Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:1420: Red Hat Security Advisory: OpenShift Container Platform 3.11.665 security and bug fix update

Red Hat OpenShift Container Platform release 3.11.665 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2021-43859: xstream: Injecting highly recursive collections or maps can cause a DoS
  • CVE-2022-25173: workflow-cps: OS command execution through crafted SCM contents
  • CVE-2022-25174: workflow-cps-global-lib: OS command execution through crafted SCM contents
  • CVE-2022-25175: workflow-multibranch: OS command execution through crafted SCM contents
  • CVE-2022-25176: workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names
  • CVE-2022-25177: workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names
  • CVE-2022-25178: workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names
  • CVE-2022-25179: workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names
  • CVE-2022-25180: workflow-cps: Password parameters are included from the original build in replayed builds
  • CVE-2022-25181: workflow-cps-global-lib: Sandbox bypass vulnerability
  • CVE-2022-25182: workflow-cps-global-lib: Sandbox bypass vulnerability
  • CVE-2022-25183: workflow-cps-global-lib: Sandbox bypass vulnerability
  • CVE-2022-25184: pipeline-build-step: Password parameter default values exposed
Red Hat Security Data
#vulnerability#web#red_hat#redis#git#kubernetes#oauth#auth

Synopsis

Important: OpenShift Container Platform 3.11.665 security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Container Platform release 3.11.665 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.11.665. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2022:1421

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html

Security Fix(es):

  • workflow-cps: OS command execution through crafted SCM contents (CVE-2022-25173)
  • workflow-cps-global-lib: OS command execution through crafted SCM contents (CVE-2022-25174)
  • workflow-multibranch: OS command execution through crafted SCM contents (CVE-2022-25175)
  • workflow-cps-global-lib: Sandbox bypass vulnerability (CVE-2022-25181)
  • workflow-cps-global-lib: Sandbox bypass vulnerability (CVE-2022-25182)
  • workflow-cps-global-lib: Sandbox bypass vulnerability (CVE-2022-25183)
  • xstream: Injecting highly recursive collections or maps can cause a DoS (CVE-2021-43859)
  • workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names (CVE-2022-25176)
  • workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names (CVE-2022-25177)
  • workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names (CVE-2022-25178)
  • workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names (CVE-2022-25179)
  • workflow-cps: Password parameters are included from the original build in replayed builds (CVE-2022-25180)
  • pipeline-build-step: Password parameter default values exposed (CVE-2022-25184)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat OpenShift Container Platform 3.11 x86_64
  • Red Hat OpenShift Container Platform for Power 3.11 ppc64le

Fixes

  • BZ - 2049783 - CVE-2021-43859 xstream: Injecting highly recursive collections or maps can cause a DoS
  • BZ - 2055719 - CVE-2022-25175 workflow-multibranch: OS command execution through crafted SCM contents
  • BZ - 2055733 - CVE-2022-25173 workflow-cps: OS command execution through crafted SCM contents
  • BZ - 2055734 - CVE-2022-25174 workflow-cps-global-lib: OS command execution through crafted SCM contents
  • BZ - 2055787 - CVE-2022-25176 workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names
  • BZ - 2055788 - CVE-2022-25177 workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names
  • BZ - 2055789 - CVE-2022-25178 workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names
  • BZ - 2055792 - CVE-2022-25179 workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names
  • BZ - 2055795 - CVE-2022-25180 workflow-cps: Password parameters are included from the original build in replayed builds
  • BZ - 2055797 - CVE-2022-25181 workflow-cps-global-lib: Sandbox bypass vulnerability
  • BZ - 2055798 - CVE-2022-25182 workflow-cps-global-lib: Sandbox bypass vulnerability
  • BZ - 2055802 - CVE-2022-25183 workflow-cps-global-lib: Sandbox bypass vulnerability
  • BZ - 2055804 - CVE-2022-25184 pipeline-build-step: Password parameter default values exposed
  • BZ - 2076828 - Placeholder bug for OCP 3.11.z image release

CVEs

  • CVE-2021-43859
  • CVE-2022-25173
  • CVE-2022-25174
  • CVE-2022-25175
  • CVE-2022-25176
  • CVE-2022-25177
  • CVE-2022-25178
  • CVE-2022-25179
  • CVE-2022-25180
  • CVE-2022-25181
  • CVE-2022-25182
  • CVE-2022-25183
  • CVE-2022-25184

Red Hat OpenShift Container Platform 3.11

SRPM

atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.src.rpm

SHA-256: b1e63572821f345bb18b613b9cffc923a6b6c4aae6405cf1b09022ba129f52b6

atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.src.rpm

SHA-256: 40eaf0d181c7a4b2f3ad2fe4854197a42c2ab40d51950fab8b383f8d32197710

atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.src.rpm

SHA-256: c08459557f4f4db483a10dcd542c468af6f5a8308bed4998b5eeba6af56b7d58

atomic-openshift-descheduler-3.11.685-1.gd435537.el7.src.rpm

SHA-256: 7742dbb7e8f6ec80274ecdd4c04bd8b6d2db7af6df8716418b599f06e06914d9

atomic-openshift-dockerregistry-3.11.685-1.g3571208.el7.src.rpm

SHA-256: ab730bce19c6061a7e32be8b79f3b147f07bcad4b842d55ed2a9f6e0dc2f64a2

atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.src.rpm

SHA-256: 2dd7580e8550c1be3b3aaa0f038efe640222d97bd7a500d12637d613a02fa391

atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.src.rpm

SHA-256: 9e74352185c8f49c35ad29492370c0b54b3f706b6a358f110d397f1e54dfd286

atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.src.rpm

SHA-256: b4ae3834197b03fad4836dcfe5f77281dba2ab2d103b352f5d0adf111367314a

atomic-openshift-web-console-3.11.685-1.gd742e61.el7.src.rpm

SHA-256: a72bfe587a82d406a7cc41a4cf67bad5a9f0a68d4b8fbcf9f0d142e1dc4866f8

golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.src.rpm

SHA-256: 45f683e5b5814ee297d86248e643ecfdcd4293793fc6bad63725e3512a6d6757

golang-github-prometheus-alertmanager-3.11.685-1.g13de638.el7.src.rpm

SHA-256: 09d84dfdf6a767325714b5437c78beb887c8a8ab92e3f8dd7e8cb9a751bb232f

golang-github-prometheus-node_exporter-3.11.685-1.g609cd20.el7.src.rpm

SHA-256: f1d8be79d96c1fc1fcdcf9c33a80cad7ae5be81b453dee741c171fe5f9e34de0

golang-github-prometheus-prometheus-3.11.685-1.g99aae51.el7.src.rpm

SHA-256: a9ba5ac415b5f0cb9e384b3dcaa0b5d20ba1c5b89162eeb771d4e7f35c10e2c5

jenkins-2-plugins-3.11.1650371376-1.el7.src.rpm

SHA-256: fde71d21bd092a2ced8a7e235ea88d695877d6204022e6d34202066c54ee4686

jenkins-2.319.3.1650348949-1.el7.src.rpm

SHA-256: 62d24121814f6f4f9aa8c5c616b822e77e3ce35ce6ae056f62098d0c7a052082

openshift-ansible-3.11.685-1.git.0.a9090ac.el7.src.rpm

SHA-256: ff3b34d95add276d6d5a8509a7ee82bff4cdf601b747b322a631b2e1bf94b349

openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.src.rpm

SHA-256: 25a005f4e441e63631c4af661093a853c881339524df2af40c409ae1f64917c4

openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.src.rpm

SHA-256: 4fa5edef3c7871a9ddd85dc079e46dad7a046ac58987454ac300bf9fc91d0d1f

openshift-kuryr-3.11.685-1.g0c4bf66.el7.src.rpm

SHA-256: 1c6bb83c5fcc28aa72815bfcc1e9b391911d8bb4ab7f8b3afdb79bb4a68cfa25

x86_64

atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.x86_64.rpm

SHA-256: 0798a4514eab9d25ea231af8b79608f7d5a9c48d42981f48adfc4df3919dcef7

atomic-enterprise-service-catalog-svcat-3.11.685-1.g2e6be86.el7.x86_64.rpm

SHA-256: 48dc0d1de6d18bd24b9fd4e139aee54dfc4f9331335244fb10d59e8a7d1ad7e4

atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: b7c6cf005c604cfc0c091bbf1cf2b82c0593e0130a2fd5dbb8510e38a268e9f8

atomic-openshift-clients-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: ccb268a26b13b3600b0dac7ef632ad783c86f0eae83c7b89c02ee6a4002ee99e

atomic-openshift-clients-redistributable-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: 0867f552ee03a7a303ab255dbba06b91fa9290fb8d61828d4254b994accb340d

atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.x86_64.rpm

SHA-256: 184d147b64281cb91d6a3a0ac94b6939cd3dd218814dd9aefeb00612f1e1ada1

atomic-openshift-descheduler-3.11.685-1.gd435537.el7.x86_64.rpm

SHA-256: 1cf5651d7668c0d1f26d7d10fc35891a13cdb471d21f450aa7434a799694f9ff

atomic-openshift-docker-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm

SHA-256: f2cde05a865a0e8b4f094fca9f6f9b8c4b51041e445a706d0794f38536a9b196

atomic-openshift-dockerregistry-3.11.685-1.g3571208.el7.x86_64.rpm

SHA-256: e49f548fc8379c9b6b2d48e7fcca6983d5af89f1a94ea0c1d72b8951a7af53a7

atomic-openshift-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm

SHA-256: f8abfc403820e2488c7996d849edc696ffe91cf34bac58cf9a05c25da73c5cc5

atomic-openshift-hyperkube-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: 05bb637eef177bdca995c9a11e06d44b56a8c65b51b971bd00d586e96abb82fd

atomic-openshift-hypershift-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: 629aac380958800abd96f56e6e372f46b3524894081a512dc0aab6b193f443bb

atomic-openshift-master-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: 5f7ca639131f9afca16e66d1bb61768613eaac6227b8cbb3d1863fe8ba00bd39

atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.x86_64.rpm

SHA-256: cd4a47340d1d73c328962076acaf8b92aad02311a7275821c802898522ff1a9e

atomic-openshift-node-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: bc2052531544e8e06823009acc0b64ae5f4c8a159712e80d1318197393c8d90a

atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.x86_64.rpm

SHA-256: f8c8b61f41fd6151220f12324de010356dbb3d258a070b60a98bf7d5b5e1522d

atomic-openshift-pod-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: 941c0ad5eb63ffd36f9d20d7bdf63ce2fb5e38bd57567c263d279d0bdb256a77

atomic-openshift-sdn-ovs-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: 1cdca5a56de30a8db4bdf33dfe535008f4db2c910324b85a523afcf5e0e69274

atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.x86_64.rpm

SHA-256: c7eff9c36c4641c168bffb0733a2584fdf09cfdda298d160ec73d547730469e1

atomic-openshift-template-service-broker-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: 70e337e4c53f1d0ecfe7e854620d2f14774a5ecc7d05824fcfd3b924f14f6693

atomic-openshift-tests-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm

SHA-256: 7fb467a3425c062511aeaa9886dd93005281ffe3c89e28246f716e10f0eaa720

atomic-openshift-web-console-3.11.685-1.gd742e61.el7.x86_64.rpm

SHA-256: c383be0579ee067bca6918307632a11d6b111f5f1171729cb1d80333d45fa1a5

golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.x86_64.rpm

SHA-256: 31c79c12409a877555d4f0dc5cf58eaf265c4ed5049d85bd8dde96aea31feb4c

jenkins-2-plugins-3.11.1650371376-1.el7.noarch.rpm

SHA-256: c8859cb7fc50bd8dd3aebdb15484f1bdab05d57e4f4c855cf24fcda0c02e0c00

jenkins-2.319.3.1650348949-1.el7.noarch.rpm

SHA-256: 2c7661c9984812030f89a563e99b5535980579f4004a85c57be3a57449a53034

openshift-ansible-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: 1a03a8865586f6c10b3f550b7a341bb7fcfafd744b612929c1b3ca0e99296761

openshift-ansible-docs-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: f91295443482bd41e9c12678a900f4fdfbdf55b2bbcac85326a506008f9a4def

openshift-ansible-playbooks-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: af6900ee7902e5b3fbe1f791c4abd2055ac245047ab125b4a6500b3ce8766869

openshift-ansible-roles-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: a4920e455b251eb3345900696f278e140f15c1504d4eb570f8b9e75936b2b7a7

openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.x86_64.rpm

SHA-256: 4aa78c8abcd87e10a3c0fc0d863c17baf13db3ec3989438fe5d689f6c7ae6647

openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.x86_64.rpm

SHA-256: d3af0677d3496d000cc3f432661497eb6d6a6597d27aca8100ce77bf55f1c2ec

openshift-kuryr-cni-3.11.685-1.g0c4bf66.el7.noarch.rpm

SHA-256: b336410e67f6777f7472a4f9c7d50f831ad3e66ae54c4e5c23141e2845379054

openshift-kuryr-common-3.11.685-1.g0c4bf66.el7.noarch.rpm

SHA-256: cbaa7f21264297991e7bc342ca3c4ca68e163341a95c0d1b0fb0f8765cf29013

openshift-kuryr-controller-3.11.685-1.g0c4bf66.el7.noarch.rpm

SHA-256: 3674f95cb76396e26236405ab12aece68ff29fee0a22926ea5ae080c2cf9129d

prometheus-3.11.685-1.g99aae51.el7.x86_64.rpm

SHA-256: a4a2d52c29ec93b277281703d364f2727049c3ea7b217ee8140bf72997868d70

prometheus-alertmanager-3.11.685-1.g13de638.el7.x86_64.rpm

SHA-256: b77a23a15dd7d895e9d8ced4104a17f193f6cdebda691580ade96dbed4e0e479

prometheus-node-exporter-3.11.685-1.g609cd20.el7.x86_64.rpm

SHA-256: e99145dc02a39f6ea08d1f077f651f4ba617b3826e6e7b916a740d96f7e96517

python2-kuryr-kubernetes-3.11.685-1.g0c4bf66.el7.noarch.rpm

SHA-256: 30cbaea5e8b7130dc97102a0c2aa1f1dafc72e8a76cc84a52e3c4c329d33ea91

Red Hat OpenShift Container Platform for Power 3.11

SRPM

atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.src.rpm

SHA-256: b1e63572821f345bb18b613b9cffc923a6b6c4aae6405cf1b09022ba129f52b6

atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.src.rpm

SHA-256: 40eaf0d181c7a4b2f3ad2fe4854197a42c2ab40d51950fab8b383f8d32197710

atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.src.rpm

SHA-256: c08459557f4f4db483a10dcd542c468af6f5a8308bed4998b5eeba6af56b7d58

atomic-openshift-descheduler-3.11.685-1.gd435537.el7.src.rpm

SHA-256: 7742dbb7e8f6ec80274ecdd4c04bd8b6d2db7af6df8716418b599f06e06914d9

atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.src.rpm

SHA-256: 2dd7580e8550c1be3b3aaa0f038efe640222d97bd7a500d12637d613a02fa391

atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.src.rpm

SHA-256: 9e74352185c8f49c35ad29492370c0b54b3f706b6a358f110d397f1e54dfd286

atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.src.rpm

SHA-256: b4ae3834197b03fad4836dcfe5f77281dba2ab2d103b352f5d0adf111367314a

atomic-openshift-web-console-3.11.685-1.gd742e61.el7.src.rpm

SHA-256: a72bfe587a82d406a7cc41a4cf67bad5a9f0a68d4b8fbcf9f0d142e1dc4866f8

golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.src.rpm

SHA-256: 45f683e5b5814ee297d86248e643ecfdcd4293793fc6bad63725e3512a6d6757

golang-github-prometheus-alertmanager-3.11.685-1.g13de638.el7.src.rpm

SHA-256: 09d84dfdf6a767325714b5437c78beb887c8a8ab92e3f8dd7e8cb9a751bb232f

golang-github-prometheus-node_exporter-3.11.685-1.g609cd20.el7.src.rpm

SHA-256: f1d8be79d96c1fc1fcdcf9c33a80cad7ae5be81b453dee741c171fe5f9e34de0

golang-github-prometheus-prometheus-3.11.685-1.g99aae51.el7.src.rpm

SHA-256: a9ba5ac415b5f0cb9e384b3dcaa0b5d20ba1c5b89162eeb771d4e7f35c10e2c5

jenkins-2-plugins-3.11.1650371376-1.el7.src.rpm

SHA-256: fde71d21bd092a2ced8a7e235ea88d695877d6204022e6d34202066c54ee4686

jenkins-2.319.3.1650348949-1.el7.src.rpm

SHA-256: 62d24121814f6f4f9aa8c5c616b822e77e3ce35ce6ae056f62098d0c7a052082

openshift-ansible-3.11.685-1.git.0.a9090ac.el7.src.rpm

SHA-256: ff3b34d95add276d6d5a8509a7ee82bff4cdf601b747b322a631b2e1bf94b349

openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.src.rpm

SHA-256: 25a005f4e441e63631c4af661093a853c881339524df2af40c409ae1f64917c4

openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.src.rpm

SHA-256: 4fa5edef3c7871a9ddd85dc079e46dad7a046ac58987454ac300bf9fc91d0d1f

ppc64le

atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.ppc64le.rpm

SHA-256: 06ff784abc082fad4d5723c400d3e7fbd7407bcec49da607aa4826f1dbdf2a19

atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.ppc64le.rpm

SHA-256: 06ff784abc082fad4d5723c400d3e7fbd7407bcec49da607aa4826f1dbdf2a19

atomic-enterprise-service-catalog-svcat-3.11.685-1.g2e6be86.el7.ppc64le.rpm

SHA-256: 35fb6eb52b96ce827c23d46cf6fb17ccda32105fc6afba4b2a8fc6286970ea05

atomic-enterprise-service-catalog-svcat-3.11.685-1.g2e6be86.el7.ppc64le.rpm

SHA-256: 35fb6eb52b96ce827c23d46cf6fb17ccda32105fc6afba4b2a8fc6286970ea05

atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: f1883722d8472ec58419067489a09433d9f050db82f7219aac3ffa5b54f6418d

atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: f1883722d8472ec58419067489a09433d9f050db82f7219aac3ffa5b54f6418d

atomic-openshift-clients-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 77a4df4928a9e9409b5da0ecb53dd19166770c93db1b76ecbd506c823ef8d101

atomic-openshift-clients-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 77a4df4928a9e9409b5da0ecb53dd19166770c93db1b76ecbd506c823ef8d101

atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.ppc64le.rpm

SHA-256: f3d8e505c11b5c34b4272c155b5ca992da0cf3c4c021c072577134bafb7c573d

atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.ppc64le.rpm

SHA-256: f3d8e505c11b5c34b4272c155b5ca992da0cf3c4c021c072577134bafb7c573d

atomic-openshift-descheduler-3.11.685-1.gd435537.el7.ppc64le.rpm

SHA-256: 9feddcb6528b7d79a2010ec27890f756084e483bd451be2b1a86eeca675b1e7d

atomic-openshift-descheduler-3.11.685-1.gd435537.el7.ppc64le.rpm

SHA-256: 9feddcb6528b7d79a2010ec27890f756084e483bd451be2b1a86eeca675b1e7d

atomic-openshift-docker-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm

SHA-256: f2cde05a865a0e8b4f094fca9f6f9b8c4b51041e445a706d0794f38536a9b196

atomic-openshift-docker-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm

SHA-256: f2cde05a865a0e8b4f094fca9f6f9b8c4b51041e445a706d0794f38536a9b196

atomic-openshift-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm

SHA-256: f8abfc403820e2488c7996d849edc696ffe91cf34bac58cf9a05c25da73c5cc5

atomic-openshift-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm

SHA-256: f8abfc403820e2488c7996d849edc696ffe91cf34bac58cf9a05c25da73c5cc5

atomic-openshift-hyperkube-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 262b4b86145a1a9f2eee413a0edb352d6eaccb2baabe0d925e566336182cd6f9

atomic-openshift-hyperkube-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 262b4b86145a1a9f2eee413a0edb352d6eaccb2baabe0d925e566336182cd6f9

atomic-openshift-hypershift-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: af8a4653ffca418c10e1b4c411bdf0df0b307523bc92cb7c7a0e3219c27d05ab

atomic-openshift-hypershift-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: af8a4653ffca418c10e1b4c411bdf0df0b307523bc92cb7c7a0e3219c27d05ab

atomic-openshift-master-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: e98c8dc0c95a3f69b2b291d130375cc74c7c87ad490fbb77ed5b92124c76808c

atomic-openshift-master-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: e98c8dc0c95a3f69b2b291d130375cc74c7c87ad490fbb77ed5b92124c76808c

atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.ppc64le.rpm

SHA-256: b65a8b75d5cb84806a952475513a95fc6c046e113881947f0d27ae1676a4874c

atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.ppc64le.rpm

SHA-256: b65a8b75d5cb84806a952475513a95fc6c046e113881947f0d27ae1676a4874c

atomic-openshift-node-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 0ae0d4f4b5499b0204902b9f9061ce460b5971a5c42df27e49d160e807ca153a

atomic-openshift-node-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 0ae0d4f4b5499b0204902b9f9061ce460b5971a5c42df27e49d160e807ca153a

atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.ppc64le.rpm

SHA-256: 988475f6fb64dec55f131578694d0a18eab5ebf89cb0a469addd5cd99735cbe1

atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.ppc64le.rpm

SHA-256: 988475f6fb64dec55f131578694d0a18eab5ebf89cb0a469addd5cd99735cbe1

atomic-openshift-pod-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 53940184e8d97d2e6c3b17bce941bd67c1dd34e582b326d15de393e9eeac0506

atomic-openshift-pod-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 53940184e8d97d2e6c3b17bce941bd67c1dd34e582b326d15de393e9eeac0506

atomic-openshift-sdn-ovs-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 79caa2e5dd97dd49f06be62d761454938804bff28451023508dc39d6b502ddce

atomic-openshift-sdn-ovs-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 79caa2e5dd97dd49f06be62d761454938804bff28451023508dc39d6b502ddce

atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.ppc64le.rpm

SHA-256: 4184403f9ad668d724ac4104bf09b4e8d1d017e4e9933c3f4ce0c7bb633be285

atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.ppc64le.rpm

SHA-256: 4184403f9ad668d724ac4104bf09b4e8d1d017e4e9933c3f4ce0c7bb633be285

atomic-openshift-template-service-broker-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 519a89031a6f74012c7f8af68386b0123e31707c2a6631dc7602a13fde0f7b32

atomic-openshift-template-service-broker-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: 519a89031a6f74012c7f8af68386b0123e31707c2a6631dc7602a13fde0f7b32

atomic-openshift-tests-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: cab26eeabc6d6c4d3281c8ae4765f23c3d795e35ae843ae1657ae424f050b10a

atomic-openshift-tests-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm

SHA-256: cab26eeabc6d6c4d3281c8ae4765f23c3d795e35ae843ae1657ae424f050b10a

atomic-openshift-web-console-3.11.685-1.gd742e61.el7.ppc64le.rpm

SHA-256: 64c2b540e466b3868c341d78d16ed8849b7205fa1edc8d61c4cb94a2c72c02ef

atomic-openshift-web-console-3.11.685-1.gd742e61.el7.ppc64le.rpm

SHA-256: 64c2b540e466b3868c341d78d16ed8849b7205fa1edc8d61c4cb94a2c72c02ef

golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.ppc64le.rpm

SHA-256: ba256699c8397877147f0bd35d564253ca1f8866e335b2c0c7c2c47bb65929e5

golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.ppc64le.rpm

SHA-256: ba256699c8397877147f0bd35d564253ca1f8866e335b2c0c7c2c47bb65929e5

jenkins-2-plugins-3.11.1650371376-1.el7.noarch.rpm

SHA-256: c8859cb7fc50bd8dd3aebdb15484f1bdab05d57e4f4c855cf24fcda0c02e0c00

jenkins-2-plugins-3.11.1650371376-1.el7.noarch.rpm

SHA-256: c8859cb7fc50bd8dd3aebdb15484f1bdab05d57e4f4c855cf24fcda0c02e0c00

jenkins-2.319.3.1650348949-1.el7.noarch.rpm

SHA-256: 2c7661c9984812030f89a563e99b5535980579f4004a85c57be3a57449a53034

jenkins-2.319.3.1650348949-1.el7.noarch.rpm

SHA-256: 2c7661c9984812030f89a563e99b5535980579f4004a85c57be3a57449a53034

openshift-ansible-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: 1a03a8865586f6c10b3f550b7a341bb7fcfafd744b612929c1b3ca0e99296761

openshift-ansible-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: 1a03a8865586f6c10b3f550b7a341bb7fcfafd744b612929c1b3ca0e99296761

openshift-ansible-docs-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: f91295443482bd41e9c12678a900f4fdfbdf55b2bbcac85326a506008f9a4def

openshift-ansible-docs-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: f91295443482bd41e9c12678a900f4fdfbdf55b2bbcac85326a506008f9a4def

openshift-ansible-playbooks-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: af6900ee7902e5b3fbe1f791c4abd2055ac245047ab125b4a6500b3ce8766869

openshift-ansible-playbooks-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: af6900ee7902e5b3fbe1f791c4abd2055ac245047ab125b4a6500b3ce8766869

openshift-ansible-roles-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: a4920e455b251eb3345900696f278e140f15c1504d4eb570f8b9e75936b2b7a7

openshift-ansible-roles-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: a4920e455b251eb3345900696f278e140f15c1504d4eb570f8b9e75936b2b7a7

openshift-ansible-test-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: f161e4979c2cd3eecf7b46d68d3c41e7eb5ee20cd135cf10f5f197b362ce07ed

openshift-ansible-test-3.11.685-1.git.0.a9090ac.el7.noarch.rpm

SHA-256: f161e4979c2cd3eecf7b46d68d3c41e7eb5ee20cd135cf10f5f197b362ce07ed

openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.ppc64le.rpm

SHA-256: 88a269ad8fd2bf24881d2a87989a8d8f0fec0efd531bc30925d842e9c59bebfc

openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.ppc64le.rpm

SHA-256: 88a269ad8fd2bf24881d2a87989a8d8f0fec0efd531bc30925d842e9c59bebfc

openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.ppc64le.rpm

SHA-256: 87cbf2e65efd9642b3c8ca2a201f7ef71239594d55da1c5958dc396e0db93c81

openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.ppc64le.rpm

SHA-256: 87cbf2e65efd9642b3c8ca2a201f7ef71239594d55da1c5958dc396e0db93c81

prometheus-3.11.685-1.g99aae51.el7.ppc64le.rpm

SHA-256: c8ddccdf9c2054e2fd2c2828ae57de20d923dec82fb74a42e9e3adf133aa7ce6

prometheus-3.11.685-1.g99aae51.el7.ppc64le.rpm

SHA-256: c8ddccdf9c2054e2fd2c2828ae57de20d923dec82fb74a42e9e3adf133aa7ce6

prometheus-alertmanager-3.11.685-1.g13de638.el7.ppc64le.rpm

SHA-256: 0c11b76c8906f1fe186ffec422d465258ec7c00c47cda4a7d386a827ade6777b

prometheus-alertmanager-3.11.685-1.g13de638.el7.ppc64le.rpm

SHA-256: 0c11b76c8906f1fe186ffec422d465258ec7c00c47cda4a7d386a827ade6777b

prometheus-node-exporter-3.11.685-1.g609cd20.el7.ppc64le.rpm

SHA-256: 0d08d79cf48d9a8fbae4cee33bcb02a0cb0ee7cf0fdf76be03b17193cea1d33f

prometheus-node-exporter-3.11.685-1.g609cd20.el7.ppc64le.rpm

SHA-256: 0d08d79cf48d9a8fbae4cee33bcb02a0cb0ee7cf0fdf76be03b17193cea1d33f

Related news

CVE-2022-22323: IBM Security Identity Manager buffer overflow CVE-2022-22323 Vulnerability Report

IBM Security Identity Manager (IBM Security Verify Password Synchronization Plug-in for Windows AD 10.x) is vulnerable to a denial of service, caused by a heap-based buffer overflow in the Password Synch Plug-in. An authenticated attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 218379.

CVE-2021-38874: IBM QRadar information disclosure CVE-2021-38874 Vulnerability Report

IBM QRadar SIEM 7.3, 7.4, and 7.5 allows for users to access information across tenant and domain boundaries in some situations. IBM X-Force ID: 208397.

CVE-2021-38939: IBM QRadar information disclosure CVE-2021-38939 Vulnerability Report

IBM QRadar SIEM 7.3, 7.4, and 7.5 stores potentially sensitive information in log files that could be read by an user with access to creating domains. IBM X-Force ID: 211037.

CVE-2022-22345: IBM QRadar cross-site scripting CVE-2022-22345 Vulnerability Report

IBM QRadar 7.3, 7.4, and 7.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 220041.

CVE-2022-22312: Security Bulletin: IBM Security Verify Password Synchronization Plug-in for Windows AD is vulnerable to a denial of service vulnerability (CVE-2022-22323, CVE-2022-22312)

IBM Security Identity Manager (IBM Security Verify Password Synchronization Plug-in for Windows AD 10.x) is vulnerable to a denial of service, caused by a heap-based buffer overflow in the Password Synch Plug-in. An authenticated attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 217369.

CVE-2022-24889: Build software better, together

Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 21.0.8, 22.2.4, and 23.0.1, it is possible to trick administrators into enabling "recommended" apps for the Nextcloud server that they do not need, thus expanding their attack surface unnecessarily. This issue is fixed in versions 21.0.8 , 22.2.4, and 23.0.1.

CVE-2022-27239: Linux CIFS Utils and Samba - Free Knowledge Base

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

CVE-2022-27905: Security Advisory - State Farm

In ControlUp Real-Time Agent before 8.6, an unquoted path can result in privilege escalation. An attacker would require write permissions to the root level of the OS drive (C:\) to exploit this.

RHSA-2022:1628: Red Hat Security Advisory: web-admin-build security update

Updated web-admin-build packages are now available for Red Hat Gluster Storage 3.5 Web Administration on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-44716: golang: net/http: limit growth of header canonicalization cache

RHSA-2022:1626: Red Hat Security Advisory: Red Hat AMQ Broker 7.8.6 release and security update

Red Hat AMQ Broker 7.8.6 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-22965: spring-framework: RCE via Data Binding on JDK 9+

RHSA-2022:1627: Red Hat Security Advisory: Red Hat AMQ Broker 7.9.4 release and security update

Red Hat AMQ Broker 7.9.4 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-22965: spring-framework: RCE via Data Binding on JDK 9+

RHSA-2022:1619: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0435: kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS

RHSA-2022:1618: Red Hat Security Advisory: convert2rhel security update

A security update for convert2rhel is now available for unsupported conversions of CentOS Linux 6 and Oracle Linux 6 to Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0852: convert2rhel: Red Hat account password passed via command line by code

RHSA-2022:1617: Red Hat Security Advisory: convert2rhel security update

A security update for convert2rhel is now available for supported conversions of CentOS Linux 7 and Oracle Linux 7 to Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0852: convert2rhel: Red Hat account password passed via command line by code

RHSA-2022:1599: Red Hat Security Advisory: convert2rhel security update

A security update for convert2rhel is now available for supported conversions of CentOS Linux 8 and Oracle Linux 8 to Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0852: convert2rhel: Red Hat account password passed via command line by code

CVE-2022-28085: AddressSanitizer: heap-buffer-overflow in function pdf_write_names · Issue #480 · michaelrsweet/htmldoc

A flaw was found in htmldoc commit 31f7804. A heap buffer overflow in the function pdf_write_names in ps-pdf.cxx may lead to arbitrary code execution and Denial of Service (DoS).

CVE-2022-29700: Security Advisory ZAA-2022-03 | Zammad

A lack of password length restriction in Zammad v5.1.0 allows for the creation of extremely long passwords which can cause a Denial of Service (DoS) during password verification.

CVE-2022-27331: Security Advisory ZAA-2022-02 | Zammad

An access control issue in Zammad v5.0.3 broadcasts administrative configuration changes to all users who have an active application instance, including settings that should only be visible to authenticated users.

CVE-2022-27332: Security Advisory ZAA-2022-01 | Zammad

An access control issue in Zammad v5.0.3 allows attackers to write entries to the CTI caller log without authentication. This vulnerability can allow attackers to execute phishing attacks or cause a Denial of Service (DoS).

CVE-2022-29701: Security Advisory ZAA-2022-04 | Zammad

A lack of rate limiting in the 'forgot password' feature of Zammad v5.1.0 allows attackers to send an excessive amount of reset requests for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages.

RHSA-2022:1546: Red Hat Security Advisory: polkit security update

An update for polkit is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4115: polkit: file descriptor leak allows an unprivileged user to cause a crash

RHSA-2022:1550: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-25636: kernel: heap out of bounds write in nf_dup_netdev.c

RHSA-2022:1552: Red Hat Security Advisory: vim security update

An update for vim is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1154: vim: use after free in utf_ptr2char

RHSA-2022:1556: Red Hat Security Advisory: mariadb:10.3 security and bug fix update

An update for the mariadb:10.3 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-2154: mysql: Server: DML unspecified vulnerability (CPU Apr 2021) * CVE-2021-2166: mysql: Server: DML unspecified vulnerability (CPU Apr 2021) * CVE-2021-2372: mysql: InnoDB unspecified vulnerability (CPU Jul 2021) * CVE-2021-2389: mysql: InnoDB unspecified vulnerability (CPU Jul 2021) * CVE-2021-35604: mysql: InnoDB unspecified vulnerab...

RHSA-2022:1566: Red Hat Security Advisory: container-tools:2.0 security update

An update for the container-tools:2.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27649: podman: Default inheritable capabilities for linux container should be empty * CVE-2022-27651: buildah: Default inheritable capabilities for linux container should be empty

RHSA-2022:1565: Red Hat Security Advisory: container-tools:3.0 security and bug fix update

An update for the container-tools:3.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27649: podman: Default inheritable capabilities for linux container should be empty * CVE-2022-27651: buildah: Default inheritable capabilities for linux container should be empty

RHSA-2022:1535: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-25636: kernel: heap out of bounds write in nf_dup_netdev.c

RHSA-2022:1592: Red Hat Security Advisory: gzip security update

An update for gzip is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1271: gzip: arbitrary-file-write vulnerability

RHSA-2022:1557: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-2154: mysql: Server: DML unspecified vulnerability (CPU Apr 2021) * CVE-2021-2166: mysql: Server: DML unspecified vulnerability (CPU Apr 2021) * CVE-2021-2372: mysql: InnoDB unspecified vulnerability (CPU Jul 2021) * CVE-2021-2389: mysql: InnoDB unspecified vulnerability (CPU Jul 2021) * CVE-2021-35604: mysql: InnoDB unspecified vulnerab...

RHSA-2022:1591: Red Hat Security Advisory: zlib security update

An update for zlib is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-25032: zlib: A flaw found in zlib when compressing (not decompressing) certain inputs

RHSA-2022:1589: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0435: kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS

RHSA-2022:1555: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-25636: kernel: heap out of bounds write in nf_dup_netdev.c

RHSA-2022:1537: Red Hat Security Advisory: gzip security update

An update for gzip is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1271: gzip: arbitrary-file-write vulnerability

RHSA-2022:1540: Red Hat Security Advisory: xmlrpc-c security update

An update for xmlrpc-c is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25235: expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution

RHSA-2022:1541: Red Hat Security Advisory: maven-shared-utils security update

An update for maven-shared-utils is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29599: maven-shared-utils: Command injection via Commandline class

RHSA-2022:1539: Red Hat Security Advisory: xmlrpc-c security update

An update for xmlrpc-c is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25235: expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution