Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5251: Red Hat Security Advisory: pcre2 security update

An update for pcre2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1586: pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
  • CVE-2022-1587: pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c
Red Hat Security Data
#vulnerability#linux#red_hat#perl#ibm#sap

Synopsis

Moderate: pcre2 security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for pcre2 is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.

Security Fix(es):

  • pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)
  • pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c (CVE-2022-1587)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2077976 - CVE-2022-1586 pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
  • BZ - 2077983 - CVE-2022-1587 pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c

Red Hat Enterprise Linux for x86_64 9

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

x86_64

pcre2-10.37-5.el9_0.i686.rpm

SHA-256: eed8bf24f49f609bcd5c2b13f7d6e5b10759a8397a96339c02f1e5b3d6565e6c

pcre2-10.37-5.el9_0.x86_64.rpm

SHA-256: bfbc47d22d5c17587a54176695f60ef52a14e3746c6b9a46c2c2ad19b9a14a46

pcre2-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4

pcre2-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4

pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0

pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0

pcre2-debugsource-10.37-5.el9_0.i686.rpm

SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb

pcre2-debugsource-10.37-5.el9_0.i686.rpm

SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb

pcre2-debugsource-10.37-5.el9_0.x86_64.rpm

SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca

pcre2-debugsource-10.37-5.el9_0.x86_64.rpm

SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca

pcre2-devel-10.37-5.el9_0.i686.rpm

SHA-256: e9705c4e50a065d061b53361d533c7455b51b6057de95782c870885580c2fc38

pcre2-devel-10.37-5.el9_0.x86_64.rpm

SHA-256: 9d9bd6c9de914efb3015f3c89274246c044eefb9c1798502b9007ee520c4f797

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca

pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca

pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6

pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6

pcre2-utf16-10.37-5.el9_0.i686.rpm

SHA-256: e5268870a0dbef2c5e646abb6d2c60e12cc8d5ca69b0225b5ed5e291c8afb5ae

pcre2-utf16-10.37-5.el9_0.x86_64.rpm

SHA-256: 8d48afb567df162d45b68c1fb3b92bba7df4f4f076083dd63a2096372a80a6ee

pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd

pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd

pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e

pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e

pcre2-utf32-10.37-5.el9_0.i686.rpm

SHA-256: e057e2133402225a8d0b9a70c851c08bcf4e53f74ebb1e0f5a0fa0ca462eaa80

pcre2-utf32-10.37-5.el9_0.x86_64.rpm

SHA-256: 9d78eaa1bfeb93f2d38bdf71d626d8a30f612486a7f78205aff13efcc036d87a

pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64

pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64

pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff

pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

x86_64

pcre2-10.37-5.el9_0.i686.rpm

SHA-256: eed8bf24f49f609bcd5c2b13f7d6e5b10759a8397a96339c02f1e5b3d6565e6c

pcre2-10.37-5.el9_0.x86_64.rpm

SHA-256: bfbc47d22d5c17587a54176695f60ef52a14e3746c6b9a46c2c2ad19b9a14a46

pcre2-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4

pcre2-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4

pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0

pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0

pcre2-debugsource-10.37-5.el9_0.i686.rpm

SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb

pcre2-debugsource-10.37-5.el9_0.i686.rpm

SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb

pcre2-debugsource-10.37-5.el9_0.x86_64.rpm

SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca

pcre2-debugsource-10.37-5.el9_0.x86_64.rpm

SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca

pcre2-devel-10.37-5.el9_0.i686.rpm

SHA-256: e9705c4e50a065d061b53361d533c7455b51b6057de95782c870885580c2fc38

pcre2-devel-10.37-5.el9_0.x86_64.rpm

SHA-256: 9d9bd6c9de914efb3015f3c89274246c044eefb9c1798502b9007ee520c4f797

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca

pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca

pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6

pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6

pcre2-utf16-10.37-5.el9_0.i686.rpm

SHA-256: e5268870a0dbef2c5e646abb6d2c60e12cc8d5ca69b0225b5ed5e291c8afb5ae

pcre2-utf16-10.37-5.el9_0.x86_64.rpm

SHA-256: 8d48afb567df162d45b68c1fb3b92bba7df4f4f076083dd63a2096372a80a6ee

pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd

pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd

pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e

pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e

pcre2-utf32-10.37-5.el9_0.i686.rpm

SHA-256: e057e2133402225a8d0b9a70c851c08bcf4e53f74ebb1e0f5a0fa0ca462eaa80

pcre2-utf32-10.37-5.el9_0.x86_64.rpm

SHA-256: 9d78eaa1bfeb93f2d38bdf71d626d8a30f612486a7f78205aff13efcc036d87a

pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64

pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64

pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff

pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

s390x

pcre2-10.37-5.el9_0.s390x.rpm

SHA-256: 962d474e9d75337e44869535cae64cf900181a26981327c814484ad5230b92d2

pcre2-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca

pcre2-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca

pcre2-debugsource-10.37-5.el9_0.s390x.rpm

SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3

pcre2-debugsource-10.37-5.el9_0.s390x.rpm

SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3

pcre2-devel-10.37-5.el9_0.s390x.rpm

SHA-256: e39c5ac8622784fe428d675c819f78d46c5bd39547f826fe89edc08721084e04

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04

pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04

pcre2-utf16-10.37-5.el9_0.s390x.rpm

SHA-256: 64ac6fd7685233edbceb112be487374661dc5ac44b90ab133a8b40ba4aeca883

pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0

pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0

pcre2-utf32-10.37-5.el9_0.s390x.rpm

SHA-256: 02d59b49737d369736e229c78c13fb7090175817b4d43434d5fbd54236bd86cd

pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2

pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

s390x

pcre2-10.37-5.el9_0.s390x.rpm

SHA-256: 962d474e9d75337e44869535cae64cf900181a26981327c814484ad5230b92d2

pcre2-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca

pcre2-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca

pcre2-debugsource-10.37-5.el9_0.s390x.rpm

SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3

pcre2-debugsource-10.37-5.el9_0.s390x.rpm

SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3

pcre2-devel-10.37-5.el9_0.s390x.rpm

SHA-256: e39c5ac8622784fe428d675c819f78d46c5bd39547f826fe89edc08721084e04

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04

pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04

pcre2-utf16-10.37-5.el9_0.s390x.rpm

SHA-256: 64ac6fd7685233edbceb112be487374661dc5ac44b90ab133a8b40ba4aeca883

pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0

pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0

pcre2-utf32-10.37-5.el9_0.s390x.rpm

SHA-256: 02d59b49737d369736e229c78c13fb7090175817b4d43434d5fbd54236bd86cd

pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2

pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2

Red Hat Enterprise Linux for Power, little endian 9

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

ppc64le

pcre2-10.37-5.el9_0.ppc64le.rpm

SHA-256: 9411273b2c60247eadf20bd5b37a37d52badc6279528627faf78245d13640b83

pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e

pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e

pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm

SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69

pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm

SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69

pcre2-devel-10.37-5.el9_0.ppc64le.rpm

SHA-256: 7bbfd6d852a50606de8a0e7b8292ec9093b9063dc99b0e9014df3b90e4f4248e

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db

pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db

pcre2-utf16-10.37-5.el9_0.ppc64le.rpm

SHA-256: 465bb6ff2b4a3d82504c0ce8c8aab85ae15d1eb1cab19fe2292e204834549fcb

pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea

pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea

pcre2-utf32-10.37-5.el9_0.ppc64le.rpm

SHA-256: c603e03af469ec86ec5175012048ae31733cd18adeb60aaca255b1ef23980538

pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9

pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

ppc64le

pcre2-10.37-5.el9_0.ppc64le.rpm

SHA-256: 9411273b2c60247eadf20bd5b37a37d52badc6279528627faf78245d13640b83

pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e

pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e

pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm

SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69

pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm

SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69

pcre2-devel-10.37-5.el9_0.ppc64le.rpm

SHA-256: 7bbfd6d852a50606de8a0e7b8292ec9093b9063dc99b0e9014df3b90e4f4248e

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db

pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db

pcre2-utf16-10.37-5.el9_0.ppc64le.rpm

SHA-256: 465bb6ff2b4a3d82504c0ce8c8aab85ae15d1eb1cab19fe2292e204834549fcb

pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea

pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea

pcre2-utf32-10.37-5.el9_0.ppc64le.rpm

SHA-256: c603e03af469ec86ec5175012048ae31733cd18adeb60aaca255b1ef23980538

pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9

pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9

Red Hat Enterprise Linux for ARM 64 9

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

aarch64

pcre2-10.37-5.el9_0.aarch64.rpm

SHA-256: 1830f5ebcc6170fc5f01d505dc3a3749ffe9c294a9b5752c2c37dd5b9eb62015

pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045

pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045

pcre2-debugsource-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856

pcre2-debugsource-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856

pcre2-devel-10.37-5.el9_0.aarch64.rpm

SHA-256: 3b8081c454475b5250d73cde2af896eb30dc6efc1b853e5a5a4ce155657e2346

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3

pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3

pcre2-utf16-10.37-5.el9_0.aarch64.rpm

SHA-256: 72b29f6c1934f29cee5ecacd1c1cd62e450807d2368b43777b9f783c3b86611b

pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603

pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603

pcre2-utf32-10.37-5.el9_0.aarch64.rpm

SHA-256: ea305973b6ec2caa21beb6604fbab5363b3787e45785285cdf47937cbecbe950

pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f

pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

aarch64

pcre2-10.37-5.el9_0.aarch64.rpm

SHA-256: 1830f5ebcc6170fc5f01d505dc3a3749ffe9c294a9b5752c2c37dd5b9eb62015

pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045

pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045

pcre2-debugsource-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856

pcre2-debugsource-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856

pcre2-devel-10.37-5.el9_0.aarch64.rpm

SHA-256: 3b8081c454475b5250d73cde2af896eb30dc6efc1b853e5a5a4ce155657e2346

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3

pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3

pcre2-utf16-10.37-5.el9_0.aarch64.rpm

SHA-256: 72b29f6c1934f29cee5ecacd1c1cd62e450807d2368b43777b9f783c3b86611b

pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603

pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603

pcre2-utf32-10.37-5.el9_0.aarch64.rpm

SHA-256: ea305973b6ec2caa21beb6604fbab5363b3787e45785285cdf47937cbecbe950

pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f

pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

ppc64le

pcre2-10.37-5.el9_0.ppc64le.rpm

SHA-256: 9411273b2c60247eadf20bd5b37a37d52badc6279528627faf78245d13640b83

pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e

pcre2-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: 47c3f1b47754103f067f18b3b388f5406b6f8e844773113fcee9779e523a5a0e

pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm

SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69

pcre2-debugsource-10.37-5.el9_0.ppc64le.rpm

SHA-256: 383e44df29eb89b2c05a78e300962571cc6423ecd0699149e538869685fd5d69

pcre2-devel-10.37-5.el9_0.ppc64le.rpm

SHA-256: 7bbfd6d852a50606de8a0e7b8292ec9093b9063dc99b0e9014df3b90e4f4248e

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db

pcre2-tools-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: ab40ebbc475ef9cf88b61aff46910444577e2abfc4b3825d22bf2c7e90a371db

pcre2-utf16-10.37-5.el9_0.ppc64le.rpm

SHA-256: 465bb6ff2b4a3d82504c0ce8c8aab85ae15d1eb1cab19fe2292e204834549fcb

pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea

pcre2-utf16-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d3f30638f9bcd89fe279fde5384e943a3fd1d33f4910507c9e345ade42bdaeea

pcre2-utf32-10.37-5.el9_0.ppc64le.rpm

SHA-256: c603e03af469ec86ec5175012048ae31733cd18adeb60aaca255b1ef23980538

pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9

pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm

SHA-256: d17e2b6a947971063fbad09e03c16aa74a430a3bc2c8ae47b4615138598299b9

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

x86_64

pcre2-10.37-5.el9_0.i686.rpm

SHA-256: eed8bf24f49f609bcd5c2b13f7d6e5b10759a8397a96339c02f1e5b3d6565e6c

pcre2-10.37-5.el9_0.x86_64.rpm

SHA-256: bfbc47d22d5c17587a54176695f60ef52a14e3746c6b9a46c2c2ad19b9a14a46

pcre2-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4

pcre2-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 2fdd9d1a9d01a740e3ab653cb250a215aa0207150424ede33f2b7b569804efc4

pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0

pcre2-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 4e4da72d9fef7340ac2bda0d8db39b097ee4673a8a7e4e7f0d56c92e4e43a9e0

pcre2-debugsource-10.37-5.el9_0.i686.rpm

SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb

pcre2-debugsource-10.37-5.el9_0.i686.rpm

SHA-256: a88b9ae3be183d797ee002142387ad2a9e39b69eda1c7e67dbe90f3f55b6d3eb

pcre2-debugsource-10.37-5.el9_0.x86_64.rpm

SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca

pcre2-debugsource-10.37-5.el9_0.x86_64.rpm

SHA-256: cdafe6273be0551291c4cd1a72a25a7b0f66d99d2f24d4cfced9994b39c4c5ca

pcre2-devel-10.37-5.el9_0.i686.rpm

SHA-256: e9705c4e50a065d061b53361d533c7455b51b6057de95782c870885580c2fc38

pcre2-devel-10.37-5.el9_0.x86_64.rpm

SHA-256: 9d9bd6c9de914efb3015f3c89274246c044eefb9c1798502b9007ee520c4f797

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca

pcre2-tools-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: 002017dc0e16ed8e0be8151879d2d3bdd28e1828a51e82062763f559cacf51ca

pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6

pcre2-tools-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 69331349f5f9b13561baf18fd6e3f7c1b34813ba9621abedd2c9f74cbbcf4ba6

pcre2-utf16-10.37-5.el9_0.i686.rpm

SHA-256: e5268870a0dbef2c5e646abb6d2c60e12cc8d5ca69b0225b5ed5e291c8afb5ae

pcre2-utf16-10.37-5.el9_0.x86_64.rpm

SHA-256: 8d48afb567df162d45b68c1fb3b92bba7df4f4f076083dd63a2096372a80a6ee

pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd

pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: a5296f53db1ec704dd281778e6d289c47091d64bfd8aaefd2624b7df71955fcd

pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e

pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: 6ee7da6857e262a40d2fb09a51500253b1d8a3268b3d4d8aee525adc63b63b8e

pcre2-utf32-10.37-5.el9_0.i686.rpm

SHA-256: e057e2133402225a8d0b9a70c851c08bcf4e53f74ebb1e0f5a0fa0ca462eaa80

pcre2-utf32-10.37-5.el9_0.x86_64.rpm

SHA-256: 9d78eaa1bfeb93f2d38bdf71d626d8a30f612486a7f78205aff13efcc036d87a

pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64

pcre2-utf32-debuginfo-10.37-5.el9_0.i686.rpm

SHA-256: d4208e8da1bc337c3669ff402cc83c52fb5568d23eb43f88171325bc9a671e64

pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff

pcre2-utf32-debuginfo-10.37-5.el9_0.x86_64.rpm

SHA-256: a6962c955467740bc546fe00500c83ac6ad60ac0a8acfb56fa8f1ffdf64e21ff

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

aarch64

pcre2-10.37-5.el9_0.aarch64.rpm

SHA-256: 1830f5ebcc6170fc5f01d505dc3a3749ffe9c294a9b5752c2c37dd5b9eb62015

pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045

pcre2-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: e0d136139d7bffc84f5731ca4810bac7063804392102cc9b453c24e349f1f045

pcre2-debugsource-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856

pcre2-debugsource-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ac1f474322ce515a3a844cf1ae68469edd764b5575a7fc78f58939a77893856

pcre2-devel-10.37-5.el9_0.aarch64.rpm

SHA-256: 3b8081c454475b5250d73cde2af896eb30dc6efc1b853e5a5a4ce155657e2346

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3

pcre2-tools-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 3ee0cbeb1e312566eb026befa5ba00e5c74de80d4447cbeb4933b11759773ff3

pcre2-utf16-10.37-5.el9_0.aarch64.rpm

SHA-256: 72b29f6c1934f29cee5ecacd1c1cd62e450807d2368b43777b9f783c3b86611b

pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603

pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: f86b5d41568c57ed6ae6e3a034f684f8d8fe12cd3617f76b2a9925e5fd7e6603

pcre2-utf32-10.37-5.el9_0.aarch64.rpm

SHA-256: ea305973b6ec2caa21beb6604fbab5363b3787e45785285cdf47937cbecbe950

pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f

pcre2-utf32-debuginfo-10.37-5.el9_0.aarch64.rpm

SHA-256: 9a0c2dc6e9fb83c9431162eb8a37474b9274915a8cf0982d0f829a3d55297b8f

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0

SRPM

pcre2-10.37-5.el9_0.src.rpm

SHA-256: 6f8474e33c76854c506f5ab1a6cbda5ea8b70b36ed288fea04d2c1cf854a6761

s390x

pcre2-10.37-5.el9_0.s390x.rpm

SHA-256: 962d474e9d75337e44869535cae64cf900181a26981327c814484ad5230b92d2

pcre2-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca

pcre2-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: bafcd8e95e019f8f64dcdde2b4833548f179539d88dbc8036205bc1e7f9cafca

pcre2-debugsource-10.37-5.el9_0.s390x.rpm

SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3

pcre2-debugsource-10.37-5.el9_0.s390x.rpm

SHA-256: c25dc4a85d9ea9e43b0d72e6c07958115333653f5a168d96f78375faaf2857a3

pcre2-devel-10.37-5.el9_0.s390x.rpm

SHA-256: e39c5ac8622784fe428d675c819f78d46c5bd39547f826fe89edc08721084e04

pcre2-syntax-10.37-5.el9_0.noarch.rpm

SHA-256: e03ad000e6623938de9b7cd85ea8edd00714b83c5c8d0d497c0b71c1333d27f9

pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04

pcre2-tools-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 71e12068cffc1efc2032546e9403fdab98d01be0ecc75d035850484b70058c04

pcre2-utf16-10.37-5.el9_0.s390x.rpm

SHA-256: 64ac6fd7685233edbceb112be487374661dc5ac44b90ab133a8b40ba4aeca883

pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0

pcre2-utf16-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 27b02a8715a9dd74e614d486da32819fe0855bc8d5c89b9e39a86f7f371dd1c0

pcre2-utf32-10.37-5.el9_0.s390x.rpm

SHA-256: 02d59b49737d369736e229c78c13fb7090175817b4d43434d5fbd54236bd86cd

pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2

pcre2-utf32-debuginfo-10.37-5.el9_0.s390x.rpm

SHA-256: 3d0aa394dbb60f298cdfb437710f36c2803deebf72126c987da74bea815929c2

Related news

CVE-2023-43074: DSA-2023-141: Dell Unity, Unity VSA and Unity XT Security Update for Multiple Vulnerability

Dell Unity 5.3 contain(s) an Arbitrary File Creation vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by crafting arbitrary files through a request to the server.

Red Hat Security Advisory 2023-3742-02

Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

CVE-2023-28043: DSA-2023-164: Dell Secure Connect Gateway Security Update for Multiple Vulnerabilities

Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.

Red Hat Security Advisory 2023-1326-01

Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

CVE-2023-21954: Oracle Critical Patch Update Advisory - April 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2023-0408-01

Red Hat Security Advisory 2023-0408-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Issues addressed include denial of service and out of bounds read vulnerabilities.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

Red Hat Security Advisory 2022-8889-01

Red Hat Security Advisory 2022-8889-01 - This is an Openshift Logging bug fix release. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-8781-01

Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.

RHSA-2022:8750: Red Hat Security Advisory: OpenShift Virtualization 4.11.1 security and bug fix update

Red Hat OpenShift Virtualization release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caus...

Red Hat Security Advisory 2022-7055-01

Red Hat Security Advisory 2022-7055-01 - An update is now available for Red Hat Openshift distributed tracing 2.6.0. Issues addressed include denial of service and traversal vulnerabilities.

RHSA-2022:7058: Red Hat Security Advisory: OpenShift sandboxed containers 1.3.1 security fix and bug fix update

OpenShift sandboxed containers 1.3.1 is now available.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2832: blender: Null pointer reference in blender thumbnail extractor * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob

CVE-2022-21587: Oracle Critical Patch Update Advisory - October 2022

Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Red Hat Security Advisory 2022-6714-01

Red Hat Security Advisory 2022-6714-01 - Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes new features and bug fixes.

RHSA-2022:6696: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-31150: nodejs16: CRLF injection in node-undici * CVE-2022-31151: nodejs/undici: Cookie headers uncleared on cross-origin redirect * CV...

Ubuntu Security Notice USN-5627-1

Ubuntu Security Notice 5627-1 - It was discovered that PCRE incorrectly handled memory when handling certain regular expressions. An attacker could possibly use this issue to cause applications using PCRE to expose sensitive information.

Red Hat Security Advisory 2022-6517-01

Red Hat Security Advisory 2022-6517-01 - Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.

RHSA-2022:6507: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2

Red Hat Security Advisory 2022-6429-01

Red Hat Security Advisory 2022-6429-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include bypass, code execution, and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6422-01

Red Hat Security Advisory 2022-6422-01 - Multicluster Engine for Kubernetes 2.0.2 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

RHSA-2022:6422: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.2 security and bug fixes

Multicluster Engine for Kubernetes 2.0.2 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2

CVE-2022-38701: en/security-disclosure/2022/2022-09.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.

Red Hat Security Advisory 2022-6182-01

Red Hat Security Advisory 2022-6182-01 - Openshift Logging Bug Fix Release. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6183-01

Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6345-01

Red Hat Security Advisory 2022-6345-01 - Multicluster engine for Kubernetes 2.1 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

Red Hat Security Advisory 2022-6290-01

Red Hat Security Advisory 2022-6290-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6283-01

Red Hat Security Advisory 2022-6283-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation. This advisory covers the RPM packages for the release.

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6290: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.0 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.0 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaus...

RHSA-2022:6283: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.2 Containers security update

Red Hat OpenShift Service Mesh 2.2.2 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal * CVE-2022-30635: golang: encoding/gob: stack...

Red Hat Security Advisory 2022-6188-01

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

Red Hat Security Advisory 2022-6184-01

Red Hat Security Advisory 2022-6184-01 - The Self Node Remediation Operator works in conjunction with the Machine Health Check or the Node Health Check Operators to provide automatic remediation of unhealthy nodes by rebooting them. This minimizes downtime for stateful applications and RWO volumes, as well as restoring compute capacity in the event of transient failures.

RHSA-2022:6184: Red Hat Security Advisory: Self Node Remediation Operator 0.4.1 security update

This is an updated release of the Self Node Remediation Operator. The Self Node Remediation Operator replaces the Poison Pill Operator, and is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

RHSA-2022:6156: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, & bugfix update

Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23440: nodejs-set-value: type confusion allows bypass of CVE-2019-10747 * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-...

Red Hat Security Advisory 2022-6103-01

Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.

RHSA-2022:6103: Red Hat Security Advisory: OpenShift Container Platform 4.11.1 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6051-01

Red Hat Security Advisory 2022-6051-01 - An update is now available for RHOL-5.5-RHEL-8. Issues addressed include denial of service, man-in-the-middle, and out of bounds read vulnerabilities.

RHSA-2022:6051: Red Hat Security Advisory: Logging Subsystem 5.5.0 - Red Hat OpenShift security update

An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-5069-01

Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

RHSA-2022:6024: Red Hat Security Advisory: New container image for Red Hat Ceph Storage 5.2 Security update

A new container image for Red Hat Ceph Storage 5.2 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43813: grafana: directory traversal vulnerability * CVE-2022-21673: grafana: Forward OAuth Identity Token can allow users to access some data sources

Red Hat Security Advisory 2022-5809-01

Red Hat Security Advisory 2022-5809-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.

RHSA-2022:5809: Red Hat Security Advisory: pcre2 security update

An update for pcre2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1586: pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c

Red Hat Security Advisory 2022-5251-01

Red Hat Security Advisory 2022-5251-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.

Red Hat Security Advisory 2022-5251-01

Red Hat Security Advisory 2022-5251-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.

CVE-2022-1586: [SECURITY] Fedora 36 Update: pcre2-10.40-1.fc36 - package-announce

An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.

CVE-2022-1587: Fixed an issue affecting recursions in JIT · PCRE2Project/pcre2@03654e7

An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.

CVE-2022-1586: [SECURITY] Fedora 36 Update: pcre2-10.40-1.fc36 - package-announce

An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.