[RHSA-2022:1643] xmlrpc-c security update

Severity Important
Affected Packages 25
CVEs 1

XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.

Security Fix(es):

  • expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Package Affected Version
pkg:rpm/redhat/xmlrpc-c?arch=x86_64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c?arch=s390x&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c?arch=ppc64le&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c?arch=i686&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c?arch=aarch64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-devel?arch=x86_64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-devel?arch=s390x&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-devel?arch=ppc64le&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-devel?arch=i686&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-devel?arch=aarch64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client?arch=x86_64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client?arch=s390x&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client?arch=ppc64le&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client?arch=i686&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client?arch=aarch64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=x86_64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=s390x&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=ppc64le&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=i686&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=aarch64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=x86_64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=s390x&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=ppc64le&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=i686&distro=redhat-8.5 < 1.51.0-5.el8_5.1
pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=aarch64&distro=redhat-8.5 < 1.51.0-5.el8_5.1
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/xmlrpc-c?arch=x86_64&distro=redhat-8.5 redhat xmlrpc-c < 1.51.0-5.el8_5.1 redhat-8.5 x86_64
Affected pkg:rpm/redhat/xmlrpc-c?arch=s390x&distro=redhat-8.5 redhat xmlrpc-c < 1.51.0-5.el8_5.1 redhat-8.5 s390x
Affected pkg:rpm/redhat/xmlrpc-c?arch=ppc64le&distro=redhat-8.5 redhat xmlrpc-c < 1.51.0-5.el8_5.1 redhat-8.5 ppc64le
Affected pkg:rpm/redhat/xmlrpc-c?arch=i686&distro=redhat-8.5 redhat xmlrpc-c < 1.51.0-5.el8_5.1 redhat-8.5 i686
Affected pkg:rpm/redhat/xmlrpc-c?arch=aarch64&distro=redhat-8.5 redhat xmlrpc-c < 1.51.0-5.el8_5.1 redhat-8.5 aarch64
Affected pkg:rpm/redhat/xmlrpc-c-devel?arch=x86_64&distro=redhat-8.5 redhat xmlrpc-c-devel < 1.51.0-5.el8_5.1 redhat-8.5 x86_64
Affected pkg:rpm/redhat/xmlrpc-c-devel?arch=s390x&distro=redhat-8.5 redhat xmlrpc-c-devel < 1.51.0-5.el8_5.1 redhat-8.5 s390x
Affected pkg:rpm/redhat/xmlrpc-c-devel?arch=ppc64le&distro=redhat-8.5 redhat xmlrpc-c-devel < 1.51.0-5.el8_5.1 redhat-8.5 ppc64le
Affected pkg:rpm/redhat/xmlrpc-c-devel?arch=i686&distro=redhat-8.5 redhat xmlrpc-c-devel < 1.51.0-5.el8_5.1 redhat-8.5 i686
Affected pkg:rpm/redhat/xmlrpc-c-devel?arch=aarch64&distro=redhat-8.5 redhat xmlrpc-c-devel < 1.51.0-5.el8_5.1 redhat-8.5 aarch64
Affected pkg:rpm/redhat/xmlrpc-c-client?arch=x86_64&distro=redhat-8.5 redhat xmlrpc-c-client < 1.51.0-5.el8_5.1 redhat-8.5 x86_64
Affected pkg:rpm/redhat/xmlrpc-c-client?arch=s390x&distro=redhat-8.5 redhat xmlrpc-c-client < 1.51.0-5.el8_5.1 redhat-8.5 s390x
Affected pkg:rpm/redhat/xmlrpc-c-client?arch=ppc64le&distro=redhat-8.5 redhat xmlrpc-c-client < 1.51.0-5.el8_5.1 redhat-8.5 ppc64le
Affected pkg:rpm/redhat/xmlrpc-c-client?arch=i686&distro=redhat-8.5 redhat xmlrpc-c-client < 1.51.0-5.el8_5.1 redhat-8.5 i686
Affected pkg:rpm/redhat/xmlrpc-c-client?arch=aarch64&distro=redhat-8.5 redhat xmlrpc-c-client < 1.51.0-5.el8_5.1 redhat-8.5 aarch64
Affected pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=x86_64&distro=redhat-8.5 redhat xmlrpc-c-client++ < 1.51.0-5.el8_5.1 redhat-8.5 x86_64
Affected pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=s390x&distro=redhat-8.5 redhat xmlrpc-c-client++ < 1.51.0-5.el8_5.1 redhat-8.5 s390x
Affected pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=ppc64le&distro=redhat-8.5 redhat xmlrpc-c-client++ < 1.51.0-5.el8_5.1 redhat-8.5 ppc64le
Affected pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=i686&distro=redhat-8.5 redhat xmlrpc-c-client++ < 1.51.0-5.el8_5.1 redhat-8.5 i686
Affected pkg:rpm/redhat/xmlrpc-c-client%2B%2B?arch=aarch64&distro=redhat-8.5 redhat xmlrpc-c-client++ < 1.51.0-5.el8_5.1 redhat-8.5 aarch64
Affected pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=x86_64&distro=redhat-8.5 redhat xmlrpc-c-c++ < 1.51.0-5.el8_5.1 redhat-8.5 x86_64
Affected pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=s390x&distro=redhat-8.5 redhat xmlrpc-c-c++ < 1.51.0-5.el8_5.1 redhat-8.5 s390x
Affected pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=ppc64le&distro=redhat-8.5 redhat xmlrpc-c-c++ < 1.51.0-5.el8_5.1 redhat-8.5 ppc64le
Affected pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=i686&distro=redhat-8.5 redhat xmlrpc-c-c++ < 1.51.0-5.el8_5.1 redhat-8.5 i686
Affected pkg:rpm/redhat/xmlrpc-c-c%2B%2B?arch=aarch64&distro=redhat-8.5 redhat xmlrpc-c-c++ < 1.51.0-5.el8_5.1 redhat-8.5 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...