{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2022:7683","synopsis":"Moderate: kernel security, bug fix, and enhancement update","severity":"SEVERITY_MODERATE","topic":"An update for kernel is now available for Rocky Linux 8.\nRocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.","description":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAdditional Changes:\nFor detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"1946279","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1946279","description":"CVE-2021-30002 kernel: memory leak for large arguments in video_usercopy function in drivers\/media\/v4l2-core\/v4l2-ioctl.c"},{"ticket":"1948442","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1948442","description":"[Hyper-V][RHEL8.4]On Hyper-V Host set gen1 MAX resolution > 3840x4320, GUI start failed, sometimes get kernel panic"},{"ticket":"1977993","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1977993","description":"Add basic support for DPCD backlight control for Nouveau"},{"ticket":"1978539","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1978539","description":"Add HMM and vm kselftests to CI"},{"ticket":"1980646","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1980646","description":"CVE-2021-3640 kernel: use-after-free vulnerability in function sco_sock_sendmsg()"},{"ticket":"2004037","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2004037","description":"Percpu counter usage is gradually getting increasing during podman container recreation."},{"ticket":"2019942","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2019942","description":"Touchpad on Fujitsu Lifebook T725 not detected"},{"ticket":"2037386","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2037386","description":"CVE-2022-0168 kernel: smb2_ioctl_query_info NULL Pointer Dereference"},{"ticket":"2042424","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2042424","description":"kernel-tools does not perform a daemon reload when installed\/upgraded"},{"ticket":"2044837","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2044837","description":"[Marvell 8.7 FEAT] update qedi driver to latest upstream"},{"ticket":"2051444","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2051444","description":"CVE-2022-24448 kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR"},{"ticket":"2053632","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2053632","description":"CVE-2022-0617 kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback"},{"ticket":"2056383","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2056383","description":"System freezes with callstack in dmesg: ret_from_fork"},{"ticket":"2058369","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2058369","description":"WARNING due to invalid error code from smb2_get_enc_key, followed by crash"},{"ticket":"2058395","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2058395","description":"CVE-2022-0854 kernel: swiotlb information leak with DMA_FROM_DEVICE"},{"ticket":"2059928","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2059928","description":"CVE-2020-36516 kernel: off-path attacker may inject data or terminate victim's TCP session"},{"ticket":"2062284","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2062284","description":"CVE-2022-23960 hw: cpu: arm64: Spectre-BHB"},{"ticket":"2062780","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2062780","description":"Make possible to get information about network interface over rtnetlink using alternative interface name"},{"ticket":"2066614","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2066614","description":"CVE-2022-1016 kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM"},{"ticket":"2066706","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2066706","description":"CVE-2022-1048 kernel: race condition in snd_pcm_hw_free leading to use-after-free"},{"ticket":"2066976","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2066976","description":"AF_PACKET SOCK_RAW drops GSO tagged packets."},{"ticket":"2069408","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2069408","description":"CVE-2022-27950 kernel: memory leak in drivers\/hid\/hid-elo.c"},{"ticket":"2069472","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2069472","description":"block: update with v5.17 wrt. fixes"},{"ticket":"2070205","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2070205","description":"CVE-2022-1184 kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image"},{"ticket":"2070220","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2070220","description":"CVE-2022-1055 kernel: use-after-free in tc_new_tfilter() in net\/sched\/cls_api.c"},{"ticket":"2072552","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2072552","description":"XFS: sync to upstream v5.13"},{"ticket":"2073064","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2073064","description":"CVE-2022-28390 kernel: double free in ems_usb_start_xmit in drivers\/net\/can\/usb\/ems_usb.c"},{"ticket":"2074208","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2074208","description":"CVE-2022-28893 kernel: use after free in SUNRPC subsystem"},{"ticket":"2074317","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2074317","description":"genirq\/affinity: Consider that CPUs on nodes can be unbalanced"},{"ticket":"2080095","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2080095","description":"[ESXi][RHEL8.7]Bring VMCI up to date with upstream"},{"ticket":"2084183","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2084183","description":"CVE-2022-21499 kernel: possible to use the debugger to write zero into a location of choice"},{"ticket":"2084479","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2084479","description":"CVE-2022-2639 kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"},{"ticket":"2088021","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2088021","description":"CVE-2022-29581 kernel: use-after-free due to improper update of reference count in net\/sched\/cls_u32.c"},{"ticket":"2089815","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2089815","description":"CVE-2022-1852 kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS"},{"ticket":"2090940","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2090940","description":"block layer: dependency for fixing device mapper io accouting"},{"ticket":"2091539","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2091539","description":"kernel panics if iwlwifi firmware can not be loaded"},{"ticket":"2096178","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2096178","description":"CVE-2022-2078 kernel: buffer overflow in nft_set_desc_concat_parse()"},{"ticket":"2100259","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2100259","description":"backport audit_log_kern_module memleak fix from v5.19-rc3"},{"ticket":"2107594","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2107594","description":"backport vsock commits for RHEL-8.7"},{"ticket":"2109327","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2109327","description":"[bonding] bugfix update from v5.19"},{"ticket":"2112693","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2112693","description":"CVE-2020-36558 kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference"},{"ticket":"2114577","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2114577","description":"Regression in setting nfs mount options"},{"ticket":"2114878","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2114878","description":"CVE-2022-2586 kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation"},{"ticket":"2115065","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2115065","description":"CVE-2022-26373 hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions"},{"ticket":"2115278","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2115278","description":"CVE-2022-36946 kernel: DoS in nfqnl_mangle in net\/netfilter\/nfnetlink_queue.c"},{"ticket":"2120175","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2120175","description":"CVE-2022-2938 kernel: use-after-free when psi trigger is destroyed while being polled"},{"ticket":"2123695","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2123695","description":"CVE-2022-20368 kernel: net\/packet: slab-out-of-bounds access in packet_recvmsg()"}],"cves":[{"name":"CVE-2020-36516","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2020-36516.json","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:L\/UI:N\/S:U\/C:N\/I:H\/A:L","cvss3BaseScore":"5.9","cwe":"CWE-290"},{"name":"CVE-2020-36558","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2020-36558.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.1","cwe":"CWE-476"},{"name":"CVE-2021-30002","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2021-30002.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"6.2","cwe":"CWE-772"},{"name":"CVE-2021-3640","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2021-3640.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"6.7","cwe":"CWE-362->CWE-416"},{"name":"CVE-2022-0168","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-0168.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-476"},{"name":"CVE-2022-0617","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-0617.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.7","cwe":"CWE-476"},{"name":"CVE-2022-0854","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-0854.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:N\/A:N","cvss3BaseScore":"5.5","cwe":"CWE-401"},{"name":"CVE-2022-1016","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-1016.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:N\/A:N","cvss3BaseScore":"5.5","cwe":"CWE-824"},{"name":"CVE-2022-1048","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-1048.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.0","cwe":"CWE-416"},{"name":"CVE-2022-1055","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-1055.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.8","cwe":"CWE-416"},{"name":"CVE-2022-1184","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-1184.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-416"},{"name":"CVE-2022-1852","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-1852.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-476"},{"name":"CVE-2022-20368","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-20368.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.0","cwe":"CWE-787"},{"name":"CVE-2022-2078","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-2078.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-120"},{"name":"CVE-2022-21499","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-21499.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"6.7","cwe":"(CWE-267|CWE-787)"},{"name":"CVE-2022-23960","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-23960.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:N\/A:N","cvss3BaseScore":"4.7","cwe":""},{"name":"CVE-2022-24448","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-24448.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N","cvss3BaseScore":"3.3","cwe":"CWE-908"},{"name":"CVE-2022-2586","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-2586.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"6.7","cwe":"CWE-416"},{"name":"CVE-2022-26373","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-26373.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:N\/A:N","cvss3BaseScore":"5.5","cwe":"CWE-200"},{"name":"CVE-2022-2639","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-2639.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.0","cwe":"CWE-192->CWE-787"},{"name":"CVE-2022-27950","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-27950.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.1","cwe":"CWE-401"},{"name":"CVE-2022-28390","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-28390.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.0","cwe":"CWE-415"},{"name":"CVE-2022-28893","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-28893.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"6.2","cwe":"CWE-416"},{"name":"CVE-2022-2938","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-2938.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.8","cwe":"CWE-416"},{"name":"CVE-2022-29581","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-29581.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.8","cwe":"CWE-416"},{"name":"CVE-2022-36946","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-36946.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"6.2","cwe":""}],"references":[],"publishedAt":"2022-11-13T07:54:39.283523Z","rpms":{},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2022:7683 kernel security

November 13, 2022
An update for kernel is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate

Summary

An update for kernel is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


RPMs

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36516.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36558.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30002.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3640.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0168.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0617.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0854.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1048.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1055.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1184.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1852.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2078.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21499.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23960.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24448.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2586.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2639.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27950.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28390.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28893.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2938.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json

Severity
Name: RLSA-2022:7683
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1946279

https://bugzilla.redhat.com/show_bug.cgi?id=1948442

https://bugzilla.redhat.com/show_bug.cgi?id=1977993

https://bugzilla.redhat.com/show_bug.cgi?id=1978539

https://bugzilla.redhat.com/show_bug.cgi?id=1980646

https://bugzilla.redhat.com/show_bug.cgi?id=2004037

https://bugzilla.redhat.com/show_bug.cgi?id=2019942

https://bugzilla.redhat.com/show_bug.cgi?id=2037386

https://bugzilla.redhat.com/show_bug.cgi?id=2042424

https://bugzilla.redhat.com/show_bug.cgi?id=2044837

https://bugzilla.redhat.com/show_bug.cgi?id=2051444

https://bugzilla.redhat.com/show_bug.cgi?id=2053632

https://bugzilla.redhat.com/show_bug.cgi?id=2056383

https://bugzilla.redhat.com/show_bug.cgi?id=2058369

https://bugzilla.redhat.com/show_bug.cgi?id=2058395

https://bugzilla.redhat.com/show_bug.cgi?id=2059928

https://bugzilla.redhat.com/show_bug.cgi?id=2062284

https://bugzilla.redhat.com/show_bug.cgi?id=2062780

https://bugzilla.redhat.com/show_bug.cgi?id=2066614

https://bugzilla.redhat.com/show_bug.cgi?id=2066706

https://bugzilla.redhat.com/show_bug.cgi?id=2066976

https://bugzilla.redhat.com/show_bug.cgi?id=2069408

https://bugzilla.redhat.com/show_bug.cgi?id=2069472

https://bugzilla.redhat.com/show_bug.cgi?id=2070205

https://bugzilla.redhat.com/show_bug.cgi?id=2070220

https://bugzilla.redhat.com/show_bug.cgi?id=2072552

https://bugzilla.redhat.com/show_bug.cgi?id=2073064

https://bugzilla.redhat.com/show_bug.cgi?id=2074208

https://bugzilla.redhat.com/show_bug.cgi?id=2074317

https://bugzilla.redhat.com/show_bug.cgi?id=2080095

https://bugzilla.redhat.com/show_bug.cgi?id=2084183

https://bugzilla.redhat.com/show_bug.cgi?id=2084479

https://bugzilla.redhat.com/show_bug.cgi?id=2088021

https://bugzilla.redhat.com/show_bug.cgi?id=2089815

https://bugzilla.redhat.com/show_bug.cgi?id=2090940

https://bugzilla.redhat.com/show_bug.cgi?id=2091539

https://bugzilla.redhat.com/show_bug.cgi?id=2096178

https://bugzilla.redhat.com/show_bug.cgi?id=2100259

https://bugzilla.redhat.com/show_bug.cgi?id=2107594

https://bugzilla.redhat.com/show_bug.cgi?id=2109327

https://bugzilla.redhat.com/show_bug.cgi?id=2112693

https://bugzilla.redhat.com/show_bug.cgi?id=2114577

https://bugzilla.redhat.com/show_bug.cgi?id=2114878

https://bugzilla.redhat.com/show_bug.cgi?id=2115065

https://bugzilla.redhat.com/show_bug.cgi?id=2115278

https://bugzilla.redhat.com/show_bug.cgi?id=2120175

https://bugzilla.redhat.com/show_bug.cgi?id=2123695


Related News