Headline
RHSA-2022:5251: Red Hat Security Advisory: pcre2 security update
An update for pcre2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-1586: pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
- CVE-2022-1587: pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c
Synopsis
Moderate: pcre2 security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for pcre2 is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.
Security Fix(es):
- pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)
- pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c (CVE-2022-1587)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x
Fixes
- BZ - 2077976 - CVE-2022-1586 pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
- BZ - 2077983 - CVE-2022-1587 pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c
Red Hat Enterprise Linux for x86_64 9
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
x86_64
pcre2-10.37-5.el9_0.i686.rpm
SHA-256: eed8bf24f49f609bcd5c2b13f7d6e5b10759a8397a96339c02f1e5b3d6565e6c
pcre2-10.37-5.el9_0.x86_64.rpm
SHA-256: bfbc47d22d5c17587a54176695f60ef52a14e3746c6b9a46c2c2ad19b9a14a46
pcre2-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4
pcre2-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4
pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0
pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0
pcre2-debugsource-10.37-5.el9_0.i686.rpm
SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb
pcre2-debugsource-10.37-5.el9_0.i686.rpm
SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb
pcre2-debugsource-10.37-5.el9_0.x86_64.rpm
SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca
pcre2-debugsource-10.37-5.el9_0.x86_64.rpm
SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca
pcre2-devel-10.37-5.el9_0.i686.rpm
SHA-256: e9705c4e50a065d061b53361d533c7455b51b6057de95782c870885580c2fc38
pcre2-devel-10.37-5.el9_0.x86_64.rpm
SHA-256: 9d9bd6c9de914efb3015f3c89274246c044eefb9c1798502b9007ee520c4f797
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca
pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca
pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6
pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6
pcre2-utf16-10.37-5.el9_0.i686.rpm
SHA-256: e5268870a0dbef2c5e646abb6d2c60e12cc8d5ca69b0225b5ed5e291c8afb5ae
pcre2-utf16-10.37-5.el9_0.x86_64.rpm
SHA-256: 8d48afb567df162d45b68c1fb3b92bba7df4f4f076083dd63a2096372a80a6ee
pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd
pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd
pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e
pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e
pcre2-utf32-10.37-5.el9_0.i686.rpm
SHA-256: e057e2133402225a8d0b9a70c851c08bcf4e53f74ebb1e0f5a0fa0ca462eaa80
pcre2-utf32-10.37-5.el9_0.x86_64.rpm
SHA-256: 9d78eaa1bfeb93f2d38bdf71d626d8a30f612486a7f78205aff13efcc036d87a
pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64
pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64
pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff
pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
x86_64
pcre2-10.37-5.el9_0.i686.rpm
SHA-256: eed8bf24f49f609bcd5c2b13f7d6e5b10759a8397a96339c02f1e5b3d6565e6c
pcre2-10.37-5.el9_0.x86_64.rpm
SHA-256: bfbc47d22d5c17587a54176695f60ef52a14e3746c6b9a46c2c2ad19b9a14a46
pcre2-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4
pcre2-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4
pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0
pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0
pcre2-debugsource-10.37-5.el9_0.i686.rpm
SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb
pcre2-debugsource-10.37-5.el9_0.i686.rpm
SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb
pcre2-debugsource-10.37-5.el9_0.x86_64.rpm
SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca
pcre2-debugsource-10.37-5.el9_0.x86_64.rpm
SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca
pcre2-devel-10.37-5.el9_0.i686.rpm
SHA-256: e9705c4e50a065d061b53361d533c7455b51b6057de95782c870885580c2fc38
pcre2-devel-10.37-5.el9_0.x86_64.rpm
SHA-256: 9d9bd6c9de914efb3015f3c89274246c044eefb9c1798502b9007ee520c4f797
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca
pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca
pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6
pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6
pcre2-utf16-10.37-5.el9_0.i686.rpm
SHA-256: e5268870a0dbef2c5e646abb6d2c60e12cc8d5ca69b0225b5ed5e291c8afb5ae
pcre2-utf16-10.37-5.el9_0.x86_64.rpm
SHA-256: 8d48afb567df162d45b68c1fb3b92bba7df4f4f076083dd63a2096372a80a6ee
pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd
pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd
pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e
pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e
pcre2-utf32-10.37-5.el9_0.i686.rpm
SHA-256: e057e2133402225a8d0b9a70c851c08bcf4e53f74ebb1e0f5a0fa0ca462eaa80
pcre2-utf32-10.37-5.el9_0.x86_64.rpm
SHA-256: 9d78eaa1bfeb93f2d38bdf71d626d8a30f612486a7f78205aff13efcc036d87a
pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64
pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64
pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff
pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff
Red Hat Enterprise Linux for IBM z Systems 9
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
s390x
pcre2-10.37-5.el9_0.s390x.rpm
SHA-256: 962d474e9d75337e44869535cae64cf900181a26981327c814484ad5230b92d2
pcre2-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca
pcre2-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca
pcre2-debugsource-10.37-5.el9_0.s390x.rpm
SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3
pcre2-debugsource-10.37-5.el9_0.s390x.rpm
SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3
pcre2-devel-10.37-5.el9_0.s390x.rpm
SHA-256: e39c5ac8622784fe428d675c819f78d46c5bd39547f826fe89edc08721084e04
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04
pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04
pcre2-utf16-10.37-5.el9_0.s390x.rpm
SHA-256: 64ac6fd7685233edbceb112be487374661dc5ac44b90ab133a8b40ba4aeca883
pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0
pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0
pcre2-utf32-10.37-5.el9_0.s390x.rpm
SHA-256: 02d59b49737d369736e229c78c13fb7090175817b4d43434d5fbd54236bd86cd
pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2
pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
s390x
pcre2-10.37-5.el9_0.s390x.rpm
SHA-256: 962d474e9d75337e44869535cae64cf900181a26981327c814484ad5230b92d2
pcre2-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca
pcre2-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca
pcre2-debugsource-10.37-5.el9_0.s390x.rpm
SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3
pcre2-debugsource-10.37-5.el9_0.s390x.rpm
SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3
pcre2-devel-10.37-5.el9_0.s390x.rpm
SHA-256: e39c5ac8622784fe428d675c819f78d46c5bd39547f826fe89edc08721084e04
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04
pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04
pcre2-utf16-10.37-5.el9_0.s390x.rpm
SHA-256: 64ac6fd7685233edbceb112be487374661dc5ac44b90ab133a8b40ba4aeca883
pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0
pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0
pcre2-utf32-10.37-5.el9_0.s390x.rpm
SHA-256: 02d59b49737d369736e229c78c13fb7090175817b4d43434d5fbd54236bd86cd
pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2
pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2
Red Hat Enterprise Linux for Power, little endian 9
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
ppc64le
pcre2-10.37-5.el9_0.ppc64le.rpm
SHA-256: 9411273b2c60247eadf20bd5b37a37d52badc6279528627faf78245d13640b83
pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e
pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e
pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm
SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69
pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm
SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69
pcre2-devel-10.37-5.el9_0.ppc64le.rpm
SHA-256: 7bbfd6d852a50606de8a0e7b8292ec9093b9063dc99b0e9014df3b90e4f4248e
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db
pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db
pcre2-utf16-10.37-5.el9_0.ppc64le.rpm
SHA-256: 465bb6ff2b4a3d82504c0ce8c8aab85ae15d1eb1cab19fe2292e204834549fcb
pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea
pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea
pcre2-utf32-10.37-5.el9_0.ppc64le.rpm
SHA-256: c603e03af469ec86ec5175012048ae31733cd18adeb60aaca255b1ef23980538
pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9
pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
ppc64le
pcre2-10.37-5.el9_0.ppc64le.rpm
SHA-256: 9411273b2c60247eadf20bd5b37a37d52badc6279528627faf78245d13640b83
pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e
pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e
pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm
SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69
pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm
SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69
pcre2-devel-10.37-5.el9_0.ppc64le.rpm
SHA-256: 7bbfd6d852a50606de8a0e7b8292ec9093b9063dc99b0e9014df3b90e4f4248e
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db
pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db
pcre2-utf16-10.37-5.el9_0.ppc64le.rpm
SHA-256: 465bb6ff2b4a3d82504c0ce8c8aab85ae15d1eb1cab19fe2292e204834549fcb
pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea
pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea
pcre2-utf32-10.37-5.el9_0.ppc64le.rpm
SHA-256: c603e03af469ec86ec5175012048ae31733cd18adeb60aaca255b1ef23980538
pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9
pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9
Red Hat Enterprise Linux for ARM 64 9
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
aarch64
pcre2-10.37-5.el9_0.aarch64.rpm
SHA-256: 1830f5ebcc6170fc5f01d505dc3a3749ffe9c294a9b5752c2c37dd5b9eb62015
pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045
pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045
pcre2-debugsource-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856
pcre2-debugsource-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856
pcre2-devel-10.37-5.el9_0.aarch64.rpm
SHA-256: 3b8081c454475b5250d73cde2af896eb30dc6efc1b853e5a5a4ce155657e2346
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3
pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3
pcre2-utf16-10.37-5.el9_0.aarch64.rpm
SHA-256: 72b29f6c1934f29cee5ecacd1c1cd62e450807d2368b43777b9f783c3b86611b
pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603
pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603
pcre2-utf32-10.37-5.el9_0.aarch64.rpm
SHA-256: ea305973b6ec2caa21beb6604fbab5363b3787e45785285cdf47937cbecbe950
pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f
pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
aarch64
pcre2-10.37-5.el9_0.aarch64.rpm
SHA-256: 1830f5ebcc6170fc5f01d505dc3a3749ffe9c294a9b5752c2c37dd5b9eb62015
pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045
pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045
pcre2-debugsource-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856
pcre2-debugsource-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856
pcre2-devel-10.37-5.el9_0.aarch64.rpm
SHA-256: 3b8081c454475b5250d73cde2af896eb30dc6efc1b853e5a5a4ce155657e2346
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3
pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3
pcre2-utf16-10.37-5.el9_0.aarch64.rpm
SHA-256: 72b29f6c1934f29cee5ecacd1c1cd62e450807d2368b43777b9f783c3b86611b
pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603
pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603
pcre2-utf32-10.37-5.el9_0.aarch64.rpm
SHA-256: ea305973b6ec2caa21beb6604fbab5363b3787e45785285cdf47937cbecbe950
pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f
pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
ppc64le
pcre2-10.37-5.el9_0.ppc64le.rpm
SHA-256: 9411273b2c60247eadf20bd5b37a37d52badc6279528627faf78245d13640b83
pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e
pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e
pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm
SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69
pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm
SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69
pcre2-devel-10.37-5.el9_0.ppc64le.rpm
SHA-256: 7bbfd6d852a50606de8a0e7b8292ec9093b9063dc99b0e9014df3b90e4f4248e
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db
pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db
pcre2-utf16-10.37-5.el9_0.ppc64le.rpm
SHA-256: 465bb6ff2b4a3d82504c0ce8c8aab85ae15d1eb1cab19fe2292e204834549fcb
pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea
pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea
pcre2-utf32-10.37-5.el9_0.ppc64le.rpm
SHA-256: c603e03af469ec86ec5175012048ae31733cd18adeb60aaca255b1ef23980538
pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9
pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm
SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
x86_64
pcre2-10.37-5.el9_0.i686.rpm
SHA-256: eed8bf24f49f609bcd5c2b13f7d6e5b10759a8397a96339c02f1e5b3d6565e6c
pcre2-10.37-5.el9_0.x86_64.rpm
SHA-256: bfbc47d22d5c17587a54176695f60ef52a14e3746c6b9a46c2c2ad19b9a14a46
pcre2-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4
pcre2-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4
pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0
pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0
pcre2-debugsource-10.37-5.el9_0.i686.rpm
SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb
pcre2-debugsource-10.37-5.el9_0.i686.rpm
SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb
pcre2-debugsource-10.37-5.el9_0.x86_64.rpm
SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca
pcre2-debugsource-10.37-5.el9_0.x86_64.rpm
SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca
pcre2-devel-10.37-5.el9_0.i686.rpm
SHA-256: e9705c4e50a065d061b53361d533c7455b51b6057de95782c870885580c2fc38
pcre2-devel-10.37-5.el9_0.x86_64.rpm
SHA-256: 9d9bd6c9de914efb3015f3c89274246c044eefb9c1798502b9007ee520c4f797
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca
pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca
pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6
pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6
pcre2-utf16-10.37-5.el9_0.i686.rpm
SHA-256: e5268870a0dbef2c5e646abb6d2c60e12cc8d5ca69b0225b5ed5e291c8afb5ae
pcre2-utf16-10.37-5.el9_0.x86_64.rpm
SHA-256: 8d48afb567df162d45b68c1fb3b92bba7df4f4f076083dd63a2096372a80a6ee
pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd
pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd
pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e
pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e
pcre2-utf32-10.37-5.el9_0.i686.rpm
SHA-256: e057e2133402225a8d0b9a70c851c08bcf4e53f74ebb1e0f5a0fa0ca462eaa80
pcre2-utf32-10.37-5.el9_0.x86_64.rpm
SHA-256: 9d78eaa1bfeb93f2d38bdf71d626d8a30f612486a7f78205aff13efcc036d87a
pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64
pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm
SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64
pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff
pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm
SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff
Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
aarch64
pcre2-10.37-5.el9_0.aarch64.rpm
SHA-256: 1830f5ebcc6170fc5f01d505dc3a3749ffe9c294a9b5752c2c37dd5b9eb62015
pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045
pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045
pcre2-debugsource-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856
pcre2-debugsource-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856
pcre2-devel-10.37-5.el9_0.aarch64.rpm
SHA-256: 3b8081c454475b5250d73cde2af896eb30dc6efc1b853e5a5a4ce155657e2346
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3
pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3
pcre2-utf16-10.37-5.el9_0.aarch64.rpm
SHA-256: 72b29f6c1934f29cee5ecacd1c1cd62e450807d2368b43777b9f783c3b86611b
pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603
pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603
pcre2-utf32-10.37-5.el9_0.aarch64.rpm
SHA-256: ea305973b6ec2caa21beb6604fbab5363b3787e45785285cdf47937cbecbe950
pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f
pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm
SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f
Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0
SRPM
pcre2-10.37-5.el9_0.src.rpm
SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761
s390x
pcre2-10.37-5.el9_0.s390x.rpm
SHA-256: 962d474e9d75337e44869535cae64cf900181a26981327c814484ad5230b92d2
pcre2-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca
pcre2-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca
pcre2-debugsource-10.37-5.el9_0.s390x.rpm
SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3
pcre2-debugsource-10.37-5.el9_0.s390x.rpm
SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3
pcre2-devel-10.37-5.el9_0.s390x.rpm
SHA-256: e39c5ac8622784fe428d675c819f78d46c5bd39547f826fe89edc08721084e04
pcre2-syntax-10.37-5.el9_0.noarch.rpm
SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9
pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04
pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04
pcre2-utf16-10.37-5.el9_0.s390x.rpm
SHA-256: 64ac6fd7685233edbceb112be487374661dc5ac44b90ab133a8b40ba4aeca883
pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0
pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0
pcre2-utf32-10.37-5.el9_0.s390x.rpm
SHA-256: 02d59b49737d369736e229c78c13fb7090175817b4d43434d5fbd54236bd86cd
pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2
pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm
SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2
Related news
Dell Unity 5.3 contain(s) an Arbitrary File Creation vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by crafting arbitrary files through a request to the server.
Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.
Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...
Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.
Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.
Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
Red Hat Security Advisory 2023-0408-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Issues addressed include denial of service and out of bounds read vulnerabilities.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
Red Hat Security Advisory 2022-8889-01 - This is an Openshift Logging bug fix release. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Virtualization release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caus...
Red Hat Security Advisory 2022-7055-01 - An update is now available for Red Hat Openshift distributed tracing 2.6.0. Issues addressed include denial of service and traversal vulnerabilities.
OpenShift sandboxed containers 1.3.1 is now available.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2832: blender: Null pointer reference in blender thumbnail extractor * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Red Hat Security Advisory 2022-6714-01 - Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes new features and bug fixes.
Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-31150: nodejs16: CRLF injection in node-undici * CVE-2022-31151: nodejs/undici: Cookie headers uncleared on cross-origin redirect * CV...
Ubuntu Security Notice 5627-1 - It was discovered that PCRE incorrectly handled memory when handling certain regular expressions. An attacker could possibly use this issue to cause applications using PCRE to expose sensitive information.
Red Hat Security Advisory 2022-6517-01 - Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.
Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2
Red Hat Security Advisory 2022-6429-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include bypass, code execution, and denial of service vulnerabilities.
Red Hat Security Advisory 2022-6422-01 - Multicluster Engine for Kubernetes 2.0.2 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.
Multicluster Engine for Kubernetes 2.0.2 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2
OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.
Red Hat Security Advisory 2022-6182-01 - Openshift Logging Bug Fix Release. Issue addressed include a stack exhaustion vulnerability.
Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.
Red Hat Security Advisory 2022-6345-01 - Multicluster engine for Kubernetes 2.1 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.
Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...
Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...
Red Hat Security Advisory 2022-6290-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6283-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation. This advisory covers the RPM packages for the release.
Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
OpenShift API for Data Protection (OADP) 1.1.0 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaus...
Red Hat OpenShift Service Mesh 2.2.2 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal * CVE-2022-30635: golang: encoding/gob: stack...
Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.
Red Hat Security Advisory 2022-6184-01 - The Self Node Remediation Operator works in conjunction with the Machine Health Check or the Node Health Check Operators to provide automatic remediation of unhealthy nodes by rebooting them. This minimizes downtime for stateful applications and RWO volumes, as well as restoring compute capacity in the event of transient failures.
This is an updated release of the Self Node Remediation Operator. The Self Node Remediation Operator replaces the Poison Pill Operator, and is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23440: nodejs-set-value: type confusion allows bypass of CVE-2019-10747 * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-...
Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.
Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-6051-01 - An update is now available for RHOL-5.5-RHEL-8. Issues addressed include denial of service, man-in-the-middle, and out of bounds read vulnerabilities.
An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.
Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...
A new container image for Red Hat Ceph Storage 5.2 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43813: grafana: directory traversal vulnerability * CVE-2022-21673: grafana: Forward OAuth Identity Token can allow users to access some data sources
Red Hat Security Advisory 2022-5809-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.
An update for pcre2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1586: pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
Red Hat Security Advisory 2022-5251-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.
Red Hat Security Advisory 2022-5251-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.