Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:6161: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Important: systemd security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for systemd is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

  • systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2109926 - CVE-2022-2526 systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

systemd-239-45.el8_4.12.src.rpm

SHA-256: a087ad66241478a92531f43b05d0e0419008077a2704292558123fe21323467b

x86_64

systemd-239-45.el8_4.12.i686.rpm

SHA-256: b6b51cce8aebf110e114e7c56fb21a4f441a3d3671cd76c67867f7c009ac6d01

systemd-239-45.el8_4.12.x86_64.rpm

SHA-256: b1e30787d6bd58c5e8d01bea7738df70be61d742ddfda514d63b200a6b94e609

systemd-container-239-45.el8_4.12.i686.rpm

SHA-256: 257dec52e25d862512c0ca3b3dab3acaa90f4904bbb910df928f0e6ec087fc1b

systemd-container-239-45.el8_4.12.x86_64.rpm

SHA-256: fb4ca24733e2f09128069d671ecbd5e3b311ab159607230a9ffa61d270bb6fc1

systemd-container-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: 33ccc32d3b7b49881d826fd5f555496674ad46e37400f9ea7e1ed76201e4a50d

systemd-container-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 707275e7de2d3825fea3f2198d75c0f8a1a4d62f0d43d9cabedc49d86f585d3e

systemd-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: ff14b4b3274cc3700452c32bbbf259b83355054cbeb693afb243065d0feb845a

systemd-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: dc66beda0638b9315935e4275ef470304c3dfd5a1762f441d87d4ffff188873f

systemd-debugsource-239-45.el8_4.12.i686.rpm

SHA-256: b72443b26b82deecd1203cb77ed4e9f3db8f0ed9e0d6c30433b6fe2e607574f3

systemd-debugsource-239-45.el8_4.12.x86_64.rpm

SHA-256: 875d1a00f536e126735ef1eeb459f9b26b9e65c06dde69f30f65dc97ec03c4b6

systemd-devel-239-45.el8_4.12.i686.rpm

SHA-256: bad046352ded1236c37dd9be4371439d8c1dbd6b46af89b55f0a3c57d352fa80

systemd-devel-239-45.el8_4.12.x86_64.rpm

SHA-256: 704fe210b83306f4e8289beb7d5093b4d79e8e719ea1d6ef0cc169c356470a66

systemd-journal-remote-239-45.el8_4.12.x86_64.rpm

SHA-256: 6776c4c4ac9f5d2d3925399f2b425be74755190905bb500e244baa29c1f13bce

systemd-journal-remote-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: cbf9bc582579fb8f21dd3ff6cd6ed195956e409786ed1b174fdf275926e3019f

systemd-journal-remote-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 0c8f1ac4350897265534e05f4930473b2d48f79a70e766aff409f3af8ae42473

systemd-libs-239-45.el8_4.12.i686.rpm

SHA-256: 3c4126ce148591450f972b4e167f450e402ed75e676b68dd1d82a70257527dcb

systemd-libs-239-45.el8_4.12.x86_64.rpm

SHA-256: 70e8bb354e22006bb8397db8d4ff2d018cb32de8a5f039c7488aef876d78b07f

systemd-libs-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: 024c7039ab2ba22a096c432373a97a8ed19f9b1c1570f157ace849edac68daeb

systemd-libs-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 6e6f33ab046cc3dca531619f00592b26f68a49b7e56392a80a06c4b995e351a6

systemd-pam-239-45.el8_4.12.x86_64.rpm

SHA-256: 480b225af4a03081f9b5be8de51b070a25a51068075ebda9ba4c38e8f4d3475d

systemd-pam-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: a5ea60cf998ed07b9c88b1a8e28047e6fd5cf4eb47e70e77891c31b2152ab25a

systemd-pam-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: e7ab7bc8ebdda6fd3df28135153405614f35b8d1adffb1e1b13a7702e2e25709

systemd-tests-239-45.el8_4.12.x86_64.rpm

SHA-256: 4a5acbbb84bb308d5df8743b1e424351a74480a331e0c12b4d2f75a215fe2507

systemd-tests-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: f333cb01ee0508f9bb1e0cbdb21092309fb000f78571315e630d5bbc88473894

systemd-tests-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 8487a96aa34010c558f07c7f5d868399e5069534ce03677f3b724d61f1d06a90

systemd-udev-239-45.el8_4.12.x86_64.rpm

SHA-256: 280331cc6eadcdd2579707fb5b4f905ba9a973c179f8622fcae621982311f074

systemd-udev-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: d9e491e2f6c6b8ff9412869b64746bd8573086068bcf20399afe9b176796f74a

systemd-udev-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: a186d2b26f7a3661b6759474be64d3e4ed73b78ae5f7655220c620c5e2d80be7

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

systemd-239-45.el8_4.12.src.rpm

SHA-256: a087ad66241478a92531f43b05d0e0419008077a2704292558123fe21323467b

x86_64

systemd-239-45.el8_4.12.i686.rpm

SHA-256: b6b51cce8aebf110e114e7c56fb21a4f441a3d3671cd76c67867f7c009ac6d01

systemd-239-45.el8_4.12.x86_64.rpm

SHA-256: b1e30787d6bd58c5e8d01bea7738df70be61d742ddfda514d63b200a6b94e609

systemd-container-239-45.el8_4.12.i686.rpm

SHA-256: 257dec52e25d862512c0ca3b3dab3acaa90f4904bbb910df928f0e6ec087fc1b

systemd-container-239-45.el8_4.12.x86_64.rpm

SHA-256: fb4ca24733e2f09128069d671ecbd5e3b311ab159607230a9ffa61d270bb6fc1

systemd-container-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: 33ccc32d3b7b49881d826fd5f555496674ad46e37400f9ea7e1ed76201e4a50d

systemd-container-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 707275e7de2d3825fea3f2198d75c0f8a1a4d62f0d43d9cabedc49d86f585d3e

systemd-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: ff14b4b3274cc3700452c32bbbf259b83355054cbeb693afb243065d0feb845a

systemd-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: dc66beda0638b9315935e4275ef470304c3dfd5a1762f441d87d4ffff188873f

systemd-debugsource-239-45.el8_4.12.i686.rpm

SHA-256: b72443b26b82deecd1203cb77ed4e9f3db8f0ed9e0d6c30433b6fe2e607574f3

systemd-debugsource-239-45.el8_4.12.x86_64.rpm

SHA-256: 875d1a00f536e126735ef1eeb459f9b26b9e65c06dde69f30f65dc97ec03c4b6

systemd-devel-239-45.el8_4.12.i686.rpm

SHA-256: bad046352ded1236c37dd9be4371439d8c1dbd6b46af89b55f0a3c57d352fa80

systemd-devel-239-45.el8_4.12.x86_64.rpm

SHA-256: 704fe210b83306f4e8289beb7d5093b4d79e8e719ea1d6ef0cc169c356470a66

systemd-journal-remote-239-45.el8_4.12.x86_64.rpm

SHA-256: 6776c4c4ac9f5d2d3925399f2b425be74755190905bb500e244baa29c1f13bce

systemd-journal-remote-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: cbf9bc582579fb8f21dd3ff6cd6ed195956e409786ed1b174fdf275926e3019f

systemd-journal-remote-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 0c8f1ac4350897265534e05f4930473b2d48f79a70e766aff409f3af8ae42473

systemd-libs-239-45.el8_4.12.i686.rpm

SHA-256: 3c4126ce148591450f972b4e167f450e402ed75e676b68dd1d82a70257527dcb

systemd-libs-239-45.el8_4.12.x86_64.rpm

SHA-256: 70e8bb354e22006bb8397db8d4ff2d018cb32de8a5f039c7488aef876d78b07f

systemd-libs-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: 024c7039ab2ba22a096c432373a97a8ed19f9b1c1570f157ace849edac68daeb

systemd-libs-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 6e6f33ab046cc3dca531619f00592b26f68a49b7e56392a80a06c4b995e351a6

systemd-pam-239-45.el8_4.12.x86_64.rpm

SHA-256: 480b225af4a03081f9b5be8de51b070a25a51068075ebda9ba4c38e8f4d3475d

systemd-pam-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: a5ea60cf998ed07b9c88b1a8e28047e6fd5cf4eb47e70e77891c31b2152ab25a

systemd-pam-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: e7ab7bc8ebdda6fd3df28135153405614f35b8d1adffb1e1b13a7702e2e25709

systemd-tests-239-45.el8_4.12.x86_64.rpm

SHA-256: 4a5acbbb84bb308d5df8743b1e424351a74480a331e0c12b4d2f75a215fe2507

systemd-tests-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: f333cb01ee0508f9bb1e0cbdb21092309fb000f78571315e630d5bbc88473894

systemd-tests-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 8487a96aa34010c558f07c7f5d868399e5069534ce03677f3b724d61f1d06a90

systemd-udev-239-45.el8_4.12.x86_64.rpm

SHA-256: 280331cc6eadcdd2579707fb5b4f905ba9a973c179f8622fcae621982311f074

systemd-udev-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: d9e491e2f6c6b8ff9412869b64746bd8573086068bcf20399afe9b176796f74a

systemd-udev-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: a186d2b26f7a3661b6759474be64d3e4ed73b78ae5f7655220c620c5e2d80be7

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

systemd-239-45.el8_4.12.src.rpm

SHA-256: a087ad66241478a92531f43b05d0e0419008077a2704292558123fe21323467b

s390x

systemd-239-45.el8_4.12.s390x.rpm

SHA-256: c9352a7fb74a4f8a08a839128fba94cf65fe8cd406abfe5ede8117d59b3c8f45

systemd-container-239-45.el8_4.12.s390x.rpm

SHA-256: 6e4cbc68e487cc64ab3a49e4994690a2bea66c68536cdae3a41fa899eeca5036

systemd-container-debuginfo-239-45.el8_4.12.s390x.rpm

SHA-256: 94e77fb79793412b2521ae86d7275315d8e847472bd024a9653ab3206d02ad6e

systemd-debuginfo-239-45.el8_4.12.s390x.rpm

SHA-256: 6d014028a3b51320efcbcd11c2d0ef2eb78e0a29c0997d2b2daff5935b297213

systemd-debugsource-239-45.el8_4.12.s390x.rpm

SHA-256: a7db02d4e24058112df085fc634c4bf0b66867a6cd2f4c566a6b9812fc556206

systemd-devel-239-45.el8_4.12.s390x.rpm

SHA-256: cb0079659d737508ce007943d81fdc6b2e93f1d7575674f64cd611748fc766cb

systemd-journal-remote-239-45.el8_4.12.s390x.rpm

SHA-256: 08b3da260076767d2b666f29d0ab106ef7ff3ee3d8ff2effd5026c4bb88d3f44

systemd-journal-remote-debuginfo-239-45.el8_4.12.s390x.rpm

SHA-256: c41d444bffeecca21cd56e1783fe85603fbdec8f1d0f62aab7f4fcf1821ad36e

systemd-libs-239-45.el8_4.12.s390x.rpm

SHA-256: f5adfb10fcbe5f7e1e0709743bcdb8187aa1e2da9aa4b1261de85bc3936cd7c3

systemd-libs-debuginfo-239-45.el8_4.12.s390x.rpm

SHA-256: dafa6de424ef6c182f98b561b1be52ab0748e580829b1b8c02051cb92a4e1fb2

systemd-pam-239-45.el8_4.12.s390x.rpm

SHA-256: b53de8ff6f4fd4c946efca204b3a04eac74809ac44bcfe1c3afcef42b9c9ea20

systemd-pam-debuginfo-239-45.el8_4.12.s390x.rpm

SHA-256: aa3402d215b0b1ad8d6a12b87a344d401804deccb05fb23a6e7861d008f4a66e

systemd-tests-239-45.el8_4.12.s390x.rpm

SHA-256: b547cd276f10c5f825e67645b64f8c9a7c92ef8b8235ad7d374aed9a27659b8c

systemd-tests-debuginfo-239-45.el8_4.12.s390x.rpm

SHA-256: f13862cef2fe4d8a5ed52661eb38b11c7f00a633cf592fcac0e6621a661c0900

systemd-udev-239-45.el8_4.12.s390x.rpm

SHA-256: 30e984e0953c006f55fda48561aad736e54d1806fa08dd6db1c068d33ae7935c

systemd-udev-debuginfo-239-45.el8_4.12.s390x.rpm

SHA-256: e22e81a5802e460bb126a463b7a5a061c3cc608bd1b3b89b639db26b023a5a8d

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

systemd-239-45.el8_4.12.src.rpm

SHA-256: a087ad66241478a92531f43b05d0e0419008077a2704292558123fe21323467b

ppc64le

systemd-239-45.el8_4.12.ppc64le.rpm

SHA-256: fb40fd6eb874f785c1dace13a04f14472ec55f43f407f8edb68d4892805aaca7

systemd-container-239-45.el8_4.12.ppc64le.rpm

SHA-256: 0b773bd853b8c86b94d01e9717c1d23cadb8491ac1f3112cbd1b9f9b41f15665

systemd-container-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: 1627e112fb2eb28b619ace2f91a37a6dba1430fc58d4feacd35c177350ea57a3

systemd-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: 16781e2b6b4453b009c7f10c0bc90e1f15adf1064119ec4211917386e7f1d4af

systemd-debugsource-239-45.el8_4.12.ppc64le.rpm

SHA-256: 5a91db17eb0c8fdc12866350f71a20095775777108ef0ce906feec5867875769

systemd-devel-239-45.el8_4.12.ppc64le.rpm

SHA-256: 876a988ad2829154d7dbd2d3a09b2c128a41e9378450e724b2e5578a7fb1b946

systemd-journal-remote-239-45.el8_4.12.ppc64le.rpm

SHA-256: 1939d03f8c35ab427086176b621c26e6cea554955e7f3b6a13ae7e1bbe39b507

systemd-journal-remote-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: a2680ad6ebbe425f0dbb80831d50e3daa7975aa4c3450e53ad52a42dd2f2e621

systemd-libs-239-45.el8_4.12.ppc64le.rpm

SHA-256: 3e18abd9b527d762872f184743f657f2702b51a3eb2dfa85a734ce6cb5e5408a

systemd-libs-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: 01e11909388602080b29345f3cfcbb6f0c5f640d0c0ed70f587e2c99a8ec5752

systemd-pam-239-45.el8_4.12.ppc64le.rpm

SHA-256: c3c95dc9b53780db483b247691fdd500ac6dec927abd0ac68718968ae28056ad

systemd-pam-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: 4a3f277111bca0afb2c8d202fbbba6dcb7156fe07cba184f1830c956f7f004fa

systemd-tests-239-45.el8_4.12.ppc64le.rpm

SHA-256: 23e938da2d48961c99e53af7b12efd91d829b2f883f35f0acc483771e15e11ca

systemd-tests-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: cdd7a7585cae99b220083c7128e1cb628cafacb1c4e18f1b43d2c959856d513e

systemd-udev-239-45.el8_4.12.ppc64le.rpm

SHA-256: 49959f1d771ec31a3c11437943b5ab5bd0edf4d1e6ff37fc605e5a02c1b36f9d

systemd-udev-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: c3a5fc0d216416f89e49e363961aade16aa0d7d0fb44c224679be01bbb2c2b03

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

systemd-239-45.el8_4.12.src.rpm

SHA-256: a087ad66241478a92531f43b05d0e0419008077a2704292558123fe21323467b

x86_64

systemd-239-45.el8_4.12.i686.rpm

SHA-256: b6b51cce8aebf110e114e7c56fb21a4f441a3d3671cd76c67867f7c009ac6d01

systemd-239-45.el8_4.12.x86_64.rpm

SHA-256: b1e30787d6bd58c5e8d01bea7738df70be61d742ddfda514d63b200a6b94e609

systemd-container-239-45.el8_4.12.i686.rpm

SHA-256: 257dec52e25d862512c0ca3b3dab3acaa90f4904bbb910df928f0e6ec087fc1b

systemd-container-239-45.el8_4.12.x86_64.rpm

SHA-256: fb4ca24733e2f09128069d671ecbd5e3b311ab159607230a9ffa61d270bb6fc1

systemd-container-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: 33ccc32d3b7b49881d826fd5f555496674ad46e37400f9ea7e1ed76201e4a50d

systemd-container-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 707275e7de2d3825fea3f2198d75c0f8a1a4d62f0d43d9cabedc49d86f585d3e

systemd-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: ff14b4b3274cc3700452c32bbbf259b83355054cbeb693afb243065d0feb845a

systemd-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: dc66beda0638b9315935e4275ef470304c3dfd5a1762f441d87d4ffff188873f

systemd-debugsource-239-45.el8_4.12.i686.rpm

SHA-256: b72443b26b82deecd1203cb77ed4e9f3db8f0ed9e0d6c30433b6fe2e607574f3

systemd-debugsource-239-45.el8_4.12.x86_64.rpm

SHA-256: 875d1a00f536e126735ef1eeb459f9b26b9e65c06dde69f30f65dc97ec03c4b6

systemd-devel-239-45.el8_4.12.i686.rpm

SHA-256: bad046352ded1236c37dd9be4371439d8c1dbd6b46af89b55f0a3c57d352fa80

systemd-devel-239-45.el8_4.12.x86_64.rpm

SHA-256: 704fe210b83306f4e8289beb7d5093b4d79e8e719ea1d6ef0cc169c356470a66

systemd-journal-remote-239-45.el8_4.12.x86_64.rpm

SHA-256: 6776c4c4ac9f5d2d3925399f2b425be74755190905bb500e244baa29c1f13bce

systemd-journal-remote-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: cbf9bc582579fb8f21dd3ff6cd6ed195956e409786ed1b174fdf275926e3019f

systemd-journal-remote-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 0c8f1ac4350897265534e05f4930473b2d48f79a70e766aff409f3af8ae42473

systemd-libs-239-45.el8_4.12.i686.rpm

SHA-256: 3c4126ce148591450f972b4e167f450e402ed75e676b68dd1d82a70257527dcb

systemd-libs-239-45.el8_4.12.x86_64.rpm

SHA-256: 70e8bb354e22006bb8397db8d4ff2d018cb32de8a5f039c7488aef876d78b07f

systemd-libs-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: 024c7039ab2ba22a096c432373a97a8ed19f9b1c1570f157ace849edac68daeb

systemd-libs-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 6e6f33ab046cc3dca531619f00592b26f68a49b7e56392a80a06c4b995e351a6

systemd-pam-239-45.el8_4.12.x86_64.rpm

SHA-256: 480b225af4a03081f9b5be8de51b070a25a51068075ebda9ba4c38e8f4d3475d

systemd-pam-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: a5ea60cf998ed07b9c88b1a8e28047e6fd5cf4eb47e70e77891c31b2152ab25a

systemd-pam-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: e7ab7bc8ebdda6fd3df28135153405614f35b8d1adffb1e1b13a7702e2e25709

systemd-tests-239-45.el8_4.12.x86_64.rpm

SHA-256: 4a5acbbb84bb308d5df8743b1e424351a74480a331e0c12b4d2f75a215fe2507

systemd-tests-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: f333cb01ee0508f9bb1e0cbdb21092309fb000f78571315e630d5bbc88473894

systemd-tests-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 8487a96aa34010c558f07c7f5d868399e5069534ce03677f3b724d61f1d06a90

systemd-udev-239-45.el8_4.12.x86_64.rpm

SHA-256: 280331cc6eadcdd2579707fb5b4f905ba9a973c179f8622fcae621982311f074

systemd-udev-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: d9e491e2f6c6b8ff9412869b64746bd8573086068bcf20399afe9b176796f74a

systemd-udev-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: a186d2b26f7a3661b6759474be64d3e4ed73b78ae5f7655220c620c5e2d80be7

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

systemd-239-45.el8_4.12.src.rpm

SHA-256: a087ad66241478a92531f43b05d0e0419008077a2704292558123fe21323467b

aarch64

systemd-239-45.el8_4.12.aarch64.rpm

SHA-256: f5cf74aaf924679ea300467ae39631bc80afbb958d69dd199a57025011c1bb41

systemd-container-239-45.el8_4.12.aarch64.rpm

SHA-256: 60be3139bdd9844d50ab105c0144f5139c75882ec6734aa12f7124ecc83398eb

systemd-container-debuginfo-239-45.el8_4.12.aarch64.rpm

SHA-256: b94847489d2ef7336e29ae1ba153a5d7d1a290615d974f308d7e826ae4cd50a0

systemd-debuginfo-239-45.el8_4.12.aarch64.rpm

SHA-256: 44bead694065b4ee9f1bf2abbace7a9ee346d5c521c210df4ef70b2633736ece

systemd-debugsource-239-45.el8_4.12.aarch64.rpm

SHA-256: 8de4ec396f3e5f543f00d7ca7fb97c973e667cae00ecdc273a70f98aa8ce1b16

systemd-devel-239-45.el8_4.12.aarch64.rpm

SHA-256: eeeeaec5179beb49e064a781ec7d0b86bc617bc5bd70d1bace21ec950d591736

systemd-journal-remote-239-45.el8_4.12.aarch64.rpm

SHA-256: a5f6f63bc772c70360536ce1558965f1c692b0573df6a698febe3cd5b21a959c

systemd-journal-remote-debuginfo-239-45.el8_4.12.aarch64.rpm

SHA-256: 79d8bdc55f12890942e42fe27be9e2284beeef55e17c34fd5ee0d92e34cc0e63

systemd-libs-239-45.el8_4.12.aarch64.rpm

SHA-256: 8d611755cf614f04aaf42751672f2f88d56367b9f40863f22d511468543e20ca

systemd-libs-debuginfo-239-45.el8_4.12.aarch64.rpm

SHA-256: 86671c6eafc9bf3e183991d863945107058a1d1d391a5534b80135ff37187476

systemd-pam-239-45.el8_4.12.aarch64.rpm

SHA-256: d06acc8ca8791373b81e189ae7217714449299878486227d84031dc446c303e0

systemd-pam-debuginfo-239-45.el8_4.12.aarch64.rpm

SHA-256: 071fc07042f96ab1e63384ac550f6aaa2c9ea33ea995752a243da91cfe3291f8

systemd-tests-239-45.el8_4.12.aarch64.rpm

SHA-256: 459f00b503fd63d371eafb40920a9ed1cd9d2de520f43b6991f79733190a2cff

systemd-tests-debuginfo-239-45.el8_4.12.aarch64.rpm

SHA-256: 2e535afb222c592b5f32fbd96c2b282672ad83d020f92d9b89139441987fb6b3

systemd-udev-239-45.el8_4.12.aarch64.rpm

SHA-256: 25d026cf5c202a9184b337c0729cbea47fecf68f7c22ecc94c486e9289bb7c8c

systemd-udev-debuginfo-239-45.el8_4.12.aarch64.rpm

SHA-256: a445a9e2d5ba6810a4fb17ddc7dde0a7545fe6297c8f8b7f6bf861a848782e55

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

systemd-239-45.el8_4.12.src.rpm

SHA-256: a087ad66241478a92531f43b05d0e0419008077a2704292558123fe21323467b

ppc64le

systemd-239-45.el8_4.12.ppc64le.rpm

SHA-256: fb40fd6eb874f785c1dace13a04f14472ec55f43f407f8edb68d4892805aaca7

systemd-container-239-45.el8_4.12.ppc64le.rpm

SHA-256: 0b773bd853b8c86b94d01e9717c1d23cadb8491ac1f3112cbd1b9f9b41f15665

systemd-container-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: 1627e112fb2eb28b619ace2f91a37a6dba1430fc58d4feacd35c177350ea57a3

systemd-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: 16781e2b6b4453b009c7f10c0bc90e1f15adf1064119ec4211917386e7f1d4af

systemd-debugsource-239-45.el8_4.12.ppc64le.rpm

SHA-256: 5a91db17eb0c8fdc12866350f71a20095775777108ef0ce906feec5867875769

systemd-devel-239-45.el8_4.12.ppc64le.rpm

SHA-256: 876a988ad2829154d7dbd2d3a09b2c128a41e9378450e724b2e5578a7fb1b946

systemd-journal-remote-239-45.el8_4.12.ppc64le.rpm

SHA-256: 1939d03f8c35ab427086176b621c26e6cea554955e7f3b6a13ae7e1bbe39b507

systemd-journal-remote-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: a2680ad6ebbe425f0dbb80831d50e3daa7975aa4c3450e53ad52a42dd2f2e621

systemd-libs-239-45.el8_4.12.ppc64le.rpm

SHA-256: 3e18abd9b527d762872f184743f657f2702b51a3eb2dfa85a734ce6cb5e5408a

systemd-libs-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: 01e11909388602080b29345f3cfcbb6f0c5f640d0c0ed70f587e2c99a8ec5752

systemd-pam-239-45.el8_4.12.ppc64le.rpm

SHA-256: c3c95dc9b53780db483b247691fdd500ac6dec927abd0ac68718968ae28056ad

systemd-pam-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: 4a3f277111bca0afb2c8d202fbbba6dcb7156fe07cba184f1830c956f7f004fa

systemd-tests-239-45.el8_4.12.ppc64le.rpm

SHA-256: 23e938da2d48961c99e53af7b12efd91d829b2f883f35f0acc483771e15e11ca

systemd-tests-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: cdd7a7585cae99b220083c7128e1cb628cafacb1c4e18f1b43d2c959856d513e

systemd-udev-239-45.el8_4.12.ppc64le.rpm

SHA-256: 49959f1d771ec31a3c11437943b5ab5bd0edf4d1e6ff37fc605e5a02c1b36f9d

systemd-udev-debuginfo-239-45.el8_4.12.ppc64le.rpm

SHA-256: c3a5fc0d216416f89e49e363961aade16aa0d7d0fb44c224679be01bbb2c2b03

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

systemd-239-45.el8_4.12.src.rpm

SHA-256: a087ad66241478a92531f43b05d0e0419008077a2704292558123fe21323467b

x86_64

systemd-239-45.el8_4.12.i686.rpm

SHA-256: b6b51cce8aebf110e114e7c56fb21a4f441a3d3671cd76c67867f7c009ac6d01

systemd-239-45.el8_4.12.x86_64.rpm

SHA-256: b1e30787d6bd58c5e8d01bea7738df70be61d742ddfda514d63b200a6b94e609

systemd-container-239-45.el8_4.12.i686.rpm

SHA-256: 257dec52e25d862512c0ca3b3dab3acaa90f4904bbb910df928f0e6ec087fc1b

systemd-container-239-45.el8_4.12.x86_64.rpm

SHA-256: fb4ca24733e2f09128069d671ecbd5e3b311ab159607230a9ffa61d270bb6fc1

systemd-container-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: 33ccc32d3b7b49881d826fd5f555496674ad46e37400f9ea7e1ed76201e4a50d

systemd-container-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 707275e7de2d3825fea3f2198d75c0f8a1a4d62f0d43d9cabedc49d86f585d3e

systemd-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: ff14b4b3274cc3700452c32bbbf259b83355054cbeb693afb243065d0feb845a

systemd-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: dc66beda0638b9315935e4275ef470304c3dfd5a1762f441d87d4ffff188873f

systemd-debugsource-239-45.el8_4.12.i686.rpm

SHA-256: b72443b26b82deecd1203cb77ed4e9f3db8f0ed9e0d6c30433b6fe2e607574f3

systemd-debugsource-239-45.el8_4.12.x86_64.rpm

SHA-256: 875d1a00f536e126735ef1eeb459f9b26b9e65c06dde69f30f65dc97ec03c4b6

systemd-devel-239-45.el8_4.12.i686.rpm

SHA-256: bad046352ded1236c37dd9be4371439d8c1dbd6b46af89b55f0a3c57d352fa80

systemd-devel-239-45.el8_4.12.x86_64.rpm

SHA-256: 704fe210b83306f4e8289beb7d5093b4d79e8e719ea1d6ef0cc169c356470a66

systemd-journal-remote-239-45.el8_4.12.x86_64.rpm

SHA-256: 6776c4c4ac9f5d2d3925399f2b425be74755190905bb500e244baa29c1f13bce

systemd-journal-remote-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: cbf9bc582579fb8f21dd3ff6cd6ed195956e409786ed1b174fdf275926e3019f

systemd-journal-remote-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 0c8f1ac4350897265534e05f4930473b2d48f79a70e766aff409f3af8ae42473

systemd-libs-239-45.el8_4.12.i686.rpm

SHA-256: 3c4126ce148591450f972b4e167f450e402ed75e676b68dd1d82a70257527dcb

systemd-libs-239-45.el8_4.12.x86_64.rpm

SHA-256: 70e8bb354e22006bb8397db8d4ff2d018cb32de8a5f039c7488aef876d78b07f

systemd-libs-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: 024c7039ab2ba22a096c432373a97a8ed19f9b1c1570f157ace849edac68daeb

systemd-libs-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 6e6f33ab046cc3dca531619f00592b26f68a49b7e56392a80a06c4b995e351a6

systemd-pam-239-45.el8_4.12.x86_64.rpm

SHA-256: 480b225af4a03081f9b5be8de51b070a25a51068075ebda9ba4c38e8f4d3475d

systemd-pam-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: a5ea60cf998ed07b9c88b1a8e28047e6fd5cf4eb47e70e77891c31b2152ab25a

systemd-pam-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: e7ab7bc8ebdda6fd3df28135153405614f35b8d1adffb1e1b13a7702e2e25709

systemd-tests-239-45.el8_4.12.x86_64.rpm

SHA-256: 4a5acbbb84bb308d5df8743b1e424351a74480a331e0c12b4d2f75a215fe2507

systemd-tests-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: f333cb01ee0508f9bb1e0cbdb21092309fb000f78571315e630d5bbc88473894

systemd-tests-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: 8487a96aa34010c558f07c7f5d868399e5069534ce03677f3b724d61f1d06a90

systemd-udev-239-45.el8_4.12.x86_64.rpm

SHA-256: 280331cc6eadcdd2579707fb5b4f905ba9a973c179f8622fcae621982311f074

systemd-udev-debuginfo-239-45.el8_4.12.i686.rpm

SHA-256: d9e491e2f6c6b8ff9412869b64746bd8573086068bcf20399afe9b176796f74a

systemd-udev-debuginfo-239-45.el8_4.12.x86_64.rpm

SHA-256: a186d2b26f7a3661b6759474be64d3e4ed73b78ae5f7655220c620c5e2d80be7

Related news

CVE-2022-22307: IBM Security Guardium is affected by multiple vulnerabilities

IBM Security Guardium 11.3, 11.4, and 11.5 could allow a local user to obtain elevated privileges due to incorrect authorization checks. IBM X-Force ID: 216753.

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

Red Hat Security Advisory 2022-6696-01

Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.

RHSA-2022:6696: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-31150: nodejs16: CRLF injection in node-undici * CVE-2022-31151: nodejs/undici: Cookie headers uncleared on cross-origin redirect * CV...

Red Hat Security Advisory 2022-6308-01

Red Hat Security Advisory 2022-6308-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.49. There are no RPMs for this release. Space precludes documenting all of the container images in this advisory. Issues addressed include bypass and code execution vulnerabilities.

RHSA-2022:6308: Red Hat Security Advisory: OpenShift Container Platform 4.8.49 security update

Red Hat OpenShift Container Platform release 4.8.49 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (is...

Red Hat Security Advisory 2022-6507-01

Red Hat Security Advisory 2022-6507-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6507: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6422-01

Red Hat Security Advisory 2022-6422-01 - Multicluster Engine for Kubernetes 2.0.2 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

RHSA-2022:6429: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.4 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.4 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28500: nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions * CVE-2021-23337: nodejs-lodash: command injection via template * CVE-2022-0512: nodejs-url-parse: authorization bypass through user-controlled key * CVE-2022-0639: npm-url-parse: Authorization Bypass Through User-Controlled Key * CVE-2022-0686: npm-url-parse: Authorization bypass thr...

RHSA-2022:6317: Red Hat Security Advisory: OpenShift Container Platform 4.9.48 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.48 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass

Red Hat Security Advisory 2022-6263-01

Red Hat Security Advisory 2022-6263-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include denial of service and out of bounds read vulnerabilities.

CVE-2022-2526: resolved: pin stream while calling callbacks for it · systemd/systemd@d973d94

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Red Hat Security Advisory 2022-6258-01

Red Hat Security Advisory 2022-6258-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.31. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2022-6287-01

Red Hat Security Advisory 2022-6287-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.3. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-6252-02

Red Hat Security Advisory 2022-6252-02 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 3.11.784. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2022-6182-01

Red Hat Security Advisory 2022-6182-01 - Openshift Logging Bug Fix Release. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6345-01

Red Hat Security Advisory 2022-6345-01 - Multicluster engine for Kubernetes 2.1 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6344-01

Red Hat Security Advisory 2022-6344-01 - Logging Subsystem 5.5.1 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

RHSA-2022:6252: Red Hat Security Advisory: OpenShift Container Platform 3.11.784 security update

Red Hat OpenShift Container Platform release 3.11.784 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6271: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.12 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS

Red Hat Security Advisory 2022-6206-01

Red Hat Security Advisory 2022-6206-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.

Ubuntu Security Notice USN-5583-1

Ubuntu Security Notice 5583-1 - It was discovered that systemd incorrectly handled certain DNS requests, which leads to user-after-free vulnerability. An attacker could possibly use this issue to cause a crash or execute arbitrary code.

RHSA-2022:6206: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c

Red Hat Security Advisory 2022-6163-01

Red Hat Security Advisory 2022-6163-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2022-6160-01

Red Hat Security Advisory 2022-6160-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2022-6161-01

Red Hat Security Advisory 2022-6161-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.

RHSA-2022:6160: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c

RHSA-2022:6162: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c

RHSA-2022:6163: Red Hat Security Advisory: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c