Headline
RHSA-2022:1420: Red Hat Security Advisory: OpenShift Container Platform 3.11.665 security and bug fix update
Red Hat OpenShift Container Platform release 3.11.665 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-43859: xstream: Injecting highly recursive collections or maps can cause a DoS
- CVE-2022-25173: workflow-cps: OS command execution through crafted SCM contents
- CVE-2022-25174: workflow-cps-global-lib: OS command execution through crafted SCM contents
- CVE-2022-25175: workflow-multibranch: OS command execution through crafted SCM contents
- CVE-2022-25176: workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names
- CVE-2022-25177: workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names
- CVE-2022-25178: workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names
- CVE-2022-25179: workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names
- CVE-2022-25180: workflow-cps: Password parameters are included from the original build in replayed builds
- CVE-2022-25181: workflow-cps-global-lib: Sandbox bypass vulnerability
- CVE-2022-25182: workflow-cps-global-lib: Sandbox bypass vulnerability
- CVE-2022-25183: workflow-cps-global-lib: Sandbox bypass vulnerability
- CVE-2022-25184: pipeline-build-step: Password parameter default values exposed
Synopsis
Important: OpenShift Container Platform 3.11.665 security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
Red Hat OpenShift Container Platform release 3.11.665 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.11.665. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2022:1421
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html
Security Fix(es):
- workflow-cps: OS command execution through crafted SCM contents (CVE-2022-25173)
- workflow-cps-global-lib: OS command execution through crafted SCM contents (CVE-2022-25174)
- workflow-multibranch: OS command execution through crafted SCM contents (CVE-2022-25175)
- workflow-cps-global-lib: Sandbox bypass vulnerability (CVE-2022-25181)
- workflow-cps-global-lib: Sandbox bypass vulnerability (CVE-2022-25182)
- workflow-cps-global-lib: Sandbox bypass vulnerability (CVE-2022-25183)
- xstream: Injecting highly recursive collections or maps can cause a DoS (CVE-2021-43859)
- workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names (CVE-2022-25176)
- workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names (CVE-2022-25177)
- workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names (CVE-2022-25178)
- workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names (CVE-2022-25179)
- workflow-cps: Password parameters are included from the original build in replayed builds (CVE-2022-25180)
- pipeline-build-step: Password parameter default values exposed (CVE-2022-25184)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat OpenShift Container Platform 3.11 x86_64
- Red Hat OpenShift Container Platform for Power 3.11 ppc64le
Fixes
- BZ - 2049783 - CVE-2021-43859 xstream: Injecting highly recursive collections or maps can cause a DoS
- BZ - 2055719 - CVE-2022-25175 workflow-multibranch: OS command execution through crafted SCM contents
- BZ - 2055733 - CVE-2022-25173 workflow-cps: OS command execution through crafted SCM contents
- BZ - 2055734 - CVE-2022-25174 workflow-cps-global-lib: OS command execution through crafted SCM contents
- BZ - 2055787 - CVE-2022-25176 workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names
- BZ - 2055788 - CVE-2022-25177 workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names
- BZ - 2055789 - CVE-2022-25178 workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names
- BZ - 2055792 - CVE-2022-25179 workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names
- BZ - 2055795 - CVE-2022-25180 workflow-cps: Password parameters are included from the original build in replayed builds
- BZ - 2055797 - CVE-2022-25181 workflow-cps-global-lib: Sandbox bypass vulnerability
- BZ - 2055798 - CVE-2022-25182 workflow-cps-global-lib: Sandbox bypass vulnerability
- BZ - 2055802 - CVE-2022-25183 workflow-cps-global-lib: Sandbox bypass vulnerability
- BZ - 2055804 - CVE-2022-25184 pipeline-build-step: Password parameter default values exposed
- BZ - 2076828 - Placeholder bug for OCP 3.11.z image release
CVEs
- CVE-2021-43859
- CVE-2022-25173
- CVE-2022-25174
- CVE-2022-25175
- CVE-2022-25176
- CVE-2022-25177
- CVE-2022-25178
- CVE-2022-25179
- CVE-2022-25180
- CVE-2022-25181
- CVE-2022-25182
- CVE-2022-25183
- CVE-2022-25184
Red Hat OpenShift Container Platform 3.11
SRPM
atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.src.rpm
SHA-256: b1e63572821f345bb18b613b9cffc923a6b6c4aae6405cf1b09022ba129f52b6
atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.src.rpm
SHA-256: 40eaf0d181c7a4b2f3ad2fe4854197a42c2ab40d51950fab8b383f8d32197710
atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.src.rpm
SHA-256: c08459557f4f4db483a10dcd542c468af6f5a8308bed4998b5eeba6af56b7d58
atomic-openshift-descheduler-3.11.685-1.gd435537.el7.src.rpm
SHA-256: 7742dbb7e8f6ec80274ecdd4c04bd8b6d2db7af6df8716418b599f06e06914d9
atomic-openshift-dockerregistry-3.11.685-1.g3571208.el7.src.rpm
SHA-256: ab730bce19c6061a7e32be8b79f3b147f07bcad4b842d55ed2a9f6e0dc2f64a2
atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.src.rpm
SHA-256: 2dd7580e8550c1be3b3aaa0f038efe640222d97bd7a500d12637d613a02fa391
atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.src.rpm
SHA-256: 9e74352185c8f49c35ad29492370c0b54b3f706b6a358f110d397f1e54dfd286
atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.src.rpm
SHA-256: b4ae3834197b03fad4836dcfe5f77281dba2ab2d103b352f5d0adf111367314a
atomic-openshift-web-console-3.11.685-1.gd742e61.el7.src.rpm
SHA-256: a72bfe587a82d406a7cc41a4cf67bad5a9f0a68d4b8fbcf9f0d142e1dc4866f8
golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.src.rpm
SHA-256: 45f683e5b5814ee297d86248e643ecfdcd4293793fc6bad63725e3512a6d6757
golang-github-prometheus-alertmanager-3.11.685-1.g13de638.el7.src.rpm
SHA-256: 09d84dfdf6a767325714b5437c78beb887c8a8ab92e3f8dd7e8cb9a751bb232f
golang-github-prometheus-node_exporter-3.11.685-1.g609cd20.el7.src.rpm
SHA-256: f1d8be79d96c1fc1fcdcf9c33a80cad7ae5be81b453dee741c171fe5f9e34de0
golang-github-prometheus-prometheus-3.11.685-1.g99aae51.el7.src.rpm
SHA-256: a9ba5ac415b5f0cb9e384b3dcaa0b5d20ba1c5b89162eeb771d4e7f35c10e2c5
jenkins-2-plugins-3.11.1650371376-1.el7.src.rpm
SHA-256: fde71d21bd092a2ced8a7e235ea88d695877d6204022e6d34202066c54ee4686
jenkins-2.319.3.1650348949-1.el7.src.rpm
SHA-256: 62d24121814f6f4f9aa8c5c616b822e77e3ce35ce6ae056f62098d0c7a052082
openshift-ansible-3.11.685-1.git.0.a9090ac.el7.src.rpm
SHA-256: ff3b34d95add276d6d5a8509a7ee82bff4cdf601b747b322a631b2e1bf94b349
openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.src.rpm
SHA-256: 25a005f4e441e63631c4af661093a853c881339524df2af40c409ae1f64917c4
openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.src.rpm
SHA-256: 4fa5edef3c7871a9ddd85dc079e46dad7a046ac58987454ac300bf9fc91d0d1f
openshift-kuryr-3.11.685-1.g0c4bf66.el7.src.rpm
SHA-256: 1c6bb83c5fcc28aa72815bfcc1e9b391911d8bb4ab7f8b3afdb79bb4a68cfa25
x86_64
atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.x86_64.rpm
SHA-256: 0798a4514eab9d25ea231af8b79608f7d5a9c48d42981f48adfc4df3919dcef7
atomic-enterprise-service-catalog-svcat-3.11.685-1.g2e6be86.el7.x86_64.rpm
SHA-256: 48dc0d1de6d18bd24b9fd4e139aee54dfc4f9331335244fb10d59e8a7d1ad7e4
atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: b7c6cf005c604cfc0c091bbf1cf2b82c0593e0130a2fd5dbb8510e38a268e9f8
atomic-openshift-clients-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: ccb268a26b13b3600b0dac7ef632ad783c86f0eae83c7b89c02ee6a4002ee99e
atomic-openshift-clients-redistributable-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: 0867f552ee03a7a303ab255dbba06b91fa9290fb8d61828d4254b994accb340d
atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.x86_64.rpm
SHA-256: 184d147b64281cb91d6a3a0ac94b6939cd3dd218814dd9aefeb00612f1e1ada1
atomic-openshift-descheduler-3.11.685-1.gd435537.el7.x86_64.rpm
SHA-256: 1cf5651d7668c0d1f26d7d10fc35891a13cdb471d21f450aa7434a799694f9ff
atomic-openshift-docker-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm
SHA-256: f2cde05a865a0e8b4f094fca9f6f9b8c4b51041e445a706d0794f38536a9b196
atomic-openshift-dockerregistry-3.11.685-1.g3571208.el7.x86_64.rpm
SHA-256: e49f548fc8379c9b6b2d48e7fcca6983d5af89f1a94ea0c1d72b8951a7af53a7
atomic-openshift-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm
SHA-256: f8abfc403820e2488c7996d849edc696ffe91cf34bac58cf9a05c25da73c5cc5
atomic-openshift-hyperkube-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: 05bb637eef177bdca995c9a11e06d44b56a8c65b51b971bd00d586e96abb82fd
atomic-openshift-hypershift-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: 629aac380958800abd96f56e6e372f46b3524894081a512dc0aab6b193f443bb
atomic-openshift-master-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: 5f7ca639131f9afca16e66d1bb61768613eaac6227b8cbb3d1863fe8ba00bd39
atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.x86_64.rpm
SHA-256: cd4a47340d1d73c328962076acaf8b92aad02311a7275821c802898522ff1a9e
atomic-openshift-node-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: bc2052531544e8e06823009acc0b64ae5f4c8a159712e80d1318197393c8d90a
atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.x86_64.rpm
SHA-256: f8c8b61f41fd6151220f12324de010356dbb3d258a070b60a98bf7d5b5e1522d
atomic-openshift-pod-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: 941c0ad5eb63ffd36f9d20d7bdf63ce2fb5e38bd57567c263d279d0bdb256a77
atomic-openshift-sdn-ovs-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: 1cdca5a56de30a8db4bdf33dfe535008f4db2c910324b85a523afcf5e0e69274
atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.x86_64.rpm
SHA-256: c7eff9c36c4641c168bffb0733a2584fdf09cfdda298d160ec73d547730469e1
atomic-openshift-template-service-broker-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: 70e337e4c53f1d0ecfe7e854620d2f14774a5ecc7d05824fcfd3b924f14f6693
atomic-openshift-tests-3.11.685-1.git.0.7faaeaa.el7.x86_64.rpm
SHA-256: 7fb467a3425c062511aeaa9886dd93005281ffe3c89e28246f716e10f0eaa720
atomic-openshift-web-console-3.11.685-1.gd742e61.el7.x86_64.rpm
SHA-256: c383be0579ee067bca6918307632a11d6b111f5f1171729cb1d80333d45fa1a5
golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.x86_64.rpm
SHA-256: 31c79c12409a877555d4f0dc5cf58eaf265c4ed5049d85bd8dde96aea31feb4c
jenkins-2-plugins-3.11.1650371376-1.el7.noarch.rpm
SHA-256: c8859cb7fc50bd8dd3aebdb15484f1bdab05d57e4f4c855cf24fcda0c02e0c00
jenkins-2.319.3.1650348949-1.el7.noarch.rpm
SHA-256: 2c7661c9984812030f89a563e99b5535980579f4004a85c57be3a57449a53034
openshift-ansible-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: 1a03a8865586f6c10b3f550b7a341bb7fcfafd744b612929c1b3ca0e99296761
openshift-ansible-docs-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: f91295443482bd41e9c12678a900f4fdfbdf55b2bbcac85326a506008f9a4def
openshift-ansible-playbooks-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: af6900ee7902e5b3fbe1f791c4abd2055ac245047ab125b4a6500b3ce8766869
openshift-ansible-roles-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: a4920e455b251eb3345900696f278e140f15c1504d4eb570f8b9e75936b2b7a7
openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.x86_64.rpm
SHA-256: 4aa78c8abcd87e10a3c0fc0d863c17baf13db3ec3989438fe5d689f6c7ae6647
openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.x86_64.rpm
SHA-256: d3af0677d3496d000cc3f432661497eb6d6a6597d27aca8100ce77bf55f1c2ec
openshift-kuryr-cni-3.11.685-1.g0c4bf66.el7.noarch.rpm
SHA-256: b336410e67f6777f7472a4f9c7d50f831ad3e66ae54c4e5c23141e2845379054
openshift-kuryr-common-3.11.685-1.g0c4bf66.el7.noarch.rpm
SHA-256: cbaa7f21264297991e7bc342ca3c4ca68e163341a95c0d1b0fb0f8765cf29013
openshift-kuryr-controller-3.11.685-1.g0c4bf66.el7.noarch.rpm
SHA-256: 3674f95cb76396e26236405ab12aece68ff29fee0a22926ea5ae080c2cf9129d
prometheus-3.11.685-1.g99aae51.el7.x86_64.rpm
SHA-256: a4a2d52c29ec93b277281703d364f2727049c3ea7b217ee8140bf72997868d70
prometheus-alertmanager-3.11.685-1.g13de638.el7.x86_64.rpm
SHA-256: b77a23a15dd7d895e9d8ced4104a17f193f6cdebda691580ade96dbed4e0e479
prometheus-node-exporter-3.11.685-1.g609cd20.el7.x86_64.rpm
SHA-256: e99145dc02a39f6ea08d1f077f651f4ba617b3826e6e7b916a740d96f7e96517
python2-kuryr-kubernetes-3.11.685-1.g0c4bf66.el7.noarch.rpm
SHA-256: 30cbaea5e8b7130dc97102a0c2aa1f1dafc72e8a76cc84a52e3c4c329d33ea91
Red Hat OpenShift Container Platform for Power 3.11
SRPM
atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.src.rpm
SHA-256: b1e63572821f345bb18b613b9cffc923a6b6c4aae6405cf1b09022ba129f52b6
atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.src.rpm
SHA-256: 40eaf0d181c7a4b2f3ad2fe4854197a42c2ab40d51950fab8b383f8d32197710
atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.src.rpm
SHA-256: c08459557f4f4db483a10dcd542c468af6f5a8308bed4998b5eeba6af56b7d58
atomic-openshift-descheduler-3.11.685-1.gd435537.el7.src.rpm
SHA-256: 7742dbb7e8f6ec80274ecdd4c04bd8b6d2db7af6df8716418b599f06e06914d9
atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.src.rpm
SHA-256: 2dd7580e8550c1be3b3aaa0f038efe640222d97bd7a500d12637d613a02fa391
atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.src.rpm
SHA-256: 9e74352185c8f49c35ad29492370c0b54b3f706b6a358f110d397f1e54dfd286
atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.src.rpm
SHA-256: b4ae3834197b03fad4836dcfe5f77281dba2ab2d103b352f5d0adf111367314a
atomic-openshift-web-console-3.11.685-1.gd742e61.el7.src.rpm
SHA-256: a72bfe587a82d406a7cc41a4cf67bad5a9f0a68d4b8fbcf9f0d142e1dc4866f8
golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.src.rpm
SHA-256: 45f683e5b5814ee297d86248e643ecfdcd4293793fc6bad63725e3512a6d6757
golang-github-prometheus-alertmanager-3.11.685-1.g13de638.el7.src.rpm
SHA-256: 09d84dfdf6a767325714b5437c78beb887c8a8ab92e3f8dd7e8cb9a751bb232f
golang-github-prometheus-node_exporter-3.11.685-1.g609cd20.el7.src.rpm
SHA-256: f1d8be79d96c1fc1fcdcf9c33a80cad7ae5be81b453dee741c171fe5f9e34de0
golang-github-prometheus-prometheus-3.11.685-1.g99aae51.el7.src.rpm
SHA-256: a9ba5ac415b5f0cb9e384b3dcaa0b5d20ba1c5b89162eeb771d4e7f35c10e2c5
jenkins-2-plugins-3.11.1650371376-1.el7.src.rpm
SHA-256: fde71d21bd092a2ced8a7e235ea88d695877d6204022e6d34202066c54ee4686
jenkins-2.319.3.1650348949-1.el7.src.rpm
SHA-256: 62d24121814f6f4f9aa8c5c616b822e77e3ce35ce6ae056f62098d0c7a052082
openshift-ansible-3.11.685-1.git.0.a9090ac.el7.src.rpm
SHA-256: ff3b34d95add276d6d5a8509a7ee82bff4cdf601b747b322a631b2e1bf94b349
openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.src.rpm
SHA-256: 25a005f4e441e63631c4af661093a853c881339524df2af40c409ae1f64917c4
openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.src.rpm
SHA-256: 4fa5edef3c7871a9ddd85dc079e46dad7a046ac58987454ac300bf9fc91d0d1f
ppc64le
atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.ppc64le.rpm
SHA-256: 06ff784abc082fad4d5723c400d3e7fbd7407bcec49da607aa4826f1dbdf2a19
atomic-enterprise-service-catalog-3.11.685-1.g2e6be86.el7.ppc64le.rpm
SHA-256: 06ff784abc082fad4d5723c400d3e7fbd7407bcec49da607aa4826f1dbdf2a19
atomic-enterprise-service-catalog-svcat-3.11.685-1.g2e6be86.el7.ppc64le.rpm
SHA-256: 35fb6eb52b96ce827c23d46cf6fb17ccda32105fc6afba4b2a8fc6286970ea05
atomic-enterprise-service-catalog-svcat-3.11.685-1.g2e6be86.el7.ppc64le.rpm
SHA-256: 35fb6eb52b96ce827c23d46cf6fb17ccda32105fc6afba4b2a8fc6286970ea05
atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: f1883722d8472ec58419067489a09433d9f050db82f7219aac3ffa5b54f6418d
atomic-openshift-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: f1883722d8472ec58419067489a09433d9f050db82f7219aac3ffa5b54f6418d
atomic-openshift-clients-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 77a4df4928a9e9409b5da0ecb53dd19166770c93db1b76ecbd506c823ef8d101
atomic-openshift-clients-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 77a4df4928a9e9409b5da0ecb53dd19166770c93db1b76ecbd506c823ef8d101
atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.ppc64le.rpm
SHA-256: f3d8e505c11b5c34b4272c155b5ca992da0cf3c4c021c072577134bafb7c573d
atomic-openshift-cluster-autoscaler-3.11.685-1.g99b2acf.el7.ppc64le.rpm
SHA-256: f3d8e505c11b5c34b4272c155b5ca992da0cf3c4c021c072577134bafb7c573d
atomic-openshift-descheduler-3.11.685-1.gd435537.el7.ppc64le.rpm
SHA-256: 9feddcb6528b7d79a2010ec27890f756084e483bd451be2b1a86eeca675b1e7d
atomic-openshift-descheduler-3.11.685-1.gd435537.el7.ppc64le.rpm
SHA-256: 9feddcb6528b7d79a2010ec27890f756084e483bd451be2b1a86eeca675b1e7d
atomic-openshift-docker-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm
SHA-256: f2cde05a865a0e8b4f094fca9f6f9b8c4b51041e445a706d0794f38536a9b196
atomic-openshift-docker-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm
SHA-256: f2cde05a865a0e8b4f094fca9f6f9b8c4b51041e445a706d0794f38536a9b196
atomic-openshift-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm
SHA-256: f8abfc403820e2488c7996d849edc696ffe91cf34bac58cf9a05c25da73c5cc5
atomic-openshift-excluder-3.11.685-1.git.0.7faaeaa.el7.noarch.rpm
SHA-256: f8abfc403820e2488c7996d849edc696ffe91cf34bac58cf9a05c25da73c5cc5
atomic-openshift-hyperkube-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 262b4b86145a1a9f2eee413a0edb352d6eaccb2baabe0d925e566336182cd6f9
atomic-openshift-hyperkube-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 262b4b86145a1a9f2eee413a0edb352d6eaccb2baabe0d925e566336182cd6f9
atomic-openshift-hypershift-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: af8a4653ffca418c10e1b4c411bdf0df0b307523bc92cb7c7a0e3219c27d05ab
atomic-openshift-hypershift-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: af8a4653ffca418c10e1b4c411bdf0df0b307523bc92cb7c7a0e3219c27d05ab
atomic-openshift-master-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: e98c8dc0c95a3f69b2b291d130375cc74c7c87ad490fbb77ed5b92124c76808c
atomic-openshift-master-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: e98c8dc0c95a3f69b2b291d130375cc74c7c87ad490fbb77ed5b92124c76808c
atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.ppc64le.rpm
SHA-256: b65a8b75d5cb84806a952475513a95fc6c046e113881947f0d27ae1676a4874c
atomic-openshift-metrics-server-3.11.685-1.gf8bf728.el7.ppc64le.rpm
SHA-256: b65a8b75d5cb84806a952475513a95fc6c046e113881947f0d27ae1676a4874c
atomic-openshift-node-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 0ae0d4f4b5499b0204902b9f9061ce460b5971a5c42df27e49d160e807ca153a
atomic-openshift-node-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 0ae0d4f4b5499b0204902b9f9061ce460b5971a5c42df27e49d160e807ca153a
atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.ppc64le.rpm
SHA-256: 988475f6fb64dec55f131578694d0a18eab5ebf89cb0a469addd5cd99735cbe1
atomic-openshift-node-problem-detector-3.11.685-1.gc8f26da.el7.ppc64le.rpm
SHA-256: 988475f6fb64dec55f131578694d0a18eab5ebf89cb0a469addd5cd99735cbe1
atomic-openshift-pod-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 53940184e8d97d2e6c3b17bce941bd67c1dd34e582b326d15de393e9eeac0506
atomic-openshift-pod-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 53940184e8d97d2e6c3b17bce941bd67c1dd34e582b326d15de393e9eeac0506
atomic-openshift-sdn-ovs-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 79caa2e5dd97dd49f06be62d761454938804bff28451023508dc39d6b502ddce
atomic-openshift-sdn-ovs-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 79caa2e5dd97dd49f06be62d761454938804bff28451023508dc39d6b502ddce
atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.ppc64le.rpm
SHA-256: 4184403f9ad668d724ac4104bf09b4e8d1d017e4e9933c3f4ce0c7bb633be285
atomic-openshift-service-idler-3.11.685-1.g39cfc66.el7.ppc64le.rpm
SHA-256: 4184403f9ad668d724ac4104bf09b4e8d1d017e4e9933c3f4ce0c7bb633be285
atomic-openshift-template-service-broker-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 519a89031a6f74012c7f8af68386b0123e31707c2a6631dc7602a13fde0f7b32
atomic-openshift-template-service-broker-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: 519a89031a6f74012c7f8af68386b0123e31707c2a6631dc7602a13fde0f7b32
atomic-openshift-tests-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: cab26eeabc6d6c4d3281c8ae4765f23c3d795e35ae843ae1657ae424f050b10a
atomic-openshift-tests-3.11.685-1.git.0.7faaeaa.el7.ppc64le.rpm
SHA-256: cab26eeabc6d6c4d3281c8ae4765f23c3d795e35ae843ae1657ae424f050b10a
atomic-openshift-web-console-3.11.685-1.gd742e61.el7.ppc64le.rpm
SHA-256: 64c2b540e466b3868c341d78d16ed8849b7205fa1edc8d61c4cb94a2c72c02ef
atomic-openshift-web-console-3.11.685-1.gd742e61.el7.ppc64le.rpm
SHA-256: 64c2b540e466b3868c341d78d16ed8849b7205fa1edc8d61c4cb94a2c72c02ef
golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.ppc64le.rpm
SHA-256: ba256699c8397877147f0bd35d564253ca1f8866e335b2c0c7c2c47bb65929e5
golang-github-openshift-oauth-proxy-3.11.685-1.gedebe84.el7.ppc64le.rpm
SHA-256: ba256699c8397877147f0bd35d564253ca1f8866e335b2c0c7c2c47bb65929e5
jenkins-2-plugins-3.11.1650371376-1.el7.noarch.rpm
SHA-256: c8859cb7fc50bd8dd3aebdb15484f1bdab05d57e4f4c855cf24fcda0c02e0c00
jenkins-2-plugins-3.11.1650371376-1.el7.noarch.rpm
SHA-256: c8859cb7fc50bd8dd3aebdb15484f1bdab05d57e4f4c855cf24fcda0c02e0c00
jenkins-2.319.3.1650348949-1.el7.noarch.rpm
SHA-256: 2c7661c9984812030f89a563e99b5535980579f4004a85c57be3a57449a53034
jenkins-2.319.3.1650348949-1.el7.noarch.rpm
SHA-256: 2c7661c9984812030f89a563e99b5535980579f4004a85c57be3a57449a53034
openshift-ansible-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: 1a03a8865586f6c10b3f550b7a341bb7fcfafd744b612929c1b3ca0e99296761
openshift-ansible-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: 1a03a8865586f6c10b3f550b7a341bb7fcfafd744b612929c1b3ca0e99296761
openshift-ansible-docs-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: f91295443482bd41e9c12678a900f4fdfbdf55b2bbcac85326a506008f9a4def
openshift-ansible-docs-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: f91295443482bd41e9c12678a900f4fdfbdf55b2bbcac85326a506008f9a4def
openshift-ansible-playbooks-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: af6900ee7902e5b3fbe1f791c4abd2055ac245047ab125b4a6500b3ce8766869
openshift-ansible-playbooks-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: af6900ee7902e5b3fbe1f791c4abd2055ac245047ab125b4a6500b3ce8766869
openshift-ansible-roles-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: a4920e455b251eb3345900696f278e140f15c1504d4eb570f8b9e75936b2b7a7
openshift-ansible-roles-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: a4920e455b251eb3345900696f278e140f15c1504d4eb570f8b9e75936b2b7a7
openshift-ansible-test-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: f161e4979c2cd3eecf7b46d68d3c41e7eb5ee20cd135cf10f5f197b362ce07ed
openshift-ansible-test-3.11.685-1.git.0.a9090ac.el7.noarch.rpm
SHA-256: f161e4979c2cd3eecf7b46d68d3c41e7eb5ee20cd135cf10f5f197b362ce07ed
openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.ppc64le.rpm
SHA-256: 88a269ad8fd2bf24881d2a87989a8d8f0fec0efd531bc30925d842e9c59bebfc
openshift-enterprise-autoheal-3.11.685-1.gf2f435d.el7.ppc64le.rpm
SHA-256: 88a269ad8fd2bf24881d2a87989a8d8f0fec0efd531bc30925d842e9c59bebfc
openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.ppc64le.rpm
SHA-256: 87cbf2e65efd9642b3c8ca2a201f7ef71239594d55da1c5958dc396e0db93c81
openshift-enterprise-cluster-capacity-3.11.685-1.g22be164.el7.ppc64le.rpm
SHA-256: 87cbf2e65efd9642b3c8ca2a201f7ef71239594d55da1c5958dc396e0db93c81
prometheus-3.11.685-1.g99aae51.el7.ppc64le.rpm
SHA-256: c8ddccdf9c2054e2fd2c2828ae57de20d923dec82fb74a42e9e3adf133aa7ce6
prometheus-3.11.685-1.g99aae51.el7.ppc64le.rpm
SHA-256: c8ddccdf9c2054e2fd2c2828ae57de20d923dec82fb74a42e9e3adf133aa7ce6
prometheus-alertmanager-3.11.685-1.g13de638.el7.ppc64le.rpm
SHA-256: 0c11b76c8906f1fe186ffec422d465258ec7c00c47cda4a7d386a827ade6777b
prometheus-alertmanager-3.11.685-1.g13de638.el7.ppc64le.rpm
SHA-256: 0c11b76c8906f1fe186ffec422d465258ec7c00c47cda4a7d386a827ade6777b
prometheus-node-exporter-3.11.685-1.g609cd20.el7.ppc64le.rpm
SHA-256: 0d08d79cf48d9a8fbae4cee33bcb02a0cb0ee7cf0fdf76be03b17193cea1d33f
prometheus-node-exporter-3.11.685-1.g609cd20.el7.ppc64le.rpm
SHA-256: 0d08d79cf48d9a8fbae4cee33bcb02a0cb0ee7cf0fdf76be03b17193cea1d33f
Related news
IBM Security Identity Manager (IBM Security Verify Password Synchronization Plug-in for Windows AD 10.x) is vulnerable to a denial of service, caused by a heap-based buffer overflow in the Password Synch Plug-in. An authenticated attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 218379.
IBM QRadar SIEM 7.3, 7.4, and 7.5 allows for users to access information across tenant and domain boundaries in some situations. IBM X-Force ID: 208397.
IBM QRadar SIEM 7.3, 7.4, and 7.5 stores potentially sensitive information in log files that could be read by an user with access to creating domains. IBM X-Force ID: 211037.
IBM QRadar SIEM 7.3, 7.4, and 7.5 in some senarios may reveal authorized service tokens to other QRadar users. IBM X-Force ID: 210021
IBM QRadar 7.3, 7.4, and 7.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 220041.
IBM Security Identity Manager (IBM Security Verify Password Synchronization Plug-in for Windows AD 10.x) is vulnerable to a denial of service, caused by a heap-based buffer overflow in the Password Synch Plug-in. An authenticated attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 217369.
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 21.0.8, 22.2.4, and 23.0.1, it is possible to trick administrators into enabling "recommended" apps for the Nextcloud server that they do not need, thus expanding their attack surface unnecessarily. This issue is fixed in versions 21.0.8 , 22.2.4, and 23.0.1.
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
In ControlUp Real-Time Agent before 8.6, an unquoted path can result in privilege escalation. An attacker would require write permissions to the root level of the OS drive (C:\) to exploit this.
Updated web-admin-build packages are now available for Red Hat Gluster Storage 3.5 Web Administration on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-44716: golang: net/http: limit growth of header canonicalization cache
Red Hat AMQ Broker 7.8.6 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-22965: spring-framework: RCE via Data Binding on JDK 9+
Red Hat AMQ Broker 7.9.4 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-22965: spring-framework: RCE via Data Binding on JDK 9+
An update is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0435: kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
A security update for convert2rhel is now available for unsupported conversions of CentOS Linux 6 and Oracle Linux 6 to Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0852: convert2rhel: Red Hat account password passed via command line by code
A security update for convert2rhel is now available for supported conversions of CentOS Linux 7 and Oracle Linux 7 to Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0852: convert2rhel: Red Hat account password passed via command line by code
A security update for convert2rhel is now available for supported conversions of CentOS Linux 8 and Oracle Linux 8 to Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0852: convert2rhel: Red Hat account password passed via command line by code
A flaw was found in htmldoc commit 31f7804. A heap buffer overflow in the function pdf_write_names in ps-pdf.cxx may lead to arbitrary code execution and Denial of Service (DoS).
A lack of password length restriction in Zammad v5.1.0 allows for the creation of extremely long passwords which can cause a Denial of Service (DoS) during password verification.
An access control issue in Zammad v5.0.3 broadcasts administrative configuration changes to all users who have an active application instance, including settings that should only be visible to authenticated users.
An access control issue in Zammad v5.0.3 allows attackers to write entries to the CTI caller log without authentication. This vulnerability can allow attackers to execute phishing attacks or cause a Denial of Service (DoS).
A lack of rate limiting in the 'forgot password' feature of Zammad v5.1.0 allows attackers to send an excessive amount of reset requests for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages.
An update for polkit is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4115: polkit: file descriptor leak allows an unprivileged user to cause a crash
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-25636: kernel: heap out of bounds write in nf_dup_netdev.c
An update for vim is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1154: vim: use after free in utf_ptr2char
An update for the mariadb:10.3 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-2154: mysql: Server: DML unspecified vulnerability (CPU Apr 2021) * CVE-2021-2166: mysql: Server: DML unspecified vulnerability (CPU Apr 2021) * CVE-2021-2372: mysql: InnoDB unspecified vulnerability (CPU Jul 2021) * CVE-2021-2389: mysql: InnoDB unspecified vulnerability (CPU Jul 2021) * CVE-2021-35604: mysql: InnoDB unspecified vulnerab...
An update for the container-tools:2.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27649: podman: Default inheritable capabilities for linux container should be empty * CVE-2022-27651: buildah: Default inheritable capabilities for linux container should be empty
An update for the container-tools:3.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27649: podman: Default inheritable capabilities for linux container should be empty * CVE-2022-27651: buildah: Default inheritable capabilities for linux container should be empty
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-25636: kernel: heap out of bounds write in nf_dup_netdev.c
An update for gzip is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1271: gzip: arbitrary-file-write vulnerability
An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-2154: mysql: Server: DML unspecified vulnerability (CPU Apr 2021) * CVE-2021-2166: mysql: Server: DML unspecified vulnerability (CPU Apr 2021) * CVE-2021-2372: mysql: InnoDB unspecified vulnerability (CPU Jul 2021) * CVE-2021-2389: mysql: InnoDB unspecified vulnerability (CPU Jul 2021) * CVE-2021-35604: mysql: InnoDB unspecified vulnerab...
An update for zlib is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-25032: zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0435: kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-25636: kernel: heap out of bounds write in nf_dup_netdev.c
An update for gzip is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1271: gzip: arbitrary-file-write vulnerability
An update for xmlrpc-c is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25235: expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
An update for maven-shared-utils is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29599: maven-shared-utils: Command injection via Commandline class
An update for xmlrpc-c is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25235: expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution