7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.005 Low
EPSS
Percentile
75.5%
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=2045880
bugzilla.redhat.com/show_bug.cgi?id=2085361
bugzilla.redhat.com/show_bug.cgi?id=2107342
bugzilla.redhat.com/show_bug.cgi?id=2107371
bugzilla.redhat.com/show_bug.cgi?id=2107374
bugzilla.redhat.com/show_bug.cgi?id=2107376
bugzilla.redhat.com/show_bug.cgi?id=2107383
bugzilla.redhat.com/show_bug.cgi?id=2107386
bugzilla.redhat.com/show_bug.cgi?id=2107390
bugzilla.redhat.com/show_bug.cgi?id=2107392
errata.rockylinux.org/RLSA-2022:7529
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.005 Low
EPSS
Percentile
75.5%