id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2017:3086
Red Hat Security Advisory: Red Hat 'Stand-Alone' Proxy - End Of Life Notice
This is the final notification for the End Of Life (EOL) of Red Hat 'Stand-Alone' Proxy. Red Hat Proxy ‘Stand-Alone’ (Proxy server directly connecting to the Red Hat Network): Systems registered as clients to RHN via a Red Hat Satellite Proxy server is no longer a Red Hat supported deployment, and will no longer function as required. Access a set of instructions for moving from Proxy to Satellite 6: https://access.redhat.com/articles/2859521. This guide describes the process for a Proxy-only user to install and configure a Satellite 6 installation and migrate clients to it.
[ "cpe:/a:redhat:network_proxy:5.4::el5", "cpe:/a:redhat:network_proxy:5.4::el6", "cpe:/a:redhat:network_proxy:5.5::el5", "cpe:/a:redhat:network_proxy:5.5::el6", "cpe:/a:redhat:network_proxy:5.6::el5", "cpe:/a:redhat:network_proxy:5.6::el6", "cpe:/a:redhat:network_proxy:5.7::el6", "cpe:/a:redhat:network_proxy:5.8::el6" ]
null
null
null
null
RHSA-2018:2707
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Information Disclosure vulnerability (APSB18-31)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
6.5
null
RHSA-2023:0945
Red Hat Security Advisory: kpatch-patch security update
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_e4s:7.7::server" ]
null
7.8
null
null
RHSA-2020:1827
Red Hat Security Advisory: libxml2 security update
libxml2: infinite loop in xz_decomp function in xzlib.c libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
6.5
null
RHSA-2019:2720
Red Hat Security Advisory: pki-deps:10.6 security update
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.1
null
RHSA-2024:4756
Red Hat Security Advisory: libuv security update
libuv: Improper Domain Lookup that potentially leads to SSRF attacks
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.3
null
null
RHSA-2024:9371
Red Hat Security Advisory: python3.9 security update
python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
RHSA-2010:0558
Red Hat Security Advisory: firefox security update
Mozilla arbitrary free flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:8127
Red Hat Security Advisory: java-21-openjdk security update
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
4.8
null
null
RHSA-2022:0889
Red Hat Security Advisory: 389-ds:1.4 security and bug fix update
389-ds-base: double free of the virtual attribute context in persistent search
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2015:1628
Red Hat Security Advisory: mysql55-mysql security update
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:DDL (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Client programs (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:4605
Red Hat Security Advisory: resource-agents security and bug fix update
python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function
[ "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
6.8
null
null
RHSA-2001:164
Red Hat Security Advisory: : Updated secureweb packages available
security flaw security flaw
[ "cpe:/a:redhat:secure_web_server:3.2" ]
null
null
null
null
RHSA-2020:5599
Red Hat Security Advisory: web-admin-build security and bug fix update
grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
[ "cpe:/a:redhat:storage:3.5:na:el7", "cpe:/a:redhat:storage:3.5:wa:el7" ]
null
8.2
null
null
RHSA-2007:0898
Red Hat Security Advisory: xorg-x11 security update
X.org composite extension buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2019:2736
Red Hat Security Advisory: kernel security and bug fix update
kernel: Memory corruption due to incorrect socket cloning kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.2
null
RHSA-2024:7205
Red Hat Security Advisory: osbuild-composer security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2017:0246
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
7
null
RHSA-2019:0202
Red Hat Security Advisory: kernel security and bug fix update
kernel: userfaultfd bypasses tmpfs file permissions
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
6.1
null
RHSA-2024:6011
Red Hat Security Advisory: OpenShift Container Platform 4.13.49 packages and security update
jinja2: accepts keys containing non-attribute characters
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", "cpe:/a:redhat:openshift_ironic:4.13::el9" ]
null
5.4
null
null
RHSA-2009:1126
Red Hat Security Advisory: thunderbird security update
Firefox 2 and 3 Layout engine crash Firefox 2 and 3 JavaScript engine crash jar: scheme ignores the content-disposition: header on the inner URI view-source: protocol Firefox XSS hazard using third-party stylesheets and XBL bindings Firefox Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString Firefox browser engine crashes Firefox JavaScript engine crashes Firefox SSL tampering via non-200 responses to proxy CONNECT requests Firefox arbitrary code execution flaw Thunderbird mail crash
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2013:0243
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB13-04) flash-plugin: multiple code execution flaws (APSB13-04)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHBA-2022:0794
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.9.24 packages update
cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host
[ "cpe:/a:redhat:openshift:4.9::el7", "cpe:/a:redhat:openshift:4.9::el8" ]
null
4.2
null
null
RHSA-2021:4326
Red Hat Security Advisory: libX11 security update
libX11: missing request length checks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
0
null
null
RHSA-2010:0488
Red Hat Security Advisory: samba and samba3x security update
samba: memory corruption vulnerability
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es", "cpe:/o:redhat:rhel_eus:5.3", "cpe:/o:redhat:rhel_eus:5.4" ]
null
null
null
null
RHSA-2023:0536
Red Hat Security Advisory: kpatch-patch security update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7
null
null
RHSA-2019:1762
Red Hat Security Advisory: virt:8.0.0 security update
libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients libvirt: arbitrary command execution via virConnectGetDomainCapabilities API libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs
[ "cpe:/a:redhat:advanced_virtualization:8::el8" ]
null
null
8.8
null
RHSA-2020:4650
Red Hat Security Advisory: cloud-init security, bug fix, and enhancement update
cloud-init: Use of random.choice when generating random password cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2010:0172
Red Hat Security Advisory: rhev-hypervisor security and bug fix update
KVM: Check cpl before emulating debug register access kernel: sctp remote denial of service kvm-userspace-rhel5: usb-linux.c: fix buffer overflow kvm: emulator privilege escalation segment selector check
[ "cpe:/o:redhat:enterprise_linux:5::hypervisor" ]
null
null
null
null
RHSA-2016:2138
Red Hat Security Advisory: java-1.7.0-ibm security update
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
5.3
null
RHSA-2009:1528
Red Hat Security Advisory: samba security and bug fix update
samba: infinite loop flaw in smbd on unexpected oplock break notification reply
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2025:1092
Red Hat Security Advisory: ovn22.12 security update
ovn: egress ACLs may be bypassed via specially crafted UDP packet
[ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ]
null
8.1
null
null
RHSA-2018:2102
Red Hat Security Advisory: Red Hat OpenStack Platform 10 Security, Bug Fix, and Enhancement Advisory
dpdk: Information exposure in unchecked guest physical to host virtual address translations
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
6.1
null
RHSA-2019:0457
Red Hat Security Advisory: redhat-virtualization-host security update
spice: Off-by-one error in array access in spice/server/memslot.c vdsm: privilege escalation to root via systemd_run systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7
null
RHSA-2024:0404
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2023:3136
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
3.7
null
null
RHSA-2024:1487
Red Hat Security Advisory: firefox security update
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2021:0310
Red Hat Security Advisory: OpenShift Container Platform 4.6.16 extras security update
openshift/elasticsearch-operator: arbitrary URL redirection of the cluster logging kibana console
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
6.1
null
null
RHSA-2021:0878
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: performance counters race condition use-after-free kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor", "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
7.8
null
null
RHSA-2023:1816
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.2 Bug Fix and security update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:openshift_data_foundation:4.12::el8" ]
null
5.3
null
null
RHSA-2005:132
Red Hat Security Advisory: cups security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2012:0874
Red Hat Security Advisory: mysql security and enhancement update
mysql: Server crash on HANDLER READ NEXT after DELETE
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2012:0126
Red Hat Security Advisory: glibc security update
glibc: __tzfile_read integer overflow to buffer overflow glibc: ldd unexpected code execution issue glibc: ld.so d_tag signedness error in elf_get_dynamic_info glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2012:0477
Red Hat Security Advisory: Red Hat Enterprise MRG Management Console security update
cumin: multiple XSS flaws
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2023:6621
Red Hat Security Advisory: protobuf-c security update
protobuf-c: unsigned integer overflow in parse_required_member
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.2
null
null
RHSA-2024:5393
Red Hat Security Advisory: thunderbird security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
6.1
null
null
RHSA-2001:084
Red Hat Security Advisory: Kernel
security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2011:0887
Red Hat Security Advisory: thunderbird security update
Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Cookie isolation error (MFSA 2011-24) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22) Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2018:0501
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.1 security update
client: unchecked deserialization in marshaller util undertow: IO thread DoS via unclean Websocket closing infinispan: Unsafe deserialization of malicious object injected into data cache js-jquery: XSS in responses from cross-origin ajax requests
[ "cpe:/a:redhat:jboss_single_sign_on:7.2" ]
null
null
6.8
null
RHSA-2018:0037
Red Hat Security Advisory: microcode_ctl security update
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
null
null
RHSA-2015:2101
Red Hat Security Advisory: python security, bug fix, and enhancement update
python: multiple unbound readline() DoS flaws in python stdlib python: XMLRPC library unrestricted decompression of HTTP responses using gzip enconding python: missing boundary check in JSON module python: CGIHTTPServer module does not properly handle URL-encoded path separators in URLs python: buffer() integer overflow leading to out of bounds read
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2017:1265
Red Hat Security Advisory: samba security and bug fix update
samba: Unconditional privilege delegation to Kerberos servers in trusted realms samba: Flaws in Kerberos PAC validation can trigger privilege elevation samba: symlink race permits opening files outside share directory
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.9
null
RHSA-2007:0469
Red Hat Security Advisory: gdb security and bug fix update
GDB buffer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:1699
Red Hat Security Advisory: OpenShift Container Platform 4.7.50 security update
moby: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
4.8
null
null
RHSA-2015:1091
Red Hat Security Advisory: Red Hat Satellite IBM Java Runtime security update
jar: directory traversal vulnerability JDK: ephemeral RSA keys accepted for non-export SSL/TLS cipher suites (FREAK) JDK: unspecified Java sandbox restrictions bypass JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) JDK: unspecified partial Java sandbox restrictions bypass SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher
[ "cpe:/a:redhat:network_satellite:5.6::el5", "cpe:/a:redhat:network_satellite:5.6::el6", "cpe:/a:redhat:network_satellite:5.7::el6" ]
null
null
null
null
RHSA-2024:3461
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: nf_tables: disallow anonymous set with timeout flag kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: net: ip_tunnel: prevent perpetual headroom growth kernel: cifs: fix underflow in parse_server_interfaces() kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.5
null
null
RHSA-2023:5935
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.5 security update
golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2024:2047
Red Hat Security Advisory: OpenShift Container Platform 4.13.41 bug fix and security update
osin: manipulation of the argument secret leads to observable timing discrepancy go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients cluster-monitoring-operator: credentials leak kubevirt-csi: PersistentVolume allows access to HCP's root node
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
6.5
null
null
RHSA-2023:5441
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 4.0.0 release and security update
batik: Server-Side Request Forgery vulnerability batik: Server-Side Request Forgery vulnerability apache-ivy: XML External Entity vulnerability jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale netty: SniHandler 16MB allocation leads to OOM jetty: Improper validation of HTTP/1 content-length
[ "cpe:/a:redhat:camel_spring_boot:4.0.0" ]
null
5.3
null
null
RHSA-2019:1898
Red Hat Security Advisory: httpd security update
httpd: Weak Digest auth nonce generation in mod_auth_digest
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.2
null
RHSA-2019:2822
Red Hat Security Advisory: dovecot security update
dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
8.1
null
RHSA-2023:5396
Red Hat Security Advisory: Red Hat Data Grid 8.4.4 security update
mina-sshd: Java unsafe deserialization vulnerability infispan: REST bulk ops don't check permissions infinispan: Non-admins should not be able to get cache config via REST API infinispan: circular reference on marshalling leads to DoS netty: SniHandler 16MB allocation leads to OOM jackson-databind: denial of service via cylic dependencies apache-mina-sshd: information exposure in SFTP server implementations
[ "cpe:/a:redhat:jboss_data_grid:8" ]
null
4.3
null
null
RHSA-2024:1963
Red Hat Security Advisory: golang security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2009:1561
Red Hat Security Advisory: libvorbis security update
libvorbis: security fixes mentioned in MFSA 2009-63
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:6823
Red Hat Security Advisory: python3 security update
python: TLS handshake bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.6
null
null
RHSA-2025:0381
Red Hat Security Advisory: .NET 8.0 security update
dotnet: .NET and Visual Studio Remote Code Execution Vulnerability dotnet: .NET Elevation of Privilege Vulnerability dotnet: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.8
null
null
RHSA-2024:3067
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Use-after-free bug in DestroyWindow
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.7
null
null
RHSA-2023:1441
Red Hat Security Advisory: openssl security update
openssl: X.400 address type confusion in X.509 GeneralName
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.4
null
null
RHSA-2011:0263
Red Hat Security Advisory: Red Hat Enterprise Linux 4.9 kernel security and bug fix update
kernel: buffer overflow in OSS load_mixer_volumes kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl kernel: av7110 negative array offset
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2017:0320
Red Hat Security Advisory: CFME 5.7.1 bug fixes and enhancement update
rubygem-i18n: cross-site scripting flaw in exception handling cfme: tenant administrator can create a group with higher permissions
[ "cpe:/a:redhat:cloudforms_managementengine:5.7::el7" ]
null
null
4.9
null
RHSA-2023:5191
Red Hat Security Advisory: thunderbird security update
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
0
null
null
RHSA-2022:4711
Red Hat Security Advisory: RHV Manager (ovirt-engine) [ovirt-4.5.0] security update
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-trim-off-newlines: ReDoS via string processing nodejs-normalize-url: ReDoS for data URLs jquery-ui: XSS in the altField option of the datepicker widget jquery-ui: XSS in *Text options of the datepicker widget jquery-ui: XSS in the 'of' option of the .position() util
[ "cpe:/a:redhat:rhev_manager:4.4:el8" ]
null
6.5
null
null
RHSA-2024:4548
Red Hat Security Advisory: kpatch-patch-5_14_0-284_48_1 security update
kernel: TIPC message reassembly use-after-free remote code execution vulnerability
[ "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.1
null
null
RHSA-2012:1365
Red Hat Security Advisory: bind security update
bind: specially crafted resource record causes named to exit bind: Specially crafted DNS data can cause a lockup in named
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es" ]
null
null
null
null
RHSA-2023:3589
Red Hat Security Advisory: firefox security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2004:583
Red Hat Security Advisory: nfs-utils security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2015:1978
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: fs: deadlock due to incorrect usage of rename_lock kernel: buffer overflow with fraglist larger than MAX_SKB_FRAGS + 2 in virtio-net
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2012:1392
Red Hat Security Advisory: java-1.6.0-sun security update
OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606) OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: disable Gopher support by default (Gopher, 7189567) OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:2476
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux 7 security update
dotnet: Denial of service via untrusted input
[ "cpe:/a:redhat:rhel_dotnet:2.1::el7" ]
null
7.5
null
null
RHSA-2023:0633
Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update
Logging Subsystem 5.5.7 - Red Hat OpenShift
[ "cpe:/a:redhat:logging:5.5::el8" ]
null
null
null
null
RHSA-2024:2935
Red Hat Security Advisory: go-toolset:rhel8 security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2013:0577
Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 - End Of Life
This is the End of Life notification for Red Hat Enterprise Virtualization 2.
[]
null
null
null
null
RHSA-2023:1970
Red Hat Security Advisory: kernel security and bug fix update
kernel: FUSE filesystem low-privileged user privileges escalation
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7
null
null
RHSA-2019:2048
Red Hat Security Advisory: exempi security update
exempi: Infinite Loop in Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp exempi: Use after free via a PDF file containing JPEG data exempi: Infinite loop in ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for denial of service via crafted XLS file
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2018:1723
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
4.2
null
RHSA-2020:2605
Red Hat Security Advisory: AMQ Clients 2.7.0 Release
netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
[ "cpe:/a:redhat:a_mq_clients:2::el6", "cpe:/a:redhat:a_mq_clients:2::el7", "cpe:/a:redhat:a_mq_clients:2::el8" ]
null
7.5
null
null
RHSA-2020:2354
Red Hat Security Advisory: freerdp security update
freerdp: Out-of-bounds write in planar.c freerdp: Integer overflow in region.c freerdp: Out-of-bounds write in interleaved.c
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.1::crb" ]
null
6.6
null
null
RHSA-2018:0574
Red Hat Security Advisory: rh-mariadb101-mariadb and rh-mariadb101-galera security and bug fix update
mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unsafe chmod/chown use in init script (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: prepared statement handle use-after-free after disconnect mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Client programs unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017)
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
6.5
null
RHSA-2023:3167
Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing
[ "cpe:/a:redhat:cryostat:2::el8" ]
null
7.5
null
null
RHSA-2020:2646
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS httpd: mod_http2: read-after-free on a string compare httpd: mod_http2: possible crash on late upgrade expat: heap-based buffer over-read via crafted XML input libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c httpd: mod_proxy_ftp use of uninitialized value libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations nghttp2: overly large SETTINGS frames can lead to DoS
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7.5
7.5
null
RHSA-2012:1307
Red Hat Security Advisory: openssl security update
openssl: DTLS plaintext recovery attack openssl: double-free in policy checks openssl: uninitialized SSL 3.0 padding openssl: SGC restart DoS attack openssl: CMS and PKCS#7 Bleichenbacher attack openssl: mime_param_cmp NULL dereference crash openssl: asn1_d2i_read_bio integer errors leading to buffer overflow openssl: record length handling integer underflow
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
RHSA-2016:0309
Red Hat Security Advisory: openstack-glance security update
openstack-glance: Glance image status manipulation through locations
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2022:7268
Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (openvswitch2.11) security update
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
[ "cpe:/a:redhat:openstack:13::el7" ]
null
8.6
null
null
RHSA-2024:6192
Red Hat Security Advisory: wget security update
wget: Misinterpretation of input may lead to improper behavior
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
RHSA-2012:1068
Red Hat Security Advisory: openjpeg security update
openjpeg: Heap memory corruption leading to invalid free by processing certain Gray16 TIFF images openjpeg: heap-based buffer overflow when processing JPEG2000 image files
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2017:0631
Red Hat Security Advisory: wireshark security and bug fix update
wireshark: DoS (crash) in the GMR-1 BCCH dissector (wnpa-sec-2013-33) wireshark: WCP dissector crash (wnpa-sec-2015-14) wireshark: X11 memory leak (wnpa-sec-2015-15) wireshark: Reassembly memory leak (wnpa-sec-2015-16)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:0204
Red Hat Security Advisory: kernel security and bug fix update
hw: Machine Check Error on Page Size Change (IFU) kernel: nfs: use-after-free in svc_process_common() hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write Kernel: vhost_net: infinite loop while receiving packets leads to DoS Kernel: page cache side channel attacks hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c hw: TSX Transaction Asynchronous Abort (TAA) kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver Kernel: KVM: OOB memory access via mmio ring buffer kernel: heap overflow in marvell/mwifiex/tdls.c
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
null
8.8
null
RHSA-2023:4933
Red Hat Security Advisory: Logging Subsystem 5.7.6 - Red Hat OpenShift security update
openshift-logging: LokiStack authorisation is cached too broadly
[ "cpe:/a:redhat:logging:5.7::el8" ]
null
5.7
null
null
RHSA-2023:7394
Red Hat Security Advisory: binutils security update
binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.5
null
null
RHSA-2020:0905
Red Hat Security Advisory: thunderbird security update
usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
6.1
null