Headline
RHSA-2022:5809: Red Hat Security Advisory: pcre2 security update
An update for pcre2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-1586: pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
Synopsis
Moderate: pcre2 security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for pcre2 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.
Security Fix(es):
- pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
Fixes
- BZ - 2077976 - CVE-2022-1586 pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
References
- https://access.redhat.com/security/updates/classification/#moderate
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/
Red Hat Enterprise Linux for x86_64 8
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
x86_64
pcre2-10.32-3.el8_6.i686.rpm
SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050
pcre2-10.32-3.el8_6.x86_64.rpm
SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb
pcre2-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45
pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9
pcre2-debugsource-10.32-3.el8_6.i686.rpm
SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466
pcre2-debugsource-10.32-3.el8_6.x86_64.rpm
SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16
pcre2-devel-10.32-3.el8_6.i686.rpm
SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f
pcre2-devel-10.32-3.el8_6.x86_64.rpm
SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e
pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc
pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39
pcre2-utf16-10.32-3.el8_6.i686.rpm
SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5
pcre2-utf16-10.32-3.el8_6.x86_64.rpm
SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08
pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825
pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426
pcre2-utf32-10.32-3.el8_6.i686.rpm
SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba
pcre2-utf32-10.32-3.el8_6.x86_64.rpm
SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7
pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7
pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
x86_64
pcre2-10.32-3.el8_6.i686.rpm
SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050
pcre2-10.32-3.el8_6.x86_64.rpm
SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb
pcre2-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45
pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9
pcre2-debugsource-10.32-3.el8_6.i686.rpm
SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466
pcre2-debugsource-10.32-3.el8_6.x86_64.rpm
SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16
pcre2-devel-10.32-3.el8_6.i686.rpm
SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f
pcre2-devel-10.32-3.el8_6.x86_64.rpm
SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e
pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc
pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39
pcre2-utf16-10.32-3.el8_6.i686.rpm
SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5
pcre2-utf16-10.32-3.el8_6.x86_64.rpm
SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08
pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825
pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426
pcre2-utf32-10.32-3.el8_6.i686.rpm
SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba
pcre2-utf32-10.32-3.el8_6.x86_64.rpm
SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7
pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7
pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
x86_64
pcre2-10.32-3.el8_6.i686.rpm
SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050
pcre2-10.32-3.el8_6.x86_64.rpm
SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb
pcre2-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45
pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9
pcre2-debugsource-10.32-3.el8_6.i686.rpm
SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466
pcre2-debugsource-10.32-3.el8_6.x86_64.rpm
SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16
pcre2-devel-10.32-3.el8_6.i686.rpm
SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f
pcre2-devel-10.32-3.el8_6.x86_64.rpm
SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e
pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc
pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39
pcre2-utf16-10.32-3.el8_6.i686.rpm
SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5
pcre2-utf16-10.32-3.el8_6.x86_64.rpm
SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08
pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825
pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426
pcre2-utf32-10.32-3.el8_6.i686.rpm
SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba
pcre2-utf32-10.32-3.el8_6.x86_64.rpm
SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7
pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7
pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
s390x
pcre2-10.32-3.el8_6.s390x.rpm
SHA-256: c9dc884be87f6642e0e9e79b7c64ce34e5424635c3a3a51995e34917e76dc15e
pcre2-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: b3b9a763fd3dc3c72d55cc10cc26c58d07e20b7334cba9800cf355bc31710440
pcre2-debugsource-10.32-3.el8_6.s390x.rpm
SHA-256: 7936242a5d3edcdf3fc508c364d902736f70d23317d1a83434b29e8e843a5596
pcre2-devel-10.32-3.el8_6.s390x.rpm
SHA-256: 0bd580b8957108fe8b2567043b004286eddf1170f10128a7b37d0845f2cb48c9
pcre2-tools-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: 01dc21a05db1531533eeee23acd838ae5fc6fbdcfcc4cfe504c5db247297cf9d
pcre2-utf16-10.32-3.el8_6.s390x.rpm
SHA-256: 05d02c1d941d614940e56eacbaf3cd18f09b552041af52e3cec3a8f2a8b932a3
pcre2-utf16-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: 8cd9e1ffc0003faf7ac716c03f8a3f3a689bebdf05518aea589ebb82c3eb6601
pcre2-utf32-10.32-3.el8_6.s390x.rpm
SHA-256: b51a411f0df42d61b397ef188d47fed31de3175f233225015317b5ab5e041677
pcre2-utf32-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: c9b2d9df1482edb94333dba67294f4138728c51544d009457220f182d4ddce6b
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
s390x
pcre2-10.32-3.el8_6.s390x.rpm
SHA-256: c9dc884be87f6642e0e9e79b7c64ce34e5424635c3a3a51995e34917e76dc15e
pcre2-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: b3b9a763fd3dc3c72d55cc10cc26c58d07e20b7334cba9800cf355bc31710440
pcre2-debugsource-10.32-3.el8_6.s390x.rpm
SHA-256: 7936242a5d3edcdf3fc508c364d902736f70d23317d1a83434b29e8e843a5596
pcre2-devel-10.32-3.el8_6.s390x.rpm
SHA-256: 0bd580b8957108fe8b2567043b004286eddf1170f10128a7b37d0845f2cb48c9
pcre2-tools-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: 01dc21a05db1531533eeee23acd838ae5fc6fbdcfcc4cfe504c5db247297cf9d
pcre2-utf16-10.32-3.el8_6.s390x.rpm
SHA-256: 05d02c1d941d614940e56eacbaf3cd18f09b552041af52e3cec3a8f2a8b932a3
pcre2-utf16-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: 8cd9e1ffc0003faf7ac716c03f8a3f3a689bebdf05518aea589ebb82c3eb6601
pcre2-utf32-10.32-3.el8_6.s390x.rpm
SHA-256: b51a411f0df42d61b397ef188d47fed31de3175f233225015317b5ab5e041677
pcre2-utf32-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: c9b2d9df1482edb94333dba67294f4138728c51544d009457220f182d4ddce6b
Red Hat Enterprise Linux for Power, little endian 8
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
ppc64le
pcre2-10.32-3.el8_6.ppc64le.rpm
SHA-256: 21030b61a5ceeb9d8cb1aaf24dd592be14c6ee92c7eb52923d8a686e2795ea61
pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d
pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm
SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b
pcre2-devel-10.32-3.el8_6.ppc64le.rpm
SHA-256: 536b5b685cc842fcb084c5479f19f95c29bd2ad9edf88723601cfe9c311005c0
pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20
pcre2-utf16-10.32-3.el8_6.ppc64le.rpm
SHA-256: 953f9ecc8ec49332880c8bc86cb985a604bcff533928600e8e998aa851ee6e28
pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49
pcre2-utf32-10.32-3.el8_6.ppc64le.rpm
SHA-256: 64ac0bc3cbde1e11bd245b457308d654de5f7d50e4caebe335bf17c4d7399190
pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
ppc64le
pcre2-10.32-3.el8_6.ppc64le.rpm
SHA-256: 21030b61a5ceeb9d8cb1aaf24dd592be14c6ee92c7eb52923d8a686e2795ea61
pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d
pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm
SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b
pcre2-devel-10.32-3.el8_6.ppc64le.rpm
SHA-256: 536b5b685cc842fcb084c5479f19f95c29bd2ad9edf88723601cfe9c311005c0
pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20
pcre2-utf16-10.32-3.el8_6.ppc64le.rpm
SHA-256: 953f9ecc8ec49332880c8bc86cb985a604bcff533928600e8e998aa851ee6e28
pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49
pcre2-utf32-10.32-3.el8_6.ppc64le.rpm
SHA-256: 64ac0bc3cbde1e11bd245b457308d654de5f7d50e4caebe335bf17c4d7399190
pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
x86_64
pcre2-10.32-3.el8_6.i686.rpm
SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050
pcre2-10.32-3.el8_6.x86_64.rpm
SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb
pcre2-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45
pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9
pcre2-debugsource-10.32-3.el8_6.i686.rpm
SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466
pcre2-debugsource-10.32-3.el8_6.x86_64.rpm
SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16
pcre2-devel-10.32-3.el8_6.i686.rpm
SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f
pcre2-devel-10.32-3.el8_6.x86_64.rpm
SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e
pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc
pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39
pcre2-utf16-10.32-3.el8_6.i686.rpm
SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5
pcre2-utf16-10.32-3.el8_6.x86_64.rpm
SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08
pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825
pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426
pcre2-utf32-10.32-3.el8_6.i686.rpm
SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba
pcre2-utf32-10.32-3.el8_6.x86_64.rpm
SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7
pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7
pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1
Red Hat Enterprise Linux for ARM 64 8
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
aarch64
pcre2-10.32-3.el8_6.aarch64.rpm
SHA-256: 56915a4bb482da61d720e0aa3cce6b7793c21d6568f14be6f50fa554a5e062ac
pcre2-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3da23187dfbfc1277a75d291c10e10cec70b617823339d59fa8474b5e366e7eb
pcre2-debugsource-10.32-3.el8_6.aarch64.rpm
SHA-256: 7e874254fe8cdf9de9ed2e4f8cc20be91b29fdd424d293138952485f2de82170
pcre2-devel-10.32-3.el8_6.aarch64.rpm
SHA-256: c804060cfeeb93f3aed7ec298564df167ae783ae11d490d0012a8a7fe3e523de
pcre2-tools-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 4fc20771c80e80c1d0aefc216b2869043bd0b3e3b012beb7427d2f527582671c
pcre2-utf16-10.32-3.el8_6.aarch64.rpm
SHA-256: c6e03493dccb5b8940522a796566bcea7bdd70ec2c021b57a50cf0aa429f6d9d
pcre2-utf16-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3e2cff8c2538d8a2602195fe206728a5066814dfe01fa2a917bffcd1afe78e12
pcre2-utf32-10.32-3.el8_6.aarch64.rpm
SHA-256: 125384b215c0cdd4c75c2a8e30a51b12fc9daf030c1d9210c2f5621f1aee031e
pcre2-utf32-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3957b7d1e836b5874081bb8c0fdf80decb9d8f8fcfc0b01ea125c32193405d7b
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
ppc64le
pcre2-10.32-3.el8_6.ppc64le.rpm
SHA-256: 21030b61a5ceeb9d8cb1aaf24dd592be14c6ee92c7eb52923d8a686e2795ea61
pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d
pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm
SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b
pcre2-devel-10.32-3.el8_6.ppc64le.rpm
SHA-256: 536b5b685cc842fcb084c5479f19f95c29bd2ad9edf88723601cfe9c311005c0
pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20
pcre2-utf16-10.32-3.el8_6.ppc64le.rpm
SHA-256: 953f9ecc8ec49332880c8bc86cb985a604bcff533928600e8e998aa851ee6e28
pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49
pcre2-utf32-10.32-3.el8_6.ppc64le.rpm
SHA-256: 64ac0bc3cbde1e11bd245b457308d654de5f7d50e4caebe335bf17c4d7399190
pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
x86_64
pcre2-10.32-3.el8_6.i686.rpm
SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050
pcre2-10.32-3.el8_6.x86_64.rpm
SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb
pcre2-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45
pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9
pcre2-debugsource-10.32-3.el8_6.i686.rpm
SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466
pcre2-debugsource-10.32-3.el8_6.x86_64.rpm
SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16
pcre2-devel-10.32-3.el8_6.i686.rpm
SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f
pcre2-devel-10.32-3.el8_6.x86_64.rpm
SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e
pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc
pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39
pcre2-utf16-10.32-3.el8_6.i686.rpm
SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5
pcre2-utf16-10.32-3.el8_6.x86_64.rpm
SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08
pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825
pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426
pcre2-utf32-10.32-3.el8_6.i686.rpm
SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba
pcre2-utf32-10.32-3.el8_6.x86_64.rpm
SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7
pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm
SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7
pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1
Red Hat CodeReady Linux Builder for x86_64 8
SRPM
x86_64
pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9
pcre2-debugsource-10.32-3.el8_6.x86_64.rpm
SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16
pcre2-tools-10.32-3.el8_6.x86_64.rpm
SHA-256: 90846104e262898fa07c95cfd3814ae08840cf0eb543f37ac701ccd5acc81053
pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39
pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426
pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1
Red Hat CodeReady Linux Builder for Power, little endian 8
SRPM
ppc64le
pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d
pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm
SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b
pcre2-tools-10.32-3.el8_6.ppc64le.rpm
SHA-256: bd841afebcf759bd12583b391048ae4b858cfbb9f440dedbdfda2b17dc4c659b
pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20
pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49
pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e
Red Hat CodeReady Linux Builder for ARM 64 8
SRPM
aarch64
pcre2-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3da23187dfbfc1277a75d291c10e10cec70b617823339d59fa8474b5e366e7eb
pcre2-debugsource-10.32-3.el8_6.aarch64.rpm
SHA-256: 7e874254fe8cdf9de9ed2e4f8cc20be91b29fdd424d293138952485f2de82170
pcre2-tools-10.32-3.el8_6.aarch64.rpm
SHA-256: 81ae1375dbb7e1bdb21f4cd2f0e5169827fb8b43c44464ca87f8bf5b0d017eb8
pcre2-tools-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 4fc20771c80e80c1d0aefc216b2869043bd0b3e3b012beb7427d2f527582671c
pcre2-utf16-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3e2cff8c2538d8a2602195fe206728a5066814dfe01fa2a917bffcd1afe78e12
pcre2-utf32-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3957b7d1e836b5874081bb8c0fdf80decb9d8f8fcfc0b01ea125c32193405d7b
Red Hat CodeReady Linux Builder for IBM z Systems 8
SRPM
s390x
pcre2-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: b3b9a763fd3dc3c72d55cc10cc26c58d07e20b7334cba9800cf355bc31710440
pcre2-debugsource-10.32-3.el8_6.s390x.rpm
SHA-256: 7936242a5d3edcdf3fc508c364d902736f70d23317d1a83434b29e8e843a5596
pcre2-tools-10.32-3.el8_6.s390x.rpm
SHA-256: 809d4e889f6f8f8e5e0663adb517b0e5b9846e7d8df9ba7ece37f2d9a895140f
pcre2-tools-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: 01dc21a05db1531533eeee23acd838ae5fc6fbdcfcc4cfe504c5db247297cf9d
pcre2-utf16-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: 8cd9e1ffc0003faf7ac716c03f8a3f3a689bebdf05518aea589ebb82c3eb6601
pcre2-utf32-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: c9b2d9df1482edb94333dba67294f4138728c51544d009457220f182d4ddce6b
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
pcre2-10.32-3.el8_6.src.rpm
SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670
aarch64
pcre2-10.32-3.el8_6.aarch64.rpm
SHA-256: 56915a4bb482da61d720e0aa3cce6b7793c21d6568f14be6f50fa554a5e062ac
pcre2-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3da23187dfbfc1277a75d291c10e10cec70b617823339d59fa8474b5e366e7eb
pcre2-debugsource-10.32-3.el8_6.aarch64.rpm
SHA-256: 7e874254fe8cdf9de9ed2e4f8cc20be91b29fdd424d293138952485f2de82170
pcre2-devel-10.32-3.el8_6.aarch64.rpm
SHA-256: c804060cfeeb93f3aed7ec298564df167ae783ae11d490d0012a8a7fe3e523de
pcre2-tools-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 4fc20771c80e80c1d0aefc216b2869043bd0b3e3b012beb7427d2f527582671c
pcre2-utf16-10.32-3.el8_6.aarch64.rpm
SHA-256: c6e03493dccb5b8940522a796566bcea7bdd70ec2c021b57a50cf0aa429f6d9d
pcre2-utf16-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3e2cff8c2538d8a2602195fe206728a5066814dfe01fa2a917bffcd1afe78e12
pcre2-utf32-10.32-3.el8_6.aarch64.rpm
SHA-256: 125384b215c0cdd4c75c2a8e30a51b12fc9daf030c1d9210c2f5621f1aee031e
pcre2-utf32-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3957b7d1e836b5874081bb8c0fdf80decb9d8f8fcfc0b01ea125c32193405d7b
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9
pcre2-debugsource-10.32-3.el8_6.x86_64.rpm
SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16
pcre2-tools-10.32-3.el8_6.x86_64.rpm
SHA-256: 90846104e262898fa07c95cfd3814ae08840cf0eb543f37ac701ccd5acc81053
pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39
pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426
pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm
SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d
pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm
SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b
pcre2-tools-10.32-3.el8_6.ppc64le.rpm
SHA-256: bd841afebcf759bd12583b391048ae4b858cfbb9f440dedbdfda2b17dc4c659b
pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20
pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49
pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm
SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.6
SRPM
s390x
pcre2-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: b3b9a763fd3dc3c72d55cc10cc26c58d07e20b7334cba9800cf355bc31710440
pcre2-debugsource-10.32-3.el8_6.s390x.rpm
SHA-256: 7936242a5d3edcdf3fc508c364d902736f70d23317d1a83434b29e8e843a5596
pcre2-tools-10.32-3.el8_6.s390x.rpm
SHA-256: 809d4e889f6f8f8e5e0663adb517b0e5b9846e7d8df9ba7ece37f2d9a895140f
pcre2-tools-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: 01dc21a05db1531533eeee23acd838ae5fc6fbdcfcc4cfe504c5db247297cf9d
pcre2-utf16-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: 8cd9e1ffc0003faf7ac716c03f8a3f3a689bebdf05518aea589ebb82c3eb6601
pcre2-utf32-debuginfo-10.32-3.el8_6.s390x.rpm
SHA-256: c9b2d9df1482edb94333dba67294f4138728c51544d009457220f182d4ddce6b
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
pcre2-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3da23187dfbfc1277a75d291c10e10cec70b617823339d59fa8474b5e366e7eb
pcre2-debugsource-10.32-3.el8_6.aarch64.rpm
SHA-256: 7e874254fe8cdf9de9ed2e4f8cc20be91b29fdd424d293138952485f2de82170
pcre2-tools-10.32-3.el8_6.aarch64.rpm
SHA-256: 81ae1375dbb7e1bdb21f4cd2f0e5169827fb8b43c44464ca87f8bf5b0d017eb8
pcre2-tools-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 4fc20771c80e80c1d0aefc216b2869043bd0b3e3b012beb7427d2f527582671c
pcre2-utf16-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3e2cff8c2538d8a2602195fe206728a5066814dfe01fa2a917bffcd1afe78e12
pcre2-utf32-debuginfo-10.32-3.el8_6.aarch64.rpm
SHA-256: 3957b7d1e836b5874081bb8c0fdf80decb9d8f8fcfc0b01ea125c32193405d7b
Related news
Red Hat OpenShift Container Platform release 4.11.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21235: A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands o...
Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...
Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
Red Hat Security Advisory 2023-0408-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Issues addressed include denial of service and out of bounds read vulnerabilities.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
Red Hat Security Advisory 2022-8889-01 - This is an Openshift Logging bug fix release. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Virtualization release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caus...
Red Hat Security Advisory 2022-7058-01 - OpenShift sandboxed containers support for OpenShift Container Platform provides users with built-in support for running Kata containers as an additional, optional runtime. This advisory contains an update for OpenShift sandboxed containers with security fixes and a bug fix. Space precludes documenting all of the updates to OpenShift sandboxed containers in this advisory. Issues addressed include a null pointer vulnerability.
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.
Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes new features and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-29526: golang: syscall: faccessat checks wrong gr...
Red Hat Security Advisory 2022-6507-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-41103: containerd: insufficiently restricted permissions on container root and plugin directories * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.
Multicluster Engine for Kubernetes 2.0.2 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2
Red Hat Security Advisory 2022-6182-01 - Openshift Logging Bug Fix Release. Issue addressed include a stack exhaustion vulnerability.
Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.
Red Hat Security Advisory 2022-6345-01 - Multicluster engine for Kubernetes 2.1 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.
Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...
Logging Subsystem 5.4.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read * CVE-2022-32148: golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
Openshift Logging Bug Fix Release (5.3.11) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-6290-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS
Red Hat Security Advisory 2022-6184-01 - The Self Node Remediation Operator works in conjunction with the Machine Health Check or the Node Health Check Operators to provide automatic remediation of unhealthy nodes by rebooting them. This minimizes downtime for stateful applications and RWO volumes, as well as restoring compute capacity in the event of transient failures.
An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...
This is an updated release of the Self Node Remediation Operator. The Self Node Remediation Operator replaces the Poison Pill Operator, and is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23440: nodejs-set-value: type confusion allows bypass of CVE-2019-10747 * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-...
Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.
Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-6051-01 - An update is now available for RHOL-5.5-RHEL-8. Issues addressed include denial of service, man-in-the-middle, and out of bounds read vulnerabilities.
An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.
Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...
A new container image for Red Hat Ceph Storage 5.2 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43813: grafana: directory traversal vulnerability * CVE-2022-21673: grafana: Forward OAuth Identity Token can allow users to access some data sources
Red Hat Security Advisory 2022-5809-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.
Red Hat Security Advisory 2022-5251-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.
An update for pcre2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1586: pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c * CVE-2022-1587: pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.