FEDORA-EPEL-2022-e228f64914
Packages in this update:
openssl3-3.0.1-43.el8.1
Update description:
Security fix for CVE-2022-3602 and CVE-2022-3786
openssl3-3.0.1-43.el8.1
Security fix for CVE-2022-3602 and CVE-2022-3786
xen-4.16.2-3.fc37
x86: unintended memory sharing between guests [XSA-412, CVE-2022-42327]
Xenstore: Guests can crash xenstored [XSA-414, CVE-2022-42309]
Xenstore: Guests can create orphaned Xenstore nodes [XSA-415,
CVE-2022-42310]
Xenstore: guests can let run xenstored out of memory [XSA-326,
CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314,
CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318]
Xenstore: Guests can cause Xenstore to not free temporary memory
[XSA-416, CVE-2022-42319]
Xenstore: Guests can get access to Xenstore nodes of deleted domains
[XSA-417, CVE-2022-42320]
Xenstore: Guests can crash xenstored via exhausting the stack
[XSA-418, CVE-2022-42321]
Xenstore: Cooperating guests can create arbitrary numbers of nodes
[XSA-419, CVE-2022-42322, CVE-2022-42323]
Oxenstored 32->31 bit integer truncation issues [XSA-420, CVE-2022-42324]
Xenstore: Guests can create arbitrary number of nodes via transactions
[XSA-421, CVE-2022-42325, CVE-2022-42326]
The application was signed using a key length less than or equal to 1024 bits, making it potentially vulnerable to forged digital signatures. An attacker could forge the same digital signature of the app after maliciously modifying the app.
exim-4.96-4.el7
Fixed use after free in dmarc_dns_lookup (CVE-2022-3620).
exim-4.96-4.el8
Fixed use after free in dmarc_dns_lookup (CVE-2022-3620).
exim-4.96-4.el9
Fixed use after free in dmarc_dns_lookup (CVE-2022-3620).
exim-4.96-5.fc35
Fixed use after free in dmarc_dns_lookup (CVE-2022-3620).
exim-4.96-5.fc36
Fixed use after free in dmarc_dns_lookup (CVE-2022-3620).
openssl-3.0.5-2.fc36
Security fix for CVE-2022-3602 and CVE-2022-3786
mingw-gcc-11.2.1-6.fc36
Backport fixes for CVE-2021-3826 and CVE-2022-27943.