm

SHA-256: 85ffaf648342914e04a287a74a79f4d4f427b5da71845e1fdee450f3fe60cbc7

systemd-devel-239-31.el8_2.9.s390x.rpm

SHA-256: ec9c5f2f76cf01d43aea40d92012b3b4ecf8cb25878ee85b48d115dcf5e7e1f1

systemd-journal-remote-239-31.el8_2.9.s390x.rpm

SHA-256: f8c1523a86e8d3f1b07f48fe99a3f3d32d3e3904f75d6896fac2ae36c7c64958

systemd-journal-remote-debuginfo-239-31.el8_2.9.s390x.rpm

SHA-256: 6018031ee7ce54216ebe25651cb71dd2bda0cb21fc4e0cc57d73d12a93af1a53

systemd-libs-239-31.el8_2.9.s390x.rpm

SHA-256: 3ccab5ec6e6f92f144f3b51b829857c6a86a42904dbf3ced098fb1a117bb93f6

systemd-libs-debuginfo-239-31.el8_2.9.s390x.rpm

SHA-256: d2b52369348c9b9e57e41e21dc5121441c61d9f866862a9fb40e0819b74bac74

systemd-pam-239-31.el8_2.9.s390x.rpm

SHA-256: 93818bf2eba2ffad266cdab18b92f7e3992ae79c217ef2d0079d0ecf85a586c2

systemd-pam-debuginfo-239-31.el8_2.9.s390x.rpm

SHA-256: eb573287b0bfcd916e94e38612f54ed7fbba2628853addd7f04eb56cd3499503

systemd-tests-239-31.el8_2.9.s390x.rpm

SHA-256: 55a716c1551c2b13dbc0eacc3c2c65d4413a5afdb531a60dcaeb11ab13111e50

systemd-tests-debuginfo-239-31.el8_2.9.s390x.rpm

SHA-256: d92dcfb9f31c552635929eca6291ca4ae81040aa32bddd05b3646f8855a7640e

systemd-udev-239-31.el8_2.9.s390x.rpm

SHA-256: dd70f7772cec528c27be109ede849acede6abf843ded30e4eb5b2230adfaacb2

systemd-udev-debuginfo-239-31.el8_2.9.s390x.rpm

SHA-256: 26da402d0a10f5f488ae0f22162c659417b22628d31f7ed042244f35d592597e

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2

SRPM

systemd-239-31.el8_2.9.src.rpm

SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1

ppc64le

systemd-239-31.el8_2.9.ppc64le.rpm

SHA-256: 8ff22e8f673367b1e08b2666357848c51f34ba4e90b84e6cafeb66c1fa7b76c8

systemd-container-239-31.el8_2.9.ppc64le.rpm

SHA-256: 1dc570ee245926cb4c8cf7f720d19591cb891eb36ea6ddb388c86e720bf64ef3

systemd-container-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: d63ad98e413f0224693528e425a143202d8af8d4c732ce17e9e96d8fda1bf6c9

systemd-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: 1ed58ad1bfcd0d08756b97254044a020dca1597d1d286fa16c2ecbb3c6fbb425

systemd-debugsource-239-31.el8_2.9.ppc64le.rpm

SHA-256: 38a5aed9862e33b41face9ce5876307a1c80614c58a3d606306c3c79f4c130fd

systemd-devel-239-31.el8_2.9.ppc64le.rpm

SHA-256: 6fe75b7f749d3eb5f686de1bf7b838f9b22f6d523a1a444bd20db0ea769bf745

systemd-journal-remote-239-31.el8_2.9.ppc64le.rpm

SHA-256: 8aabbc7fa599bc8360b2aefa743b8eb2421ee7019791694efb3db601c085453f

systemd-journal-remote-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: e1b29ac9d9b9dfbf6bdd2c4eed4e5e2a2441e4001ad03552568dee4016682d1c

systemd-libs-239-31.el8_2.9.ppc64le.rpm

SHA-256: 3b220a07434eaab8edeffe48fbf82b7673ecc04df2b315f0e7548f51a2d020e0

systemd-libs-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: afbbdc1ed5b59690458c9b162358f3bcde5751b8cef154861b545ebcc4c2c5b9

systemd-pam-239-31.el8_2.9.ppc64le.rpm

SHA-256: 7f67dfcdee22ef15221ccc524f27332a320f1b078be8926148f5b9e124c5fb1f

systemd-pam-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: 709eaf32a1aa5c5a57743e882b78e85836ff45cd6a4cff10b1ae6fad6b4cc741

systemd-tests-239-31.el8_2.9.ppc64le.rpm

SHA-256: c9478556b70a10d5aedae46151d80b6e4f3ec5a4f4f0393d5626676d4eddeeb7

systemd-tests-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: 5377d284d0ea66eead967ad66eab1f985f64cf6e5c34be2d31196cff4b3b0c02

systemd-udev-239-31.el8_2.9.ppc64le.rpm

SHA-256: c7ff62f40882f28a942a6b82531df6713e58111ce9b109210639be53a65c397a

systemd-udev-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: 4f792c980a82bfaed78e6087733c81c94773331bab3702034c917db29a689bdc

Red Hat Enterprise Linux Server - TUS 8.2

SRPM

systemd-239-31.el8_2.9.src.rpm

SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1

x86_64

systemd-239-31.el8_2.9.i686.rpm

SHA-256: 980b9cee8a7a68c17584fff847d47ea59749f0315b47264c7ca28f3a51208ba6

systemd-239-31.el8_2.9.x86_64.rpm

SHA-256: 5017059b49b046a5af96fe622c26360e1fc0cdecd88ad38c12ee7b8d6230639f

systemd-container-239-31.el8_2.9.i686.rpm

SHA-256: 8fe010f6a57cf8fb00f9f271df2285f2657a0496f18342748b4612edbaf20edf

systemd-container-239-31.el8_2.9.x86_64.rpm

SHA-256: 3c9d75f16bba60fbcf758f814a866c6d88fef12e666980a844a7bb03bb5a4244

systemd-container-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 9e1eaf9b97ee067df7bd7ab8fbe98238b7c6a8eca3fe036fea381b39da3ee1ba

systemd-container-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: e3d98ceb86317ec6128dbce29a79f25896277fae2ed2f73026292a36d24a5a5a

systemd-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 28f3db18ab2b734f3f3614788a2fb273e0d76685a84996df100fe3908b2f8170

systemd-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 91b10ac27ba67ab69f93588e6648bd3c9708dca11c53fda7208069be25eb7023

systemd-debugsource-239-31.el8_2.9.i686.rpm

SHA-256: a8c06912ad7d1fa8966cc9bdd23072b0d66c35bdaad5952a4a405ac58c12ccde

systemd-debugsource-239-31.el8_2.9.x86_64.rpm

SHA-256: 51d188fe3012d40b2987844b0be6df0b152bb6e33f95551f9db0aa3d34ca2a46

systemd-devel-239-31.el8_2.9.i686.rpm

SHA-256: 944f9b7bea2dc32ff5535f25da9fbeaef0618de9ecc3a4cd45b2a8b3a2149330

systemd-devel-239-31.el8_2.9.x86_64.rpm

SHA-256: b9ac84a108574e467bab62b376837eaa7ab817ae3475e78e032ed2fb28392b00

systemd-journal-remote-239-31.el8_2.9.x86_64.rpm

SHA-256: fd67d87f6df794704d0a21a02b893feb738d44d0fd015e07ea0fb1eb21aee0ea

systemd-journal-remote-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 3cc6d3ace7d574ff19f8c52d4dc215be56025391093daf63227e2120c89c4e72

systemd-journal-remote-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 5fddeca31a41ea1fcf2fbadd57d2f8f0469f6f72ca6c46a9f289e8d1c9019fdf

systemd-libs-239-31.el8_2.9.i686.rpm

SHA-256: 340085884444b289d9768b1d3af927da56dd3f63f4a0a5d8cafb8a544675267b

systemd-libs-239-31.el8_2.9.x86_64.rpm

SHA-256: 7c5ef8f463e3476945a47ba4f2b0516d9378576d685c8a8c6f90482a9bb4d0fc

systemd-libs-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: c45788e8f29d2a995dd68022dc517d825e51bad38542587191ab9fe600214089

systemd-libs-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 80456bf449050eaa4f879d86dbc0c8896dad62558458eae5c980bba60391b7d4

systemd-pam-239-31.el8_2.9.x86_64.rpm

SHA-256: d01523d52f6c6c24e395d51f2c01c54aeadbaa6bd07205e94f48486622713a4f

systemd-pam-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: bb2960e08225c146d2c6d75462941a310e9e8113055983aa867f844043acf9dc

systemd-pam-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 1147797c47143f9bb7bda7ae9708c553adf2afd216c14d224149e752828246a9

systemd-tests-239-31.el8_2.9.x86_64.rpm

SHA-256: 5f0bcd48c40c63e9f38f08160ee884c149a6cf5072f71741a1f8096824e04224

systemd-tests-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: dc9e08d7b6c77794c746b068936e6f728db753340be73bd67bf7eb95a3556988

systemd-tests-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 4937869bf8fd91b8f33ab382b0e105026b60e9b3af47ba24a25ddb1843eab0be

systemd-udev-239-31.el8_2.9.x86_64.rpm

SHA-256: 10a035322e4e800e88f05c3d66ff78b50c76a031a83392bb9e4bc3da32022c94

systemd-udev-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 443f0820fe7c4cfd2c648d2909283ffc5d8353aae946f967d2b8eb1ed0b85c0d

systemd-udev-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 3aaa671dce4ff696a4295a8fc3c75f73d28fd43623778e9a7c7353fc38c5a615

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2

SRPM

systemd-239-31.el8_2.9.src.rpm

SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1

aarch64

systemd-239-31.el8_2.9.aarch64.rpm

SHA-256: 5a79e6371a89fc0ba60cc9fd510395d66bbda97bfc2f5af341f11780aad9fabb

systemd-container-239-31.el8_2.9.aarch64.rpm

SHA-256: 2f3be7c9e7c0928b52955e60d9e47d0876242284eaecdcf66bb2c8f1b36589c6

systemd-container-debuginfo-239-31.el8_2.9.aarch64.rpm

SHA-256: 4c465e33091bcf44aa77855dc6b88ee728bda0d3c853fb1c1ca36d35815070ac

systemd-debuginfo-239-31.el8_2.9.aarch64.rpm

SHA-256: 37402443d06dab679b1d33467d83f0a783b0fee46d89f5ab72fe7c02e318954f

systemd-debugsource-239-31.el8_2.9.aarch64.rpm

SHA-256: 0167ecf04ff7ac27338c4e1fcb2495ff1e798f5a3cf0f32b0c09512c8e198dbe

systemd-devel-239-31.el8_2.9.aarch64.rpm

SHA-256: 5f9ff44b59eff4ae162895ca358883152803c98ce1160414ef8c554a8bd829df

systemd-journal-remote-239-31.el8_2.9.aarch64.rpm

SHA-256: 5566979f91b3bb8d699d7dde1ed4d96c91ce031870fbf8dfc990b1bd689a0be5

systemd-journal-remote-debuginfo-239-31.el8_2.9.aarch64.rpm

SHA-256: 6627fcc316e618cee3031c838d1a7a18514f5ac8daedd254c9abef6d03ba419f

systemd-libs-239-31.el8_2.9.aarch64.rpm

SHA-256: b7786f7171f01846e67d5caaea398a3efd33ac05a22ef62d0e43e97001cb060c

systemd-libs-debuginfo-239-31.el8_2.9.aarch64.rpm

SHA-256: c8b7e93cf73b5be2a65b0088a7c64f92045611d32bf415f0c1dde9533388ee4d

systemd-pam-239-31.el8_2.9.aarch64.rpm

SHA-256: a7ef1d1d32c9723ee2a7a69c87b8e0662a2a02ba20be674f5b634c5f27531ddc

systemd-pam-debuginfo-239-31.el8_2.9.aarch64.rpm

SHA-256: 44af80d6e925cc07b06be9938ce5b43ea585eeb5ad204142deefbac8a2d4fab6

systemd-tests-239-31.el8_2.9.aarch64.rpm

SHA-256: acf2442270518ec0d18b046b7bb378d62a085ed4dc3e79216acf7c340d2b09ed

systemd-tests-debuginfo-239-31.el8_2.9.aarch64.rpm

SHA-256: d7f2a32a9328bdbf2dd8a84f1d82c10762be3976e1902ff55f31e4fa67702ce0

systemd-udev-239-31.el8_2.9.aarch64.rpm

SHA-256: 92f5393477ebcd7a28ccfb3c189a770ad22261a07e1e47ab92ab21325592a21f

systemd-udev-debuginfo-239-31.el8_2.9.aarch64.rpm

SHA-256: 13fd8cd75af473602a429138a7db22bcfa42ee0571087ebcfe03ddc059051217

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2

SRPM

systemd-239-31.el8_2.9.src.rpm

SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1

ppc64le

systemd-239-31.el8_2.9.ppc64le.rpm

SHA-256: 8ff22e8f673367b1e08b2666357848c51f34ba4e90b84e6cafeb66c1fa7b76c8

systemd-container-239-31.el8_2.9.ppc64le.rpm

SHA-256: 1dc570ee245926cb4c8cf7f720d19591cb891eb36ea6ddb388c86e720bf64ef3

systemd-container-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: d63ad98e413f0224693528e425a143202d8af8d4c732ce17e9e96d8fda1bf6c9

systemd-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: 1ed58ad1bfcd0d08756b97254044a020dca1597d1d286fa16c2ecbb3c6fbb425

systemd-debugsource-239-31.el8_2.9.ppc64le.rpm

SHA-256: 38a5aed9862e33b41face9ce5876307a1c80614c58a3d606306c3c79f4c130fd

systemd-devel-239-31.el8_2.9.ppc64le.rpm

SHA-256: 6fe75b7f749d3eb5f686de1bf7b838f9b22f6d523a1a444bd20db0ea769bf745

systemd-journal-remote-239-31.el8_2.9.ppc64le.rpm

SHA-256: 8aabbc7fa599bc8360b2aefa743b8eb2421ee7019791694efb3db601c085453f

systemd-journal-remote-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: e1b29ac9d9b9dfbf6bdd2c4eed4e5e2a2441e4001ad03552568dee4016682d1c

systemd-libs-239-31.el8_2.9.ppc64le.rpm

SHA-256: 3b220a07434eaab8edeffe48fbf82b7673ecc04df2b315f0e7548f51a2d020e0

systemd-libs-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: afbbdc1ed5b59690458c9b162358f3bcde5751b8cef154861b545ebcc4c2c5b9

systemd-pam-239-31.el8_2.9.ppc64le.rpm

SHA-256: 7f67dfcdee22ef15221ccc524f27332a320f1b078be8926148f5b9e124c5fb1f

systemd-pam-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: 709eaf32a1aa5c5a57743e882b78e85836ff45cd6a4cff10b1ae6fad6b4cc741

systemd-tests-239-31.el8_2.9.ppc64le.rpm

SHA-256: c9478556b70a10d5aedae46151d80b6e4f3ec5a4f4f0393d5626676d4eddeeb7

systemd-tests-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: 5377d284d0ea66eead967ad66eab1f985f64cf6e5c34be2d31196cff4b3b0c02

systemd-udev-239-31.el8_2.9.ppc64le.rpm

SHA-256: c7ff62f40882f28a942a6b82531df6713e58111ce9b109210639be53a65c397a

systemd-udev-debuginfo-239-31.el8_2.9.ppc64le.rpm

SHA-256: 4f792c980a82bfaed78e6087733c81c94773331bab3702034c917db29a689bdc

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2

SRPM

systemd-239-31.el8_2.9.src.rpm

SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1

x86_64

systemd-239-31.el8_2.9.i686.rpm

SHA-256: 980b9cee8a7a68c17584fff847d47ea59749f0315b47264c7ca28f3a51208ba6

systemd-239-31.el8_2.9.x86_64.rpm

SHA-256: 5017059b49b046a5af96fe622c26360e1fc0cdecd88ad38c12ee7b8d6230639f

systemd-container-239-31.el8_2.9.i686.rpm

SHA-256: 8fe010f6a57cf8fb00f9f271df2285f2657a0496f18342748b4612edbaf20edf

systemd-container-239-31.el8_2.9.x86_64.rpm

SHA-256: 3c9d75f16bba60fbcf758f814a866c6d88fef12e666980a844a7bb03bb5a4244

systemd-container-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 9e1eaf9b97ee067df7bd7ab8fbe98238b7c6a8eca3fe036fea381b39da3ee1ba

systemd-container-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: e3d98ceb86317ec6128dbce29a79f25896277fae2ed2f73026292a36d24a5a5a

systemd-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 28f3db18ab2b734f3f3614788a2fb273e0d76685a84996df100fe3908b2f8170

systemd-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 91b10ac27ba67ab69f93588e6648bd3c9708dca11c53fda7208069be25eb7023

systemd-debugsource-239-31.el8_2.9.i686.rpm

SHA-256: a8c06912ad7d1fa8966cc9bdd23072b0d66c35bdaad5952a4a405ac58c12ccde

systemd-debugsource-239-31.el8_2.9.x86_64.rpm

SHA-256: 51d188fe3012d40b2987844b0be6df0b152bb6e33f95551f9db0aa3d34ca2a46

systemd-devel-239-31.el8_2.9.i686.rpm

SHA-256: 944f9b7bea2dc32ff5535f25da9fbeaef0618de9ecc3a4cd45b2a8b3a2149330

systemd-devel-239-31.el8_2.9.x86_64.rpm

SHA-256: b9ac84a108574e467bab62b376837eaa7ab817ae3475e78e032ed2fb28392b00

systemd-journal-remote-239-31.el8_2.9.x86_64.rpm

SHA-256: fd67d87f6df794704d0a21a02b893feb738d44d0fd015e07ea0fb1eb21aee0ea

systemd-journal-remote-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 3cc6d3ace7d574ff19f8c52d4dc215be56025391093daf63227e2120c89c4e72

systemd-journal-remote-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 5fddeca31a41ea1fcf2fbadd57d2f8f0469f6f72ca6c46a9f289e8d1c9019fdf

systemd-libs-239-31.el8_2.9.i686.rpm

SHA-256: 340085884444b289d9768b1d3af927da56dd3f63f4a0a5d8cafb8a544675267b

systemd-libs-239-31.el8_2.9.x86_64.rpm

SHA-256: 7c5ef8f463e3476945a47ba4f2b0516d9378576d685c8a8c6f90482a9bb4d0fc

systemd-libs-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: c45788e8f29d2a995dd68022dc517d825e51bad38542587191ab9fe600214089

systemd-libs-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 80456bf449050eaa4f879d86dbc0c8896dad62558458eae5c980bba60391b7d4

systemd-pam-239-31.el8_2.9.x86_64.rpm

SHA-256: d01523d52f6c6c24e395d51f2c01c54aeadbaa6bd07205e94f48486622713a4f

systemd-pam-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: bb2960e08225c146d2c6d75462941a310e9e8113055983aa867f844043acf9dc

systemd-pam-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 1147797c47143f9bb7bda7ae9708c553adf2afd216c14d224149e752828246a9

systemd-tests-239-31.el8_2.9.x86_64.rpm

SHA-256: 5f0bcd48c40c63e9f38f08160ee884c149a6cf5072f71741a1f8096824e04224

systemd-tests-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: dc9e08d7b6c77794c746b068936e6f728db753340be73bd67bf7eb95a3556988

systemd-tests-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 4937869bf8fd91b8f33ab382b0e105026b60e9b3af47ba24a25ddb1843eab0be

systemd-udev-239-31.el8_2.9.x86_64.rpm

SHA-256: 10a035322e4e800e88f05c3d66ff78b50c76a031a83392bb9e4bc3da32022c94

systemd-udev-debuginfo-239-31.el8_2.9.i686.rpm

SHA-256: 443f0820fe7c4cfd2c648d2909283ffc5d8353aae946f967d2b8eb1ed0b85c0d

systemd-udev-debuginfo-239-31.el8_2.9.x86_64.rpm

SHA-256: 3aaa671dce4ff696a4295a8fc3c75f73d28fd43623778e9a7c7353fc38c5a615

Related news

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

Red Hat Security Advisory 2022-6890-01

Red Hat Security Advisory 2022-6890-01 - Red Hat OpenShift Virtualization release 4.8.7 is now available with updates to packages and images that fix several bugs and add enhancements.

Red Hat Security Advisory 2022-6696-01

Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.

RHSA-2022:6696: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-31150: nodejs16: CRLF injection in node-undici * CVE-2022-31151: nodejs/undici: Cookie headers uncleared on cross-origin redirect * CV...

RHSA-2022:6551: Red Hat Security Advisory: Red Hat Virtualization security update

An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs * CVE-2022-...

Red Hat Security Advisory 2022-6308-01

Red Hat Security Advisory 2022-6308-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.49. There are no RPMs for this release. Space precludes documenting all of the container images in this advisory. Issues addressed include bypass and code execution vulnerabilities.

Ubuntu Security Notice USN-5583-2

Ubuntu Security Notice 5583-2 - USN-5583-1 fixed vulnerabilities in systemd. Unfortunately this caused a regression by introducing networking problems for some users. This update fixes the problem. It was discovered that systemd incorrectly handled certain DNS requests, which leads to user-after-free vulnerability. An attacker could possibly use this issue to cause a crash or execute arbitrary code.

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6317-01

Red Hat Security Advisory 2022-6317-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.48. Issues addressed include a bypass vulnerability.

RHSA-2022:6322: Red Hat Security Advisory: OpenShift Container Platform 4.7.59 bug fix and security update

Red Hat OpenShift Container Platform release 4.7.59 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass

RHSA-2022:6317: Red Hat Security Advisory: OpenShift Container Platform 4.9.48 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.48 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass

Red Hat Security Advisory 2022-6263-01

Red Hat Security Advisory 2022-6263-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2022:6263: Red Hat Security Advisory: OpenShift Container Platform 4.6.61 security and extras update

Red Hat OpenShift Container Platform release 4.6.61 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

Red Hat Security Advisory 2022-6258-01

Red Hat Security Advisory 2022-6258-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.31. Issues addressed include a code execution vulnerability.

RHSA-2022:6287: Red Hat Security Advisory: OpenShift Container Platform 4.11.3 packages and security update

Red Hat OpenShift Container Platform release 4.11.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

Red Hat Security Advisory 2022-6252-02

Red Hat Security Advisory 2022-6252-02 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 3.11.784. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6348-01

Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

RHSA-2022:6345: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1 security updates and bug fixes

Multicluster Engine v2.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzi...

RHSA-2022:6346: Red Hat Security Advisory: RHSA: Submariner 0.13 - security and enhancement update

Submariner 0.13 packages that fix security issues and bugs, as well as adds various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions...

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6206-01

Red Hat Security Advisory 2022-6206-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.

Ubuntu Security Notice USN-5583-1

Ubuntu Security Notice 5583-1 - It was discovered that systemd incorrectly handled certain DNS requests, which leads to user-after-free vulnerability. An attacker could possibly use this issue to cause a crash or execute arbitrary code.

RHSA-2022:6206: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c

Red Hat Security Advisory 2022-6163-01

Red Hat Security Advisory 2022-6163-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2022-6160-01

Red Hat Security Advisory 2022-6160-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2022-6161-01

Red Hat Security Advisory 2022-6161-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.

RHSA-2022:6160: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c

RHSA-2022:6161: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c

RHSA-2022:6163: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c