Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5809: Red Hat Security Advisory: pcre2 security update

An update for pcre2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1586: pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
Red Hat Security Data
#vulnerability#linux#red_hat#perl#ibm#sap

Synopsis

Moderate: pcre2 security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for pcre2 is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.

Security Fix(es):

  • pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64

Fixes

  • BZ - 2077976 - CVE-2022-1586 pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/

Red Hat Enterprise Linux for x86_64 8

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

x86_64

pcre2-10.32-3.el8_6.i686.rpm

SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050

pcre2-10.32-3.el8_6.x86_64.rpm

SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb

pcre2-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45

pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9

pcre2-debugsource-10.32-3.el8_6.i686.rpm

SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466

pcre2-debugsource-10.32-3.el8_6.x86_64.rpm

SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16

pcre2-devel-10.32-3.el8_6.i686.rpm

SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f

pcre2-devel-10.32-3.el8_6.x86_64.rpm

SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e

pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc

pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39

pcre2-utf16-10.32-3.el8_6.i686.rpm

SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5

pcre2-utf16-10.32-3.el8_6.x86_64.rpm

SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08

pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825

pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426

pcre2-utf32-10.32-3.el8_6.i686.rpm

SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba

pcre2-utf32-10.32-3.el8_6.x86_64.rpm

SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7

pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7

pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

x86_64

pcre2-10.32-3.el8_6.i686.rpm

SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050

pcre2-10.32-3.el8_6.x86_64.rpm

SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb

pcre2-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45

pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9

pcre2-debugsource-10.32-3.el8_6.i686.rpm

SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466

pcre2-debugsource-10.32-3.el8_6.x86_64.rpm

SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16

pcre2-devel-10.32-3.el8_6.i686.rpm

SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f

pcre2-devel-10.32-3.el8_6.x86_64.rpm

SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e

pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc

pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39

pcre2-utf16-10.32-3.el8_6.i686.rpm

SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5

pcre2-utf16-10.32-3.el8_6.x86_64.rpm

SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08

pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825

pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426

pcre2-utf32-10.32-3.el8_6.i686.rpm

SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba

pcre2-utf32-10.32-3.el8_6.x86_64.rpm

SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7

pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7

pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

x86_64

pcre2-10.32-3.el8_6.i686.rpm

SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050

pcre2-10.32-3.el8_6.x86_64.rpm

SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb

pcre2-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45

pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9

pcre2-debugsource-10.32-3.el8_6.i686.rpm

SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466

pcre2-debugsource-10.32-3.el8_6.x86_64.rpm

SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16

pcre2-devel-10.32-3.el8_6.i686.rpm

SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f

pcre2-devel-10.32-3.el8_6.x86_64.rpm

SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e

pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc

pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39

pcre2-utf16-10.32-3.el8_6.i686.rpm

SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5

pcre2-utf16-10.32-3.el8_6.x86_64.rpm

SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08

pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825

pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426

pcre2-utf32-10.32-3.el8_6.i686.rpm

SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba

pcre2-utf32-10.32-3.el8_6.x86_64.rpm

SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7

pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7

pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

s390x

pcre2-10.32-3.el8_6.s390x.rpm

SHA-256: c9dc884be87f6642e0e9e79b7c64ce34e5424635c3a3a51995e34917e76dc15e

pcre2-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: b3b9a763fd3dc3c72d55cc10cc26c58d07e20b7334cba9800cf355bc31710440

pcre2-debugsource-10.32-3.el8_6.s390x.rpm

SHA-256: 7936242a5d3edcdf3fc508c364d902736f70d23317d1a83434b29e8e843a5596

pcre2-devel-10.32-3.el8_6.s390x.rpm

SHA-256: 0bd580b8957108fe8b2567043b004286eddf1170f10128a7b37d0845f2cb48c9

pcre2-tools-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: 01dc21a05db1531533eeee23acd838ae5fc6fbdcfcc4cfe504c5db247297cf9d

pcre2-utf16-10.32-3.el8_6.s390x.rpm

SHA-256: 05d02c1d941d614940e56eacbaf3cd18f09b552041af52e3cec3a8f2a8b932a3

pcre2-utf16-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: 8cd9e1ffc0003faf7ac716c03f8a3f3a689bebdf05518aea589ebb82c3eb6601

pcre2-utf32-10.32-3.el8_6.s390x.rpm

SHA-256: b51a411f0df42d61b397ef188d47fed31de3175f233225015317b5ab5e041677

pcre2-utf32-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: c9b2d9df1482edb94333dba67294f4138728c51544d009457220f182d4ddce6b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

s390x

pcre2-10.32-3.el8_6.s390x.rpm

SHA-256: c9dc884be87f6642e0e9e79b7c64ce34e5424635c3a3a51995e34917e76dc15e

pcre2-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: b3b9a763fd3dc3c72d55cc10cc26c58d07e20b7334cba9800cf355bc31710440

pcre2-debugsource-10.32-3.el8_6.s390x.rpm

SHA-256: 7936242a5d3edcdf3fc508c364d902736f70d23317d1a83434b29e8e843a5596

pcre2-devel-10.32-3.el8_6.s390x.rpm

SHA-256: 0bd580b8957108fe8b2567043b004286eddf1170f10128a7b37d0845f2cb48c9

pcre2-tools-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: 01dc21a05db1531533eeee23acd838ae5fc6fbdcfcc4cfe504c5db247297cf9d

pcre2-utf16-10.32-3.el8_6.s390x.rpm

SHA-256: 05d02c1d941d614940e56eacbaf3cd18f09b552041af52e3cec3a8f2a8b932a3

pcre2-utf16-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: 8cd9e1ffc0003faf7ac716c03f8a3f3a689bebdf05518aea589ebb82c3eb6601

pcre2-utf32-10.32-3.el8_6.s390x.rpm

SHA-256: b51a411f0df42d61b397ef188d47fed31de3175f233225015317b5ab5e041677

pcre2-utf32-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: c9b2d9df1482edb94333dba67294f4138728c51544d009457220f182d4ddce6b

Red Hat Enterprise Linux for Power, little endian 8

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

ppc64le

pcre2-10.32-3.el8_6.ppc64le.rpm

SHA-256: 21030b61a5ceeb9d8cb1aaf24dd592be14c6ee92c7eb52923d8a686e2795ea61

pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d

pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm

SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b

pcre2-devel-10.32-3.el8_6.ppc64le.rpm

SHA-256: 536b5b685cc842fcb084c5479f19f95c29bd2ad9edf88723601cfe9c311005c0

pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20

pcre2-utf16-10.32-3.el8_6.ppc64le.rpm

SHA-256: 953f9ecc8ec49332880c8bc86cb985a604bcff533928600e8e998aa851ee6e28

pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49

pcre2-utf32-10.32-3.el8_6.ppc64le.rpm

SHA-256: 64ac0bc3cbde1e11bd245b457308d654de5f7d50e4caebe335bf17c4d7399190

pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

ppc64le

pcre2-10.32-3.el8_6.ppc64le.rpm

SHA-256: 21030b61a5ceeb9d8cb1aaf24dd592be14c6ee92c7eb52923d8a686e2795ea61

pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d

pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm

SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b

pcre2-devel-10.32-3.el8_6.ppc64le.rpm

SHA-256: 536b5b685cc842fcb084c5479f19f95c29bd2ad9edf88723601cfe9c311005c0

pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20

pcre2-utf16-10.32-3.el8_6.ppc64le.rpm

SHA-256: 953f9ecc8ec49332880c8bc86cb985a604bcff533928600e8e998aa851ee6e28

pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49

pcre2-utf32-10.32-3.el8_6.ppc64le.rpm

SHA-256: 64ac0bc3cbde1e11bd245b457308d654de5f7d50e4caebe335bf17c4d7399190

pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

x86_64

pcre2-10.32-3.el8_6.i686.rpm

SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050

pcre2-10.32-3.el8_6.x86_64.rpm

SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb

pcre2-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45

pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9

pcre2-debugsource-10.32-3.el8_6.i686.rpm

SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466

pcre2-debugsource-10.32-3.el8_6.x86_64.rpm

SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16

pcre2-devel-10.32-3.el8_6.i686.rpm

SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f

pcre2-devel-10.32-3.el8_6.x86_64.rpm

SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e

pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc

pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39

pcre2-utf16-10.32-3.el8_6.i686.rpm

SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5

pcre2-utf16-10.32-3.el8_6.x86_64.rpm

SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08

pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825

pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426

pcre2-utf32-10.32-3.el8_6.i686.rpm

SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba

pcre2-utf32-10.32-3.el8_6.x86_64.rpm

SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7

pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7

pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1

Red Hat Enterprise Linux for ARM 64 8

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

aarch64

pcre2-10.32-3.el8_6.aarch64.rpm

SHA-256: 56915a4bb482da61d720e0aa3cce6b7793c21d6568f14be6f50fa554a5e062ac

pcre2-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3da23187dfbfc1277a75d291c10e10cec70b617823339d59fa8474b5e366e7eb

pcre2-debugsource-10.32-3.el8_6.aarch64.rpm

SHA-256: 7e874254fe8cdf9de9ed2e4f8cc20be91b29fdd424d293138952485f2de82170

pcre2-devel-10.32-3.el8_6.aarch64.rpm

SHA-256: c804060cfeeb93f3aed7ec298564df167ae783ae11d490d0012a8a7fe3e523de

pcre2-tools-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 4fc20771c80e80c1d0aefc216b2869043bd0b3e3b012beb7427d2f527582671c

pcre2-utf16-10.32-3.el8_6.aarch64.rpm

SHA-256: c6e03493dccb5b8940522a796566bcea7bdd70ec2c021b57a50cf0aa429f6d9d

pcre2-utf16-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3e2cff8c2538d8a2602195fe206728a5066814dfe01fa2a917bffcd1afe78e12

pcre2-utf32-10.32-3.el8_6.aarch64.rpm

SHA-256: 125384b215c0cdd4c75c2a8e30a51b12fc9daf030c1d9210c2f5621f1aee031e

pcre2-utf32-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3957b7d1e836b5874081bb8c0fdf80decb9d8f8fcfc0b01ea125c32193405d7b

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

ppc64le

pcre2-10.32-3.el8_6.ppc64le.rpm

SHA-256: 21030b61a5ceeb9d8cb1aaf24dd592be14c6ee92c7eb52923d8a686e2795ea61

pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d

pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm

SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b

pcre2-devel-10.32-3.el8_6.ppc64le.rpm

SHA-256: 536b5b685cc842fcb084c5479f19f95c29bd2ad9edf88723601cfe9c311005c0

pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20

pcre2-utf16-10.32-3.el8_6.ppc64le.rpm

SHA-256: 953f9ecc8ec49332880c8bc86cb985a604bcff533928600e8e998aa851ee6e28

pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49

pcre2-utf32-10.32-3.el8_6.ppc64le.rpm

SHA-256: 64ac0bc3cbde1e11bd245b457308d654de5f7d50e4caebe335bf17c4d7399190

pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

x86_64

pcre2-10.32-3.el8_6.i686.rpm

SHA-256: 0afde513d9ca90bb8902e2bf02949bc3a74f969f6c707f6cb310d64bffe38050

pcre2-10.32-3.el8_6.x86_64.rpm

SHA-256: c504e02ff8af5607b7b23bcdceee78f728ab16a9adc053bd774739d520d95ecb

pcre2-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 84831a7ef7ad6b9917dc9a108e8413d9d3a851ff3dbf0fa4dc4148660bb7df45

pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9

pcre2-debugsource-10.32-3.el8_6.i686.rpm

SHA-256: 1661823cd8ec293b3fe107bbd93a4996665d4452b316b132c0a73aefddb91466

pcre2-debugsource-10.32-3.el8_6.x86_64.rpm

SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16

pcre2-devel-10.32-3.el8_6.i686.rpm

SHA-256: 5989d845dc7b241de634779beee3a17e1888e8ea7bb29ffd891246aa70dc592f

pcre2-devel-10.32-3.el8_6.x86_64.rpm

SHA-256: 48df73d35b1c572e8f8cf9d7318a299ff007776bb5e1677447386b4dcb0e802e

pcre2-tools-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 96eed768b9b73a705a5a53eafe0970c9c5d3f3a1401f5e5fc780fb30eeec62dc

pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39

pcre2-utf16-10.32-3.el8_6.i686.rpm

SHA-256: 0274a940ae3c034631a44d2351cc76f88ad4c3464d6ac84ea2856d16ba6febb5

pcre2-utf16-10.32-3.el8_6.x86_64.rpm

SHA-256: 91df207ab87117b29695ad94eccaa1fab29dad76e6ea459647b16ece6d4aad08

pcre2-utf16-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: cee8519364c6b210a328299042fd914a2626c432f74d59743efd6951319d7825

pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426

pcre2-utf32-10.32-3.el8_6.i686.rpm

SHA-256: be1de3c10cbc713ecb3cfcb33415d2eb6eaa86abb703c1a3b54490ee1bb672ba

pcre2-utf32-10.32-3.el8_6.x86_64.rpm

SHA-256: 81ca26b980903a64de28fc8ef49383e60a907aa8f573fac8788279b479480de7

pcre2-utf32-debuginfo-10.32-3.el8_6.i686.rpm

SHA-256: 16d1d1a2e3677513d3d5250a5cf83a61b82084b36f536ea3364b4a4d804cc4b7

pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1

Red Hat CodeReady Linux Builder for x86_64 8

SRPM

x86_64

pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9

pcre2-debugsource-10.32-3.el8_6.x86_64.rpm

SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16

pcre2-tools-10.32-3.el8_6.x86_64.rpm

SHA-256: 90846104e262898fa07c95cfd3814ae08840cf0eb543f37ac701ccd5acc81053

pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39

pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426

pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1

Red Hat CodeReady Linux Builder for Power, little endian 8

SRPM

ppc64le

pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d

pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm

SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b

pcre2-tools-10.32-3.el8_6.ppc64le.rpm

SHA-256: bd841afebcf759bd12583b391048ae4b858cfbb9f440dedbdfda2b17dc4c659b

pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20

pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49

pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e

Red Hat CodeReady Linux Builder for ARM 64 8

SRPM

aarch64

pcre2-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3da23187dfbfc1277a75d291c10e10cec70b617823339d59fa8474b5e366e7eb

pcre2-debugsource-10.32-3.el8_6.aarch64.rpm

SHA-256: 7e874254fe8cdf9de9ed2e4f8cc20be91b29fdd424d293138952485f2de82170

pcre2-tools-10.32-3.el8_6.aarch64.rpm

SHA-256: 81ae1375dbb7e1bdb21f4cd2f0e5169827fb8b43c44464ca87f8bf5b0d017eb8

pcre2-tools-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 4fc20771c80e80c1d0aefc216b2869043bd0b3e3b012beb7427d2f527582671c

pcre2-utf16-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3e2cff8c2538d8a2602195fe206728a5066814dfe01fa2a917bffcd1afe78e12

pcre2-utf32-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3957b7d1e836b5874081bb8c0fdf80decb9d8f8fcfc0b01ea125c32193405d7b

Red Hat CodeReady Linux Builder for IBM z Systems 8

SRPM

s390x

pcre2-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: b3b9a763fd3dc3c72d55cc10cc26c58d07e20b7334cba9800cf355bc31710440

pcre2-debugsource-10.32-3.el8_6.s390x.rpm

SHA-256: 7936242a5d3edcdf3fc508c364d902736f70d23317d1a83434b29e8e843a5596

pcre2-tools-10.32-3.el8_6.s390x.rpm

SHA-256: 809d4e889f6f8f8e5e0663adb517b0e5b9846e7d8df9ba7ece37f2d9a895140f

pcre2-tools-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: 01dc21a05db1531533eeee23acd838ae5fc6fbdcfcc4cfe504c5db247297cf9d

pcre2-utf16-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: 8cd9e1ffc0003faf7ac716c03f8a3f3a689bebdf05518aea589ebb82c3eb6601

pcre2-utf32-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: c9b2d9df1482edb94333dba67294f4138728c51544d009457220f182d4ddce6b

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

pcre2-10.32-3.el8_6.src.rpm

SHA-256: bd60f4e4bf7bbadef2ff329112b5267da38a271af3c88fe53c57499c402c6670

aarch64

pcre2-10.32-3.el8_6.aarch64.rpm

SHA-256: 56915a4bb482da61d720e0aa3cce6b7793c21d6568f14be6f50fa554a5e062ac

pcre2-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3da23187dfbfc1277a75d291c10e10cec70b617823339d59fa8474b5e366e7eb

pcre2-debugsource-10.32-3.el8_6.aarch64.rpm

SHA-256: 7e874254fe8cdf9de9ed2e4f8cc20be91b29fdd424d293138952485f2de82170

pcre2-devel-10.32-3.el8_6.aarch64.rpm

SHA-256: c804060cfeeb93f3aed7ec298564df167ae783ae11d490d0012a8a7fe3e523de

pcre2-tools-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 4fc20771c80e80c1d0aefc216b2869043bd0b3e3b012beb7427d2f527582671c

pcre2-utf16-10.32-3.el8_6.aarch64.rpm

SHA-256: c6e03493dccb5b8940522a796566bcea7bdd70ec2c021b57a50cf0aa429f6d9d

pcre2-utf16-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3e2cff8c2538d8a2602195fe206728a5066814dfe01fa2a917bffcd1afe78e12

pcre2-utf32-10.32-3.el8_6.aarch64.rpm

SHA-256: 125384b215c0cdd4c75c2a8e30a51b12fc9daf030c1d9210c2f5621f1aee031e

pcre2-utf32-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3957b7d1e836b5874081bb8c0fdf80decb9d8f8fcfc0b01ea125c32193405d7b

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6

SRPM

x86_64

pcre2-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 73adabacfed8271c27afc5cfd905af1a6c63ea295b6cd5857f79067e255fc0e9

pcre2-debugsource-10.32-3.el8_6.x86_64.rpm

SHA-256: 12373c344c9d7e8c303ca4309492437380ad3c9fcdc4807f587d34c002910c16

pcre2-tools-10.32-3.el8_6.x86_64.rpm

SHA-256: 90846104e262898fa07c95cfd3814ae08840cf0eb543f37ac701ccd5acc81053

pcre2-tools-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 25ef64c734cd79902e28b0ed98d171e0104f0db31c0505bae8aced81e7fdfd39

pcre2-utf16-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 8c741d908b361d5741e4e873a30dcbfd68a6389d626089add061c5a644a62426

pcre2-utf32-debuginfo-10.32-3.el8_6.x86_64.rpm

SHA-256: 36b81d4475ae580494679401cbe1d6d648024d1427826d71838a6b8ef151b6b1

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6

SRPM

ppc64le

pcre2-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: f6ffe2a7fa2e712503f8a0443815a84c59b93ab0ee7553e93c6eaa30ff3b5d3d

pcre2-debugsource-10.32-3.el8_6.ppc64le.rpm

SHA-256: 880ab5a12a99fadf7ff5495b80c0aaccc5f5db661c8902934fb86921d053c73b

pcre2-tools-10.32-3.el8_6.ppc64le.rpm

SHA-256: bd841afebcf759bd12583b391048ae4b858cfbb9f440dedbdfda2b17dc4c659b

pcre2-tools-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 48eb5fcbf61a7c7cf5e7f80483fc816f809696a01420594120f611c1da2cbc20

pcre2-utf16-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: 21bccb504d4a1645304ff2ad970c8783c262df2ab96a96c9b2d62ce5a024ec49

pcre2-utf32-debuginfo-10.32-3.el8_6.ppc64le.rpm

SHA-256: b7af915974d1773ea02ace41caf498a43a9c42897e2fdb98d06db3e59f4f9a2e

Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.6

SRPM

s390x

pcre2-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: b3b9a763fd3dc3c72d55cc10cc26c58d07e20b7334cba9800cf355bc31710440

pcre2-debugsource-10.32-3.el8_6.s390x.rpm

SHA-256: 7936242a5d3edcdf3fc508c364d902736f70d23317d1a83434b29e8e843a5596

pcre2-tools-10.32-3.el8_6.s390x.rpm

SHA-256: 809d4e889f6f8f8e5e0663adb517b0e5b9846e7d8df9ba7ece37f2d9a895140f

pcre2-tools-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: 01dc21a05db1531533eeee23acd838ae5fc6fbdcfcc4cfe504c5db247297cf9d

pcre2-utf16-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: 8cd9e1ffc0003faf7ac716c03f8a3f3a689bebdf05518aea589ebb82c3eb6601

pcre2-utf32-debuginfo-10.32-3.el8_6.s390x.rpm

SHA-256: c9b2d9df1482edb94333dba67294f4138728c51544d009457220f182d4ddce6b

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6

SRPM

aarch64

pcre2-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3da23187dfbfc1277a75d291c10e10cec70b617823339d59fa8474b5e366e7eb

pcre2-debugsource-10.32-3.el8_6.aarch64.rpm

SHA-256: 7e874254fe8cdf9de9ed2e4f8cc20be91b29fdd424d293138952485f2de82170

pcre2-tools-10.32-3.el8_6.aarch64.rpm

SHA-256: 81ae1375dbb7e1bdb21f4cd2f0e5169827fb8b43c44464ca87f8bf5b0d017eb8

pcre2-tools-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 4fc20771c80e80c1d0aefc216b2869043bd0b3e3b012beb7427d2f527582671c

pcre2-utf16-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3e2cff8c2538d8a2602195fe206728a5066814dfe01fa2a917bffcd1afe78e12

pcre2-utf32-debuginfo-10.32-3.el8_6.aarch64.rpm

SHA-256: 3957b7d1e836b5874081bb8c0fdf80decb9d8f8fcfc0b01ea125c32193405d7b

Related news

RHSA-2023:4053: Red Hat Security Advisory: OpenShift Container Platform 4.11.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21235: A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands o...

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

CVE-2023-21954: Oracle Critical Patch Update Advisory - April 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2023-0408-01

Red Hat Security Advisory 2023-0408-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Issues addressed include denial of service and out of bounds read vulnerabilities.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

Red Hat Security Advisory 2022-8889-01

Red Hat Security Advisory 2022-8889-01 - This is an Openshift Logging bug fix release. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-8781-01

Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.

RHSA-2022:8750: Red Hat Security Advisory: OpenShift Virtualization 4.11.1 security and bug fix update

Red Hat OpenShift Virtualization release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caus...

Red Hat Security Advisory 2022-7058-01

Red Hat Security Advisory 2022-7058-01 - OpenShift sandboxed containers support for OpenShift Container Platform provides users with built-in support for running Kata containers as an additional, optional runtime. This advisory contains an update for OpenShift sandboxed containers with security fixes and a bug fix. Space precludes documenting all of the updates to OpenShift sandboxed containers in this advisory. Issues addressed include a null pointer vulnerability.

CVE-2022-21587: Oracle Critical Patch Update Advisory - October 2022

Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Red Hat Security Advisory 2022-6696-01

Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.

RHSA-2022:6714: Red Hat Security Advisory: RHACS 3.72 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes new features and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-29526: golang: syscall: faccessat checks wrong gr...

Red Hat Security Advisory 2022-6507-01

Red Hat Security Advisory 2022-6507-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6517: Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview

Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-41103: containerd: insufficiently restricted permissions on container root and plugin directories * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

RHSA-2022:6422: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.2 security and bug fixes

Multicluster Engine for Kubernetes 2.0.2 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2

Red Hat Security Advisory 2022-6182-01

Red Hat Security Advisory 2022-6182-01 - Openshift Logging Bug Fix Release. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6183-01

Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6345-01

Red Hat Security Advisory 2022-6345-01 - Multicluster engine for Kubernetes 2.1 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

RHSA-2022:6183: Red Hat Security Advisory: Logging Subsystem 5.4.5 Security and Bug Fix Update

Logging Subsystem 5.4.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read * CVE-2022-32148: golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working

RHSA-2022:6182: Red Hat Security Advisory: Openshift Logging Security and Bug Fix update (5.3.11)

Openshift Logging Bug Fix Release (5.3.11) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6290-01

Red Hat Security Advisory 2022-6290-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6271: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.12 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS

Red Hat Security Advisory 2022-6184-01

Red Hat Security Advisory 2022-6184-01 - The Self Node Remediation Operator works in conjunction with the Machine Health Check or the Node Health Check Operators to provide automatic remediation of unhealthy nodes by rebooting them. This minimizes downtime for stateful applications and RWO volumes, as well as restoring compute capacity in the event of transient failures.

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

RHSA-2022:6184: Red Hat Security Advisory: Self Node Remediation Operator 0.4.1 security update

This is an updated release of the Self Node Remediation Operator. The Self Node Remediation Operator replaces the Poison Pill Operator, and is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

RHSA-2022:6156: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, & bugfix update

Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23440: nodejs-set-value: type confusion allows bypass of CVE-2019-10747 * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-...

Red Hat Security Advisory 2022-6103-01

Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.

RHSA-2022:6103: Red Hat Security Advisory: OpenShift Container Platform 4.11.1 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6051-01

Red Hat Security Advisory 2022-6051-01 - An update is now available for RHOL-5.5-RHEL-8. Issues addressed include denial of service, man-in-the-middle, and out of bounds read vulnerabilities.

RHSA-2022:6051: Red Hat Security Advisory: Logging Subsystem 5.5.0 - Red Hat OpenShift security update

An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-5069-01

Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

RHSA-2022:6024: Red Hat Security Advisory: New container image for Red Hat Ceph Storage 5.2 Security update

A new container image for Red Hat Ceph Storage 5.2 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43813: grafana: directory traversal vulnerability * CVE-2022-21673: grafana: Forward OAuth Identity Token can allow users to access some data sources

Red Hat Security Advisory 2022-5809-01

Red Hat Security Advisory 2022-5809-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.

Red Hat Security Advisory 2022-5251-01

Red Hat Security Advisory 2022-5251-01 - The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Issues addressed include an out of bounds read vulnerability.

RHSA-2022:5251: Red Hat Security Advisory: pcre2 security update

An update for pcre2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1586: pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c * CVE-2022-1587: pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c

CVE-2022-1586: [SECURITY] Fedora 36 Update: pcre2-10.40-1.fc36 - package-announce

An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.