First published: Tue Jun 06 2023(Updated: )
Security Fix(es):<br><li> kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)</li> <li> kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)</li> <li> samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)</li> <li> kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)</li> <li> kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)</li> <li> openvswitch: ip proto 0 triggers incorrect handling (CVE-2023-1668)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/redhat-release-virtualization-host | <4.5.3-7.el8e | 4.5.3-7.el8e |
redhat/redhat-release-virtualization-host-content | <4.5.3-7.el8e | 4.5.3-7.el8e |
redhat/redhat-virtualization-host-image-update-placeholder | <4.5.3-7.el8e | 4.5.3-7.el8e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.