Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:7058 - Security Advisory
Issued:
2023-11-14
Updated:
2023-11-14

RHSA-2023:7058 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: rhc security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for rhc is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and subscription management.

Security Fix(es):

  • net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
  • BZ - 2222782 - update rhc to 0.2.3
  • BZ - 2223405 - `rhc connect` fails to contact config manager w/stage
  • BZ - 2227014 - Bash completion of rhc does not work
  • BZ - 2227019 - rhc fails to retrieve the system profile
  • BZ - 2227141 - RFE: Prevent message content being logged at any level

CVEs

  • CVE-2022-41723

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
rhc-0.2.4-3.el8_9.src.rpm SHA-256: 9c5a7f66dca40d2dfcd7d2f411d39d88a1955709640389493f3b0b7b9e83d415
x86_64
rhc-0.2.4-3.el8_9.x86_64.rpm SHA-256: 9f92eaeb0c76801a64307d272a41396c411103613f4ce8f724e1129b35b884a2
rhc-debuginfo-0.2.4-3.el8_9.x86_64.rpm SHA-256: 03a783419de9368707f4f63002d8dc19959980d05589eb9c58d4f16fd9857fc0
rhc-debugsource-0.2.4-3.el8_9.x86_64.rpm SHA-256: 18ffed6d65d00f3cea2d9d2c84b061a6cc7724f83af9f3cc3cb1c14f3358720f

Red Hat Enterprise Linux for IBM z Systems 8

SRPM
rhc-0.2.4-3.el8_9.src.rpm SHA-256: 9c5a7f66dca40d2dfcd7d2f411d39d88a1955709640389493f3b0b7b9e83d415
s390x
rhc-0.2.4-3.el8_9.s390x.rpm SHA-256: d7f9902a06c8babf9daec398970ee9ebcbd95525ca34263f6c267ad64f5c26dd
rhc-debuginfo-0.2.4-3.el8_9.s390x.rpm SHA-256: 0d46517e6567ea89197c0c02ef6eca886c482867a62818db21fc4c6af3cf076e
rhc-debugsource-0.2.4-3.el8_9.s390x.rpm SHA-256: a5bd3af4bc688964772ca54ae2a2adb251774522b2c9237a253957d47cbde9d4

Red Hat Enterprise Linux for Power, little endian 8

SRPM
rhc-0.2.4-3.el8_9.src.rpm SHA-256: 9c5a7f66dca40d2dfcd7d2f411d39d88a1955709640389493f3b0b7b9e83d415
ppc64le
rhc-0.2.4-3.el8_9.ppc64le.rpm SHA-256: bd939add77baacb9acbb25f7d251dcfb8a88fedb1310e0f32820815045c110aa
rhc-debuginfo-0.2.4-3.el8_9.ppc64le.rpm SHA-256: aca487c9330065ccfd9ff0607b0cb8698c3dc6a0a84521152fd7c7394757ba6a
rhc-debugsource-0.2.4-3.el8_9.ppc64le.rpm SHA-256: 4b9bf34febb5f4528ece58d65257b7b853a8767d46b4ffbcdea4f04e3f18f071

Red Hat Enterprise Linux for ARM 64 8

SRPM
rhc-0.2.4-3.el8_9.src.rpm SHA-256: 9c5a7f66dca40d2dfcd7d2f411d39d88a1955709640389493f3b0b7b9e83d415
aarch64
rhc-0.2.4-3.el8_9.aarch64.rpm SHA-256: 605e032fb3eb17e2033044b8240658985b6afee5098de6d9693804d8baa7c96c
rhc-debuginfo-0.2.4-3.el8_9.aarch64.rpm SHA-256: 0422be68b56050a7f24433364d0fb5dcf18134b3a9ed5fae7ead827d35ae0e16
rhc-debugsource-0.2.4-3.el8_9.aarch64.rpm SHA-256: f25d5089d04374a3e8da069a5d8622e25c4363bf375d552eb5ffc526fca40f6e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility