Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5317: Red Hat Security Advisory: libxml2 security update

An update for libxml2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-29824: libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

概述

Moderate: libxml2 security update

类型/严重性

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

标题

An update for libxml2 is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

描述

The libxml2 library is a development toolbox providing the implementation of various XML standards.

Security Fix(es):

  • libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write (CVE-2022-29824)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

解决方案

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The desktop must be restarted (log out, then log back in) for this update to take effect.

受影响的产品

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

修复

  • BZ - 2082158 - CVE-2022-29824 libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write

参考

  • https://access.redhat.com/security/updates/classification/#moderate

Red Hat Enterprise Linux for x86_64 8

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

x86_64

libxml2-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 5073059edcb07a95a235e52022c88c4df81aad1ba4500903eb288925d9a65a66

libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 154701f1d6008e223f4a7e43c234ceafab4e1bc678692a3f5eef8d63a9ff8e97

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-devel-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9c4314210cb115071e329ee2edafcd81e30ea938503f272e3e5106adb8f78a70

libxml2-devel-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 58f599cfb713035591db3628450f4de8d1257ed5a4a85f4e8f4560a79c3ec14f

python3-libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2343326f83a1caa93df92869da070c05eee1c8602a8fcaffc6795fee4a1ae137

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

x86_64

libxml2-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 5073059edcb07a95a235e52022c88c4df81aad1ba4500903eb288925d9a65a66

libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 154701f1d6008e223f4a7e43c234ceafab4e1bc678692a3f5eef8d63a9ff8e97

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-devel-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9c4314210cb115071e329ee2edafcd81e30ea938503f272e3e5106adb8f78a70

libxml2-devel-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 58f599cfb713035591db3628450f4de8d1257ed5a4a85f4e8f4560a79c3ec14f

python3-libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2343326f83a1caa93df92869da070c05eee1c8602a8fcaffc6795fee4a1ae137

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

x86_64

libxml2-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 5073059edcb07a95a235e52022c88c4df81aad1ba4500903eb288925d9a65a66

libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 154701f1d6008e223f4a7e43c234ceafab4e1bc678692a3f5eef8d63a9ff8e97

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-devel-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9c4314210cb115071e329ee2edafcd81e30ea938503f272e3e5106adb8f78a70

libxml2-devel-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 58f599cfb713035591db3628450f4de8d1257ed5a4a85f4e8f4560a79c3ec14f

python3-libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2343326f83a1caa93df92869da070c05eee1c8602a8fcaffc6795fee4a1ae137

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

s390x

libxml2-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 120a5b6552dafc5f7f890a8a6fd3ee05ad11e827002fbbba4b3a3bd0983bf3db

libxml2-debuginfo-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: ca0f5afc58e3cdc2a586a4f4205abc345ef8eac8653148d95b7a530854912d52

libxml2-debuginfo-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: ca0f5afc58e3cdc2a586a4f4205abc345ef8eac8653148d95b7a530854912d52

libxml2-debugsource-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: dbc2e4b6d2bc9e581c89a7e187c978a3839cd8704377039b27bf2dc0f61b6b3d

libxml2-debugsource-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: dbc2e4b6d2bc9e581c89a7e187c978a3839cd8704377039b27bf2dc0f61b6b3d

libxml2-devel-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 065e00e8e0a8e15b89b7fb548215a994a96edc6691867ddeb65c18139928adf0

python3-libxml2-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 9000f1ca381cc5ba416579ad432f3eaee889a4af8997d2979b6af948d8d12958

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 23541c0b955488c53983af9c6d640169b3a3fbc7cdc1a466998272e2931e262d

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 23541c0b955488c53983af9c6d640169b3a3fbc7cdc1a466998272e2931e262d

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

s390x

libxml2-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 120a5b6552dafc5f7f890a8a6fd3ee05ad11e827002fbbba4b3a3bd0983bf3db

libxml2-debuginfo-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: ca0f5afc58e3cdc2a586a4f4205abc345ef8eac8653148d95b7a530854912d52

libxml2-debuginfo-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: ca0f5afc58e3cdc2a586a4f4205abc345ef8eac8653148d95b7a530854912d52

libxml2-debugsource-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: dbc2e4b6d2bc9e581c89a7e187c978a3839cd8704377039b27bf2dc0f61b6b3d

libxml2-debugsource-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: dbc2e4b6d2bc9e581c89a7e187c978a3839cd8704377039b27bf2dc0f61b6b3d

libxml2-devel-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 065e00e8e0a8e15b89b7fb548215a994a96edc6691867ddeb65c18139928adf0

python3-libxml2-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 9000f1ca381cc5ba416579ad432f3eaee889a4af8997d2979b6af948d8d12958

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 23541c0b955488c53983af9c6d640169b3a3fbc7cdc1a466998272e2931e262d

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.s390x.rpm

SHA-256: 23541c0b955488c53983af9c6d640169b3a3fbc7cdc1a466998272e2931e262d

Red Hat Enterprise Linux for Power, little endian 8

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

ppc64le

libxml2-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 5a24aac9918cd7cd46ef885d77b72d1d017c4d464c4c051a6cf5324f0592636e

libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 3180501899c1b9e6431a92fdac9d5018c59a7aec983982059308a5c93d498120

libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 3180501899c1b9e6431a92fdac9d5018c59a7aec983982059308a5c93d498120

libxml2-debugsource-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: cf36c1d3cc090efdc84158a983408ab088d82bbb08480c4b60dd6832abcdca45

libxml2-debugsource-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: cf36c1d3cc090efdc84158a983408ab088d82bbb08480c4b60dd6832abcdca45

libxml2-devel-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: c12505757f6efee78461eeb4b4cdd978363365b92992a196bb23f6237627eb87

python3-libxml2-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: ebd78b1f21265c98642afa6a744e4245155ded5f2be2b740c6c45bc31d5a252e

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 89e9a0fdd6bc58f2e7be9aac56788c3424737b26b98f961f7d8e04faeb38d9b3

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 89e9a0fdd6bc58f2e7be9aac56788c3424737b26b98f961f7d8e04faeb38d9b3

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

ppc64le

libxml2-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 5a24aac9918cd7cd46ef885d77b72d1d017c4d464c4c051a6cf5324f0592636e

libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 3180501899c1b9e6431a92fdac9d5018c59a7aec983982059308a5c93d498120

libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 3180501899c1b9e6431a92fdac9d5018c59a7aec983982059308a5c93d498120

libxml2-debugsource-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: cf36c1d3cc090efdc84158a983408ab088d82bbb08480c4b60dd6832abcdca45

libxml2-debugsource-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: cf36c1d3cc090efdc84158a983408ab088d82bbb08480c4b60dd6832abcdca45

libxml2-devel-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: c12505757f6efee78461eeb4b4cdd978363365b92992a196bb23f6237627eb87

python3-libxml2-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: ebd78b1f21265c98642afa6a744e4245155ded5f2be2b740c6c45bc31d5a252e

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 89e9a0fdd6bc58f2e7be9aac56788c3424737b26b98f961f7d8e04faeb38d9b3

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 89e9a0fdd6bc58f2e7be9aac56788c3424737b26b98f961f7d8e04faeb38d9b3

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

x86_64

libxml2-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 5073059edcb07a95a235e52022c88c4df81aad1ba4500903eb288925d9a65a66

libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 154701f1d6008e223f4a7e43c234ceafab4e1bc678692a3f5eef8d63a9ff8e97

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-devel-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9c4314210cb115071e329ee2edafcd81e30ea938503f272e3e5106adb8f78a70

libxml2-devel-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 58f599cfb713035591db3628450f4de8d1257ed5a4a85f4e8f4560a79c3ec14f

python3-libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2343326f83a1caa93df92869da070c05eee1c8602a8fcaffc6795fee4a1ae137

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

Red Hat Enterprise Linux for ARM 64 8

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

aarch64

libxml2-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: fd8b812abe5a52dcffb77a2f42f4546c902c4ef604e5c3822bce441e018a62c0

libxml2-debuginfo-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 5894b48c0386525edbdfd2fa2d37a4ebe6a15a274c9c226f7ebd92858364c6d0

libxml2-debuginfo-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 5894b48c0386525edbdfd2fa2d37a4ebe6a15a274c9c226f7ebd92858364c6d0

libxml2-debugsource-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: c895e20e92221cb9497432080a3e9e30b7acfb5460cf9d4eb4b7567dc18b2b6c

libxml2-debugsource-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: c895e20e92221cb9497432080a3e9e30b7acfb5460cf9d4eb4b7567dc18b2b6c

libxml2-devel-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: b0616683aec5c60a3f37d4c9062a8fd9a04786ca1252a0d0ef64e2c74e47b65b

python3-libxml2-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 578ed1761ae610b720c50f34249b1d71dfcee398c912fe3dbb5647054e7424e5

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 1c69ec6d4bbc994488f5c6a6608c4a911fd43cf92128dd3f44670106937a6137

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 1c69ec6d4bbc994488f5c6a6608c4a911fd43cf92128dd3f44670106937a6137

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

aarch64

libxml2-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: fd8b812abe5a52dcffb77a2f42f4546c902c4ef604e5c3822bce441e018a62c0

libxml2-debuginfo-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 5894b48c0386525edbdfd2fa2d37a4ebe6a15a274c9c226f7ebd92858364c6d0

libxml2-debuginfo-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 5894b48c0386525edbdfd2fa2d37a4ebe6a15a274c9c226f7ebd92858364c6d0

libxml2-debugsource-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: c895e20e92221cb9497432080a3e9e30b7acfb5460cf9d4eb4b7567dc18b2b6c

libxml2-debugsource-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: c895e20e92221cb9497432080a3e9e30b7acfb5460cf9d4eb4b7567dc18b2b6c

libxml2-devel-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: b0616683aec5c60a3f37d4c9062a8fd9a04786ca1252a0d0ef64e2c74e47b65b

python3-libxml2-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 578ed1761ae610b720c50f34249b1d71dfcee398c912fe3dbb5647054e7424e5

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 1c69ec6d4bbc994488f5c6a6608c4a911fd43cf92128dd3f44670106937a6137

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.aarch64.rpm

SHA-256: 1c69ec6d4bbc994488f5c6a6608c4a911fd43cf92128dd3f44670106937a6137

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

ppc64le

libxml2-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 5a24aac9918cd7cd46ef885d77b72d1d017c4d464c4c051a6cf5324f0592636e

libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 3180501899c1b9e6431a92fdac9d5018c59a7aec983982059308a5c93d498120

libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 3180501899c1b9e6431a92fdac9d5018c59a7aec983982059308a5c93d498120

libxml2-debugsource-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: cf36c1d3cc090efdc84158a983408ab088d82bbb08480c4b60dd6832abcdca45

libxml2-debugsource-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: cf36c1d3cc090efdc84158a983408ab088d82bbb08480c4b60dd6832abcdca45

libxml2-devel-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: c12505757f6efee78461eeb4b4cdd978363365b92992a196bb23f6237627eb87

python3-libxml2-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: ebd78b1f21265c98642afa6a744e4245155ded5f2be2b740c6c45bc31d5a252e

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 89e9a0fdd6bc58f2e7be9aac56788c3424737b26b98f961f7d8e04faeb38d9b3

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.ppc64le.rpm

SHA-256: 89e9a0fdd6bc58f2e7be9aac56788c3424737b26b98f961f7d8e04faeb38d9b3

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

libxml2-2.9.7-13.el8_6.1.src.rpm

SHA-256: f14e63c8385306e1e759b6af17b06f3ddac7ce1b4b884a9bbe62103aff3b84cf

x86_64

libxml2-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 5073059edcb07a95a235e52022c88c4df81aad1ba4500903eb288925d9a65a66

libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 154701f1d6008e223f4a7e43c234ceafab4e1bc678692a3f5eef8d63a9ff8e97

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9dab60d3082910b1dc4dcd7f93d903f035a216315ecddca29d952148e2561758

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: b7d6f7b32985ff1c1b6167fd893ad726c2d0ce69a80a6141a680dd3d7ec25d9b

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 300d515a5ff693aa9f1fb21b8098593cfb42b34a0ab53d8be1a1464f3e0d6869

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-debugsource-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2f8ffe4502c889002e9d04959278c5f209a2be7c006ab987eec972dba1a7fb88

libxml2-devel-2.9.7-13.el8_6.1.i686.rpm

SHA-256: 9c4314210cb115071e329ee2edafcd81e30ea938503f272e3e5106adb8f78a70

libxml2-devel-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 58f599cfb713035591db3628450f4de8d1257ed5a4a85f4e8f4560a79c3ec14f

python3-libxml2-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: 2343326f83a1caa93df92869da070c05eee1c8602a8fcaffc6795fee4a1ae137

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.i686.rpm

SHA-256: d2f62ce0c63e679a85b948870446f9dac734a5b25532f0b5d7ae08e603c389e0

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

python3-libxml2-debuginfo-2.9.7-13.el8_6.1.x86_64.rpm

SHA-256: af5e11e040f7483205176cc5cd6bee7034930ad0683ce046ac4adc5b5197d9c5

Related news

CVE-2021-39810: Android 14 Security Release Notes

In NFC, there is a possible way to setup a default contactless payment app without user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

RHSA-2023:4053: Red Hat Security Advisory: OpenShift Container Platform 4.11.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21235: A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands o...

Red Hat Security Advisory 2023-1326-01

Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.

CVE-2023-21954: Oracle Critical Patch Update Advisory - April 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

libxml2 xmlParseNameComplex Integer Overflow

libxml2 suffers from an integer overflow vulnerability in xmlParseNameComplex.

CVE-2022-21587: Oracle Critical Patch Update Advisory - October 2022

Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Red Hat Security Advisory 2022-6696-01

Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.

RHSA-2022:6526: Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2021-44716: golang: net/http: limit growth of header canonicalization cache * CVE-2021-44717: golang: syscall: don't close fd 0 on ForkExec error * CVE-2022-1798: kubeVirt: Arbitrary file read on t...

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

RHSA-2022:6429: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.4 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.4 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28500: nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions * CVE-2021-23337: nodejs-lodash: command injection via template * CVE-2022-0512: nodejs-url-parse: authorization bypass through user-controlled key * CVE-2022-0639: npm-url-parse: Authorization Bypass Through User-Controlled Key * CVE-2022-0686: npm-url-parse: Authorization bypass thr...

Red Hat Security Advisory 2022-6348-01

Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

RHSA-2022:6346: Red Hat Security Advisory: RHSA: Submariner 0.13 - security and enhancement update

Submariner 0.13 packages that fix security issues and bugs, as well as adds various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions...

Red Hat Security Advisory 2022-6290-01

Red Hat Security Advisory 2022-6290-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. Issues addressed include a denial of service vulnerability.

RHSA-2022:6156: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, & bugfix update

Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23440: nodejs-set-value: type confusion allows bypass of CVE-2019-10747 * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-...

Red Hat Security Advisory 2022-5069-01

Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

RHSA-2022:6024: Red Hat Security Advisory: New container image for Red Hat Ceph Storage 5.2 Security update

A new container image for Red Hat Ceph Storage 5.2 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43813: grafana: directory traversal vulnerability * CVE-2022-21673: grafana: Forward OAuth Identity Token can allow users to access some data sources

RHSA-2022:5909: Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.2.13)

Openshift Logging Bug Fix Release (5.2.13) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

RHSA-2022:5908: Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.3.10)

Openshift Logging Bug Fix Release (5.3.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

Red Hat Security Advisory 2022-5840-01

Red Hat Security Advisory 2022-5840-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.

RHSA-2022:5840: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1365: cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-29526: golang: syscall: faccessat checks wrong group

RHSA-2022:5699: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.0.1 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.0.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29526: golang: syscall: faccessat checks wrong group

Red Hat Security Advisory 2022-5531-01

Red Hat Security Advisory 2022-5531-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs.

Red Hat Security Advisory 2022-5556-01

Red Hat Security Advisory 2022-5556-01 - Logging Subsystem 5.4.3 has security updates. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2022:5704: Red Hat Security Advisory: ACS 3.71 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security. The updated image includes bug fixes and feature improvements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29173: go-tuf: No protection against rollback attacks for roles other than root

Red Hat Security Advisory 2022-5673-01

Red Hat Security Advisory 2022-5673-01 - Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview. Issues addressed include a code execution vulnerability.

RHSA-2022:5673: Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview

Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-41103: containerd: insufficiently restricted permissions on container root and plugin directories * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)

CVE-2022-21586: Oracle Critical Patch Update Advisory - July 2022

Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).

RHSA-2022:5556: Red Hat Security Advisory: Logging Subsystem 5.4.3 - Red Hat OpenShift security update

Logging Subsystem 5.4.3 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

RHSA-2022:5531: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.1 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account

Red Hat Security Advisory 2022-5250-01

Red Hat Security Advisory 2022-5250-01 - The libxml2 library is a development toolbox providing the implementation of various XML standards. Issues addressed include integer overflow and out of bounds write vulnerabilities.

RHSA-2022:5250: Red Hat Security Advisory: libxml2 security update

An update for libxml2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29824: libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write

libxml2 xmlBufAdd Heap Buffer Overflow

libxml2 is vulnerable to a heap buffer overflow when xmlBufAdd is called on a very large buffer.

Ubuntu Security Notice USN-5422-1

Ubuntu Security Notice 5422-1 - Shinji Sato discovered that libxml2 incorrectly handled certain XML files. An attacker could possibly use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, and Ubuntu 16.04 ESM. It was discovered that libxml2 incorrectly handled certain XML files. An attacker could possibly use this issue to cause a crash or execute arbitrary code.

CVE-2022-29824: v2.9.14 · Tags · GNOME / libxml2

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.