[RHSA-2022:1643] xmlrpc-c security update
Severity
Important
Affected Packages
25
CVEs
1
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
- expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2022:1643
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:1643
- Published
-
2022-04-28T00:00:00
(2 years ago) - Modified
-
2022-04-28T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1573
- ALAS-2022-1585
- ALAS2-2022-1764
- ALAS2-2022-1779
- ALAS2-2022-1795
- ALPINE:CVE-2022-25235
- ALSA-2022:0818
- ALSA-2022:0845
- ALSA-2022:0951
- ALSA-2022:1643
- ALSA-2022:7811
- DSA-5085-1
- ELSA-2022-0818
- ELSA-2022-0824
- ELSA-2022-0845
- ELSA-2022-0850
- ELSA-2022-0951
- ELSA-2022-1069
- ELSA-2022-1643
- ELSA-2022-9359
- FEDORA-2022-01f0553b59
- FEDORA-2022-04f206996b
- FEDORA-2022-3d9d67f558
- FEDORA-2022-f202d1a045
- FEDORA-2023-97a977a96a
- FEDORA-2023-99ba1917da
- GLSA-202209-24
- MS:CVE-2022-25235
- openSUSE-SU-2022:0713-1
- RHSA-2022:0818
- RHSA-2022:0824
- RHSA-2022:0845
- RHSA-2022:0850
- RHSA-2022:0951
- RHSA-2022:1069
- RHSA-2022:7811
- SSA:2022-050-01
- SUSE-SU-2022:0698-1
- SUSE-SU-2022:0713-1
- SUSE-SU-2022:2294-1
- USN-5288-1
- USN-5455-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2056366 | https://bugzilla.redhat.com/2056366 | |
RHSA | RHSA-2022:1643 | https://access.redhat.com/errata/RHSA-2022:1643 | |
CVE | CVE-2022-25235 | https://access.redhat.com/security/cve/CVE-2022-25235 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/xmlrpc-c?arch=x86_64&distro=redhat-8.5 | redhat | xmlrpc-c | < 1.51.0-5.el8_5.1 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/xmlrpc-c?arch=s390x&distro=redhat-8.5 | redhat | xmlrpc-c | < 1.51.0-5.el8_5.1 | redhat-8.5 | s390x | |
Affected | pkg:rpm/redhat/xmlrpc-c?arch=ppc64le&distro=redhat-8.5 | redhat | xmlrpc-c | < 1.51.0-5.el8_5.1 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/xmlrpc-c?arch=i686&distro=redhat-8.5 | redhat | xmlrpc-c | < 1.51.0-5.el8_5.1 | redhat-8.5 | i686 | |
Affected | pkg:rpm/redhat/xmlrpc-c?arch=aarch64&distro=redhat-8.5 | redhat | xmlrpc-c | < 1.51.0-5.el8_5.1 | redhat-8.5 | aarch64 | |
Affected | pkg:rpm/redhat/xmlrpc-c-devel?arch=x86_64&distro=redhat-8.5 | redhat | xmlrpc-c-devel | < 1.51.0-5.el8_5.1 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/xmlrpc-c-devel?arch=s390x&distro=redhat-8.5 | redhat | xmlrpc-c-devel | < 1.51.0-5.el8_5.1 | redhat-8.5 | s390x | |
Affected | pkg:rpm/redhat/xmlrpc-c-devel?arch=ppc64le&distro=redhat-8.5 | redhat | xmlrpc-c-devel | < 1.51.0-5.el8_5.1 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/xmlrpc-c-devel?arch=i686&distro=redhat-8.5 | redhat | xmlrpc-c-devel | < 1.51.0-5.el8_5.1 | redhat-8.5 | i686 | |
Affected | pkg:rpm/redhat/xmlrpc-c-devel?arch=aarch64&distro=redhat-8.5 | redhat | xmlrpc-c-devel | < 1.51.0-5.el8_5.1 | redhat-8.5 | aarch64 | |
Affected | pkg:rpm/redhat/xmlrpc-c-client?arch=x86_64&distro=redhat-8.5 | redhat | xmlrpc-c-client | < 1.51.0-5.el8_5.1 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/xmlrpc-c-client?arch=s390x&distro=redhat-8.5 | redhat | xmlrpc-c-client | < 1.51.0-5.el8_5.1 | redhat-8.5 | s390x | |
Affected | pkg:rpm/redhat/xmlrpc-c-client?arch=ppc64le&distro=redhat-8.5 | redhat | xmlrpc-c-client | < 1.51.0-5.el8_5.1 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/xmlrpc-c-client?arch=i686&distro=redhat-8.5 | redhat | xmlrpc-c-client | < 1.51.0-5.el8_5.1 | redhat-8.5 | i686 | |
Affected | pkg:rpm/redhat/xmlrpc-c-client?arch=aarch64&distro=redhat-8.5 | redhat | xmlrpc-c-client | < 1.51.0-5.el8_5.1 | redhat-8.5 | aarch64 | |
Affected | pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=x86_64&distro=redhat-8.5 | redhat | xmlrpc-c-client++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=s390x&distro=redhat-8.5 | redhat | xmlrpc-c-client++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | s390x | |
Affected | pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=ppc64le&distro=redhat-8.5 | redhat | xmlrpc-c-client++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=i686&distro=redhat-8.5 | redhat | xmlrpc-c-client++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | i686 | |
Affected | pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=aarch64&distro=redhat-8.5 | redhat | xmlrpc-c-client++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | aarch64 | |
Affected | pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=x86_64&distro=redhat-8.5 | redhat | xmlrpc-c-c++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=s390x&distro=redhat-8.5 | redhat | xmlrpc-c-c++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | s390x | |
Affected | pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=ppc64le&distro=redhat-8.5 | redhat | xmlrpc-c-c++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=i686&distro=redhat-8.5 | redhat | xmlrpc-c-c++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | i686 | |
Affected | pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=aarch64&distro=redhat-8.5 | redhat | xmlrpc-c-c++ | < 1.51.0-5.el8_5.1 | redhat-8.5 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |