Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:7090: Red Hat Security Advisory: libksba security update

An update for libksba is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-3515: libksba: integer overflow may lead to remote code execution
Red Hat Security Data
#vulnerability#linux#red_hat#rce#ibm#sap#ssl

Synopsis

Important: libksba security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for libksba is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.

Security Fix(es):

  • libksba: integer overflow may lead to remote code execution (CVE-2022-3515)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 9 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2135610 - CVE-2022-3515 libksba: integer overflow may lead to remote code execution

Red Hat Enterprise Linux for x86_64 9

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

x86_64

libksba-1.5.1-5.el9_0.i686.rpm

SHA-256: 89a4a3dfa55f29ac7267936cdcaceaad2992ad2936ee1a0d8fe4fe7141cb773b

libksba-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 89079e6774cfbeb847beca5612cf532c0b07df87a5243739ad06be22a6687cf8

libksba-debuginfo-1.5.1-5.el9_0.i686.rpm

SHA-256: d633970d558c811b5208932f4376693f2a8d4a2e12ea4fba8c8488d54d8be1de

libksba-debuginfo-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 2679391a3ae3eda571868893e0000ac9edf3faa812dc2642e36081f42f5bb30d

libksba-debugsource-1.5.1-5.el9_0.i686.rpm

SHA-256: d4b9a8e3b0f403020823d05cb681fab24128d9e1f9163303eed5d05634bfb437

libksba-debugsource-1.5.1-5.el9_0.x86_64.rpm

SHA-256: a4a415bed75bbc4e40d02e02d2ab3aa52103adbe97edfdaee0b60ef6af05cfc0

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

x86_64

libksba-1.5.1-5.el9_0.i686.rpm

SHA-256: 89a4a3dfa55f29ac7267936cdcaceaad2992ad2936ee1a0d8fe4fe7141cb773b

libksba-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 89079e6774cfbeb847beca5612cf532c0b07df87a5243739ad06be22a6687cf8

libksba-debuginfo-1.5.1-5.el9_0.i686.rpm

SHA-256: d633970d558c811b5208932f4376693f2a8d4a2e12ea4fba8c8488d54d8be1de

libksba-debuginfo-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 2679391a3ae3eda571868893e0000ac9edf3faa812dc2642e36081f42f5bb30d

libksba-debugsource-1.5.1-5.el9_0.i686.rpm

SHA-256: d4b9a8e3b0f403020823d05cb681fab24128d9e1f9163303eed5d05634bfb437

libksba-debugsource-1.5.1-5.el9_0.x86_64.rpm

SHA-256: a4a415bed75bbc4e40d02e02d2ab3aa52103adbe97edfdaee0b60ef6af05cfc0

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

s390x

libksba-1.5.1-5.el9_0.s390x.rpm

SHA-256: 1e495c2e019a14f1e081b81781fb861cf4c90545aa77dab2e3adcf6787b86e1e

libksba-debuginfo-1.5.1-5.el9_0.s390x.rpm

SHA-256: ad0817bde824cbc5a7530a87daddc1fb1e9ec61c4db58cbb717b74c8e42a1637

libksba-debugsource-1.5.1-5.el9_0.s390x.rpm

SHA-256: 60b2593e6477e594872a0b952bd18982b4b0433cf0b3ca7fc2ab7db3acbc4333

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

s390x

libksba-1.5.1-5.el9_0.s390x.rpm

SHA-256: 1e495c2e019a14f1e081b81781fb861cf4c90545aa77dab2e3adcf6787b86e1e

libksba-debuginfo-1.5.1-5.el9_0.s390x.rpm

SHA-256: ad0817bde824cbc5a7530a87daddc1fb1e9ec61c4db58cbb717b74c8e42a1637

libksba-debugsource-1.5.1-5.el9_0.s390x.rpm

SHA-256: 60b2593e6477e594872a0b952bd18982b4b0433cf0b3ca7fc2ab7db3acbc4333

Red Hat Enterprise Linux for Power, little endian 9

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

ppc64le

libksba-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 0410125283987bf4468cad91b5bcf99a392a2024913862aec738bd3ae7d4d10b

libksba-debuginfo-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 1771a3c19f9c75ba91c3b40b9c4528182d101933cc549afcdd592df5dbf31904

libksba-debugsource-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 2915c2956004e69454ffb820a6aead54f772648ef6b2ecb2b6425fab60b38244

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

ppc64le

libksba-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 0410125283987bf4468cad91b5bcf99a392a2024913862aec738bd3ae7d4d10b

libksba-debuginfo-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 1771a3c19f9c75ba91c3b40b9c4528182d101933cc549afcdd592df5dbf31904

libksba-debugsource-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 2915c2956004e69454ffb820a6aead54f772648ef6b2ecb2b6425fab60b38244

Red Hat Enterprise Linux for ARM 64 9

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

aarch64

libksba-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 57baa95d17d01e7c0d3be4abc0388dcdbcacbf6bde40aa27fb13a6af20e2c57b

libksba-debuginfo-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 41cbfe827f0c96ab4f69fe8af0f5b353d4c7f63773e6f035a88ca5151c41170a

libksba-debugsource-1.5.1-5.el9_0.aarch64.rpm

SHA-256: dafd439f19c7b1fef355e864c7b877305f9b368a2101d88d2dec92991cca00e7

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

ppc64le

libksba-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 0410125283987bf4468cad91b5bcf99a392a2024913862aec738bd3ae7d4d10b

libksba-debuginfo-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 1771a3c19f9c75ba91c3b40b9c4528182d101933cc549afcdd592df5dbf31904

libksba-debugsource-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 2915c2956004e69454ffb820a6aead54f772648ef6b2ecb2b6425fab60b38244

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

x86_64

libksba-1.5.1-5.el9_0.i686.rpm

SHA-256: 89a4a3dfa55f29ac7267936cdcaceaad2992ad2936ee1a0d8fe4fe7141cb773b

libksba-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 89079e6774cfbeb847beca5612cf532c0b07df87a5243739ad06be22a6687cf8

libksba-debuginfo-1.5.1-5.el9_0.i686.rpm

SHA-256: d633970d558c811b5208932f4376693f2a8d4a2e12ea4fba8c8488d54d8be1de

libksba-debuginfo-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 2679391a3ae3eda571868893e0000ac9edf3faa812dc2642e36081f42f5bb30d

libksba-debugsource-1.5.1-5.el9_0.i686.rpm

SHA-256: d4b9a8e3b0f403020823d05cb681fab24128d9e1f9163303eed5d05634bfb437

libksba-debugsource-1.5.1-5.el9_0.x86_64.rpm

SHA-256: a4a415bed75bbc4e40d02e02d2ab3aa52103adbe97edfdaee0b60ef6af05cfc0

Red Hat CodeReady Linux Builder for x86_64 9

SRPM

x86_64

libksba-debuginfo-1.5.1-5.el9_0.i686.rpm

SHA-256: d633970d558c811b5208932f4376693f2a8d4a2e12ea4fba8c8488d54d8be1de

libksba-debuginfo-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 2679391a3ae3eda571868893e0000ac9edf3faa812dc2642e36081f42f5bb30d

libksba-debugsource-1.5.1-5.el9_0.i686.rpm

SHA-256: d4b9a8e3b0f403020823d05cb681fab24128d9e1f9163303eed5d05634bfb437

libksba-debugsource-1.5.1-5.el9_0.x86_64.rpm

SHA-256: a4a415bed75bbc4e40d02e02d2ab3aa52103adbe97edfdaee0b60ef6af05cfc0

libksba-devel-1.5.1-5.el9_0.i686.rpm

SHA-256: de7672998dc7a3d6dfcc334105504610a49eeaeb7f29ff13ee8a623b61588206

libksba-devel-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 640da979b573e5a043d161051855f68a55c509ddceac8b0bbb25601ac3432ba9

Red Hat CodeReady Linux Builder for Power, little endian 9

SRPM

ppc64le

libksba-debuginfo-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 1771a3c19f9c75ba91c3b40b9c4528182d101933cc549afcdd592df5dbf31904

libksba-debugsource-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 2915c2956004e69454ffb820a6aead54f772648ef6b2ecb2b6425fab60b38244

libksba-devel-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: ecf3e662093eecdcb7bea7128a4fbf32c4882f17ede51df58714660a4cbfa79a

Red Hat CodeReady Linux Builder for ARM 64 9

SRPM

aarch64

libksba-debuginfo-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 41cbfe827f0c96ab4f69fe8af0f5b353d4c7f63773e6f035a88ca5151c41170a

libksba-debugsource-1.5.1-5.el9_0.aarch64.rpm

SHA-256: dafd439f19c7b1fef355e864c7b877305f9b368a2101d88d2dec92991cca00e7

libksba-devel-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 30ee0704fc2f15f96aa385efc3ba2acd1aefffc094635d199b5ce76d6e963e43

Red Hat CodeReady Linux Builder for IBM z Systems 9

SRPM

s390x

libksba-debuginfo-1.5.1-5.el9_0.s390x.rpm

SHA-256: ad0817bde824cbc5a7530a87daddc1fb1e9ec61c4db58cbb717b74c8e42a1637

libksba-debugsource-1.5.1-5.el9_0.s390x.rpm

SHA-256: 60b2593e6477e594872a0b952bd18982b4b0433cf0b3ca7fc2ab7db3acbc4333

libksba-devel-1.5.1-5.el9_0.s390x.rpm

SHA-256: 742012a1d0df98680e8d982b9a63a228e7a52f0077cce0a950de8043ff012713

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

aarch64

libksba-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 57baa95d17d01e7c0d3be4abc0388dcdbcacbf6bde40aa27fb13a6af20e2c57b

libksba-debuginfo-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 41cbfe827f0c96ab4f69fe8af0f5b353d4c7f63773e6f035a88ca5151c41170a

libksba-debugsource-1.5.1-5.el9_0.aarch64.rpm

SHA-256: dafd439f19c7b1fef355e864c7b877305f9b368a2101d88d2dec92991cca00e7

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0

SRPM

x86_64

libksba-debuginfo-1.5.1-5.el9_0.i686.rpm

SHA-256: d633970d558c811b5208932f4376693f2a8d4a2e12ea4fba8c8488d54d8be1de

libksba-debuginfo-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 2679391a3ae3eda571868893e0000ac9edf3faa812dc2642e36081f42f5bb30d

libksba-debugsource-1.5.1-5.el9_0.i686.rpm

SHA-256: d4b9a8e3b0f403020823d05cb681fab24128d9e1f9163303eed5d05634bfb437

libksba-debugsource-1.5.1-5.el9_0.x86_64.rpm

SHA-256: a4a415bed75bbc4e40d02e02d2ab3aa52103adbe97edfdaee0b60ef6af05cfc0

libksba-devel-1.5.1-5.el9_0.i686.rpm

SHA-256: de7672998dc7a3d6dfcc334105504610a49eeaeb7f29ff13ee8a623b61588206

libksba-devel-1.5.1-5.el9_0.x86_64.rpm

SHA-256: 640da979b573e5a043d161051855f68a55c509ddceac8b0bbb25601ac3432ba9

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0

SRPM

ppc64le

libksba-debuginfo-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 1771a3c19f9c75ba91c3b40b9c4528182d101933cc549afcdd592df5dbf31904

libksba-debugsource-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: 2915c2956004e69454ffb820a6aead54f772648ef6b2ecb2b6425fab60b38244

libksba-devel-1.5.1-5.el9_0.ppc64le.rpm

SHA-256: ecf3e662093eecdcb7bea7128a4fbf32c4882f17ede51df58714660a4cbfa79a

Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0

SRPM

s390x

libksba-debuginfo-1.5.1-5.el9_0.s390x.rpm

SHA-256: ad0817bde824cbc5a7530a87daddc1fb1e9ec61c4db58cbb717b74c8e42a1637

libksba-debugsource-1.5.1-5.el9_0.s390x.rpm

SHA-256: 60b2593e6477e594872a0b952bd18982b4b0433cf0b3ca7fc2ab7db3acbc4333

libksba-devel-1.5.1-5.el9_0.s390x.rpm

SHA-256: 742012a1d0df98680e8d982b9a63a228e7a52f0077cce0a950de8043ff012713

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0

SRPM

aarch64

libksba-debuginfo-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 41cbfe827f0c96ab4f69fe8af0f5b353d4c7f63773e6f035a88ca5151c41170a

libksba-debugsource-1.5.1-5.el9_0.aarch64.rpm

SHA-256: dafd439f19c7b1fef355e864c7b877305f9b368a2101d88d2dec92991cca00e7

libksba-devel-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 30ee0704fc2f15f96aa385efc3ba2acd1aefffc094635d199b5ce76d6e963e43

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

aarch64

libksba-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 57baa95d17d01e7c0d3be4abc0388dcdbcacbf6bde40aa27fb13a6af20e2c57b

libksba-debuginfo-1.5.1-5.el9_0.aarch64.rpm

SHA-256: 41cbfe827f0c96ab4f69fe8af0f5b353d4c7f63773e6f035a88ca5151c41170a

libksba-debugsource-1.5.1-5.el9_0.aarch64.rpm

SHA-256: dafd439f19c7b1fef355e864c7b877305f9b368a2101d88d2dec92991cca00e7

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0

SRPM

libksba-1.5.1-5.el9_0.src.rpm

SHA-256: 0a9760c63b2333225234c3fc9a49d46e976ad1a4ce9f53d26e6437118cc945f4

s390x

libksba-1.5.1-5.el9_0.s390x.rpm

SHA-256: 1e495c2e019a14f1e081b81781fb861cf4c90545aa77dab2e3adcf6787b86e1e

libksba-debuginfo-1.5.1-5.el9_0.s390x.rpm

SHA-256: ad0817bde824cbc5a7530a87daddc1fb1e9ec61c4db58cbb717b74c8e42a1637

libksba-debugsource-1.5.1-5.el9_0.s390x.rpm

SHA-256: 60b2593e6477e594872a0b952bd18982b4b0433cf0b3ca7fc2ab7db3acbc4333

Related news

Red Hat Security Advisory 2023-3742-02

Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2023-0795-01

Red Hat Security Advisory 2023-0795-01 - Submariner 0.13.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6.

RHSA-2023:0631: Red Hat Security Advisory: RHSA: Submariner 0.14 - bug fix and security updates

Submariner 0.14 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go ...

RHSA-2023:0542: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.3.1 Containers security update

Red Hat OpenShift Service Mesh 2.3.1 Containers Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-3962: kiali: error message spoofing in kiali UI * CVE-2022-27664: golang: ...

Red Hat Security Advisory 2023-0408-01

Red Hat Security Advisory 2023-0408-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Issues addressed include denial of service and out of bounds read vulnerabilities.

Gentoo Linux Security Advisory 202212-07

Gentoo Linux Security Advisory 202212-7 - An integer overflow vulnerability has been found in libksba which could result in remote code execution. Versions less than 1.6.3 are affected.

RHSA-2022:9047: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.6 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.6 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in G...

Red Hat Security Advisory 2022-8889-01

Red Hat Security Advisory 2022-8889-01 - This is an Openshift Logging bug fix release. Issues addressed include a denial of service vulnerability.

RHSA-2022:8781: Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update

Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...

RHSA-2022:8750: Red Hat Security Advisory: OpenShift Virtualization 4.11.1 security and bug fix update

Red Hat OpenShift Virtualization release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caus...

Red Hat Security Advisory 2022-8609-01

Red Hat Security Advisory 2022-8609-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.9.7 images. Issues addressed include a bypass vulnerability.

RHSA-2022:8598: Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-1]

An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3515: libksba: integer overflow may lead to remote code execution * CVE-2022-38177: bind: memory leak in ECDSA DNSSEC verification code * CVE-2022-38178: bind: memory leaks in EdDSA DNSSEC verification code * CVE-2022-40674: ex...

RHSA-2022:7435: Red Hat Security Advisory: Logging Subsystem 5.4.8 - Red Hat OpenShift security update

An update is now available for Logging subsystem for Red Hat OpenShift 5.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags * CVE-2022-42003: jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS * CVE-2022-42004: jackson-databind: use of deeply nested arrays...

RHSA-2022:7927: Red Hat Security Advisory: libksba security update

An update for libksba is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3515: libksba: integer overflow may lead to remote code execution

Red Hat Security Advisory 2022-7434-01

Red Hat Security Advisory 2022-7434-01 - A Red Hat OpenShift security update has been provided for the Logging Subsystem.

RHSA-2022:6882: Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release

An update is now available for OpenShift Logging 5.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

Red Hat Security Advisory 2022-7407-01

Red Hat Security Advisory 2022-7407-01 - Service Binding Operator 1.3.1 is now available for OpenShift Developer Tools and Services for OCP 4.9 +.

RHSA-2022:7407: Red Hat Security Advisory: Service Binding Operator 1.3.1 security update

An update for service-binding-operator-bundle-container and service-binding-operator-container is now available for OpenShift Developer Tools and Services for OCP 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

Red Hat Security Advisory 2022-7313-01

Red Hat Security Advisory 2022-7313-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Issues addressed include denial of service and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2022-7201-01

Red Hat Security Advisory 2022-7201-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.12. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2022-7283-01

Red Hat Security Advisory 2022-7283-01 - KSBA is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Issues addressed include code execution and integer overflow vulnerabilities.

RHSA-2022:7313: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.2 security update and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.2 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2238: search-api: SQL injection leads to remote denial of service * CVE-2022-25858: terser: insecure use of regular expressions leads to ReDoS * CVE-2022-25887: sanitize-html: insecure global regular expression replacement logic may lead to ReDoS * CVE-2022-25896: passport: incorrect ses...

RHSA-2022:7201: Red Hat Security Advisory: OpenShift Container Platform 4.11.12 security update

Red Hat OpenShift Container Platform release 4.11.12 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)

RHSA-2022:7276: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.8 security fixes and container updates

Red Hat Advanced Cluster Management for Kubernetes 2.4.8 General Availability release images, which fix security issues. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2238: search-api: SQL injection leads to remote denial of service * CVE-2022-25858: terser: insecure use of regular expressions leads to ReDoS * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-35948: nodejs: undici vulnerable to CRLF via content headers * CVE-2022-35949: n...

RHSA-2022:7283: Red Hat Security Advisory: libksba security update

An update for libksba is now available for Red Hat Enterprise Linux 8.2 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3515: libksba: integer overflow may lead to remote code execution

Red Hat Security Advisory 2022-7209-01

Red Hat Security Advisory 2022-7209-01 - KSBA is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Issues addressed include code execution and integer overflow vulnerabilities.

Ubuntu Security Notice USN-5688-2

Ubuntu Security Notice 5688-2 - USN-5688-1 fixed vulnerabilities in Libksba. This update provides the corresponding update for Ubuntu 22.10. It was discovered that an integer overflow could be triggered in Libksba when decoding certain data. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code.

RHSA-2022:7209: Red Hat Security Advisory: libksba security update

An update for libksba is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3515: libksba: integer overflow may lead to remote code execution

Red Hat Security Advisory 2022-7089-01

Red Hat Security Advisory 2022-7089-01 - KSBA is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Issues addressed include code execution and integer overflow vulnerabilities.

Red Hat Security Advisory 2022-7090-01

Red Hat Security Advisory 2022-7090-01 - KSBA is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Issues addressed include code execution and integer overflow vulnerabilities.

Red Hat Security Advisory 2022-7088-01

Red Hat Security Advisory 2022-7088-01 - KSBA is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Issues addressed include code execution and integer overflow vulnerabilities.

RHSA-2022:7089: Red Hat Security Advisory: libksba security update

An update for libksba is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3515: libksba: integer overflow may lead to remote code execution

RHSA-2022:7088: Red Hat Security Advisory: libksba security update

An update for libksba is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3515: libksba: integer overflow may lead to remote code execution

Ubuntu Security Notice USN-5688-1

Ubuntu Security Notice 5688-1 - It was discovered that an integer overflow could be triggered in Libksba when decoding certain data. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code.