[Apollo] Advisories Statistics light light Login

RLSA-2023:2802

Security Mirrored from RHSA-2023:2802
Issued at: 2025-11-28
Updated at: 2025-12-07

Synopsis

Moderate: container-tools:4.0 security and bug fix update



Description

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)

* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)

* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)

* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)

* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)

* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)

* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)

* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)

* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)

* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)

* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)

* podman: symlink exchange attack in podman export volume (CVE-2023-0778)

* podman: possible information disclosure and modification (CVE-2022-2989)

* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.



Affected products

Rocky Linux 8 aarch64 Rocky Linux 8 x86_64

Fixes

2107342 2107371 2107374 2107376 2107383 2107386 2107388 2107390 2107392 2113814 2121445 2124669 2161274 2168256

CVEs

CVE-2022-1705 CVE-2022-1962 CVE-2022-27664 CVE-2022-28131 CVE-2022-2989 CVE-2022-30630 CVE-2022-30631 CVE-2022-30632 CVE-2022-30633 CVE-2022-30635 CVE-2022-32148 CVE-2022-32189 CVE-2022-41717 CVE-2023-0778

Affected packages

Rocky Linux 8 x86_64 - AppStream

cockpit-podman-0:46-1.module+el8.9.0+1445+07728297.noarch.rpm cockpit-podman-0:46-1.module+el8.9.0+1445+07728297.src.rpm crit-0:3.15-3.module+el8.9.0+1445+07728297.x86_64.rpm criu-0:3.15-3.module+el8.9.0+1445+07728297.src.rpm criu-0:3.15-3.module+el8.9.0+1445+07728297.x86_64.rpm criu-debuginfo-0:3.15-3.module+el8.9.0+1445+07728297.x86_64.rpm criu-debugsource-0:3.15-3.module+el8.9.0+1445+07728297.x86_64.rpm criu-devel-0:3.15-3.module+el8.9.0+1445+07728297.x86_64.rpm criu-libs-0:3.15-3.module+el8.9.0+1445+07728297.x86_64.rpm criu-libs-debuginfo-0:3.15-3.module+el8.9.0+1445+07728297.x86_64.rpm libslirp-0:4.4.0-1.module+el8.9.0+1445+07728297.src.rpm libslirp-0:4.4.0-1.module+el8.9.0+1445+07728297.x86_64.rpm libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+1445+07728297.x86_64.rpm libslirp-debugsource-0:4.4.0-1.module+el8.9.0+1445+07728297.x86_64.rpm libslirp-devel-0:4.4.0-1.module+el8.9.0+1445+07728297.x86_64.rpm oci-seccomp-bpf-hook-0:1.2.5-2.module+el8.9.0+1445+07728297.src.rpm oci-seccomp-bpf-hook-0:1.2.5-2.module+el8.9.0+1445+07728297.x86_64.rpm oci-seccomp-bpf-hook-debuginfo-0:1.2.5-2.module+el8.9.0+1445+07728297.x86_64.rpm oci-seccomp-bpf-hook-debugsource-0:1.2.5-2.module+el8.9.0+1445+07728297.x86_64.rpm python3-criu-0:3.15-3.module+el8.9.0+1445+07728297.x86_64.rpm

Rocky Linux 8 aarch64 - AppStream

cockpit-podman-0:46-1.module+el8.9.0+1445+07728297.noarch.rpm cockpit-podman-0:46-1.module+el8.9.0+1445+07728297.src.rpm crit-0:3.15-3.module+el8.9.0+1445+07728297.aarch64.rpm criu-0:3.15-3.module+el8.9.0+1445+07728297.aarch64.rpm criu-0:3.15-3.module+el8.9.0+1445+07728297.src.rpm criu-debuginfo-0:3.15-3.module+el8.9.0+1445+07728297.aarch64.rpm criu-debugsource-0:3.15-3.module+el8.9.0+1445+07728297.aarch64.rpm criu-devel-0:3.15-3.module+el8.9.0+1445+07728297.aarch64.rpm criu-libs-0:3.15-3.module+el8.9.0+1445+07728297.aarch64.rpm criu-libs-debuginfo-0:3.15-3.module+el8.9.0+1445+07728297.aarch64.rpm libslirp-0:4.4.0-1.module+el8.9.0+1445+07728297.aarch64.rpm libslirp-0:4.4.0-1.module+el8.9.0+1445+07728297.src.rpm libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+1445+07728297.aarch64.rpm libslirp-debugsource-0:4.4.0-1.module+el8.9.0+1445+07728297.aarch64.rpm libslirp-devel-0:4.4.0-1.module+el8.9.0+1445+07728297.aarch64.rpm oci-seccomp-bpf-hook-0:1.2.5-2.module+el8.9.0+1445+07728297.aarch64.rpm oci-seccomp-bpf-hook-0:1.2.5-2.module+el8.9.0+1445+07728297.src.rpm oci-seccomp-bpf-hook-debuginfo-0:1.2.5-2.module+el8.9.0+1445+07728297.aarch64.rpm oci-seccomp-bpf-hook-debugsource-0:1.2.5-2.module+el8.9.0+1445+07728297.aarch64.rpm python3-criu-0:3.15-3.module+el8.9.0+1445+07728297.aarch64.rpm