id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:5338
Red Hat Security Advisory: ruby:2.6 security, bug fix, and enhancement update
ruby: Buffer overrun in String-to-Float conversion
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.2
null
null
RHSA-2011:1244
Red Hat Security Advisory: seamonkey security update
Updated seamonkey packages that fix one security issue are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having important security impact.
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:7207
Red Hat Security Advisory: osbuild-composer security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2020:4115
Red Hat Security Advisory: redhat-release-virtualization-host and redhat-virtualization-host security update
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
5
null
null
RHSA-2008:1044
Red Hat Security Advisory: java-1.5.0-bea security update
java-1.5.0-bea as shipped in Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 Supplementary, contains security flaws and should not be used. This update has been rated as having important security impact by the Red Hat Security Response Team.
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2025:3772
Red Hat Security Advisory: go-toolset:rhel8 security update
golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.2
null
null
RHSA-2024:1436
Red Hat Security Advisory: postgresql-jdbc security update
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2001:088
Red Hat Security Advisory: : New xloadimage packages available
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2024:0559
Red Hat Security Advisory: firefox security update
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2021:2763
Red Hat Security Advisory: OpenShift Container Platform 4.7.21 security and bug fix update
An update is now available for Red Hat OpenShift Container Platform 4.7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
null
null
null
RHSA-2021:1369
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.6 security and bug fix updates
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash mquery: Code injection via merge or clone operation
[ "cpe:/a:redhat:acm:2.1::el8" ]
null
4.3
null
null
RHSA-2023:1896
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5 hotfix security update for console
vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
[ "cpe:/a:redhat:acm:2.5::el8" ]
null
9.8
null
null
RHSA-2024:4415
Red Hat Security Advisory: kernel security and bug fix update
kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: kvm: Avoid potential UAF in LPI translation cache kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations kernel: gro: fix ownership transfer
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
5.5
null
null
RHSA-2025:2784
Red Hat Security Advisory: grub2 security update
grub2: net: Out-of-bounds write in grub_net_search_config_file()
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
7.6
null
null
RHSA-2017:0347
Red Hat Security Advisory: kernel security and bug fix update
kernel: dccp: crash while sending ipv6 reset packet kernel: use after free in dccp protocol
[ "cpe:/o:redhat:rhel_mission_critical:5.6" ]
null
null
7.8
null
RHSA-2023:4126
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: net/ulp: use-after-free in listening ULP sockets kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: remote DoS in TIPC kernel module kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/a:redhat:rhel_tus:8.2::realtime" ]
null
7.8
null
null
RHSA-2015:0791
Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform Installer update
openstack-puppet-modules: pacemaker configured with default password
[ "cpe:/a:redhat:openstack-installer:6::el7" ]
null
null
null
null
RHSA-2025:0165
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2004:349
Red Hat Security Advisory: httpd security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:0832
Red Hat Security Advisory: .NET 6.0 on RHEL 7 security and bugfix update
dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
6.3
null
null
RHSA-2021:2261
Red Hat Security Advisory: thunderbird security update
Mozilla: Thunderbird stored OpenPGP secret keys without master password protection Mozilla: Partial protection of inline OpenPGP message not indicated Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
null
null
RHSA-2014:1392
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messages kernel: integer overflow in fb_mmap kernel: ipc: ipc_rcu_putref refcount races kernel: net: insufficient permision checks of netlink messages Kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking kernel: kvm: invalid parameter passing in kvm_iommu_map_pages() kernel: lzo1x_decompress_safe() integer overflow Kernel: ALSA: control: do not access controls outside of protected regions Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: use-after-free in replacing user controls kernel: vfs: refcount issues during unmount on symlink Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2010:0360
Red Hat Security Advisory: wireshark security update
Wireshark: various flaws in a) RADIUS, b) Bluetooth L2CAP, c) MIOP dissectors (DoS) Wireshark: Integer overflow in the AFS dissector Wireshark: Null-ptr dereference in the InfiniBand dissector Wireshark: NULL pointer dereference in the DCERPC over SMB packet disassembly wireshark: unsigned integer wrap vulnerability in ERF reader (VU#676492) wireshark: invalid pointer dereference in SMB/SMB2 dissectors wireshark: crash in LWRES dissector
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:0072
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6 chromium-browser: bad cast in V8 chromium-browser: use-after-free in PDFium chromium-browser: information leak in Blink chromium-browser: origin confusion in Omnibox chromium-browser: various fixes from internal audits chromium-browser: various fixes from internal audits chromium-browser: weak random number generator in Blink chromium-browser: out-of-bounds read in PDFium chromium-browser: various fixes from internal audits chromium-browser: Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17 chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2016:2963
Red Hat Security Advisory: xen security update
Xen: qemu ioport out-of-bounds array access (XSA-199)
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
7.6
null
RHSA-2023:5574
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
RHSA-2023:0291
Red Hat Security Advisory: sudo security update
sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2022:8393
Red Hat Security Advisory: logrotate security update
logrotate: potential DoS from unprivileged users via the state file
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.2
null
null
RHSA-2020:0564
Red Hat Security Advisory: systemd security update
systemd: use-after-free when asynchronous polkit queries are performed
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
7.8
null
null
RHSA-2009:1136
Red Hat Security Advisory: dhcp security update
dhclient: stack overflow leads to arbitrary code execution as root
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es" ]
null
null
null
null
RHSA-2022:0268
Red Hat Security Advisory: polkit security update
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2020:0378
Red Hat Security Advisory: ipa security and bug fix update
ipa: Batch API logging user passwords to /var/log/httpd/error_log ipa: Denial of service in IPA server due to wrong use of ber_scanf()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2025:4243
Red Hat Security Advisory: glibc security update
glibc: buffer overflow in the GNU C Library's assert()
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb", "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
5.5
null
null
RHSA-2024:0965
Red Hat Security Advisory: unbound security update
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2023:1948
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-nova) security update
openstack-nova: Compute service fails to restart if the vnic_type of a bound port changed from direct to macvtap
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
3.3
null
null
RHSA-2024:4151
Red Hat Security Advisory: OpenShift Container Platform 4.15.20 security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openshift/telemeter: iss check during JWT authentication can be bypassed
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
7.5
null
null
RHSA-2019:2828
Red Hat Security Advisory: kernel-rt security update
kernel: vhost-net: guest to host kernel escape during migration
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
null
7.2
null
RHSA-2013:0898
Red Hat Security Advisory: mesa security update
Mesa: Multiple integer overflows leading to heap-based bufer overflows
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:1269
Red Hat Security Advisory: firefox security update
mozilla: Cross-origin theft of images with ImageBitmapRenderingContext chromium-browser: Out of bounds read in Skia libpng: use-after-free in png_image_free in png.c Mozilla: Cross-origin theft of images with createImageBitmap Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 Mozilla: Type confusion with object groups and UnboxedObjects Mozilla: Stealing of cross-domain images using canvas Mozilla: Compartment mismatch with fetch API Mozilla: Use-after-free of ChromeEventHandler by DocShell Mozilla: Use-after-free in XMLHttpRequest Mozilla: Use-after-free removing listeners in the event listener manager Mozilla: Buffer overflow in WebGL bufferdata on Linux Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
6.1
null
RHSA-2003:158
Red Hat Security Advisory: : : : Updated mm packages fix temporary file handling
security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2023:4498
Red Hat Security Advisory: dbus security update
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.2
null
null
RHSA-2015:0831
Red Hat Security Advisory: openstack-packstack and openstack-puppet-modules update
openstack-puppet-modules: pacemaker configured with default password
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2007:0235
Red Hat Security Advisory: util-linux security and bug fix update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2015:1214
Red Hat Security Advisory: flash-plugin security update
flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: code execution issue in APSA15-03 / APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:1664
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.2 release and security update
tomcat: request smuggling tomcat: JsonErrorReportValve injection
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7" ]
null
7.5
null
null
RHSA-2021:4916
Red Hat Security Advisory: mailman:2.1 security update
mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
RHSA-2014:1974
Red Hat Security Advisory: rpm security update
rpm: race condition during the installation process
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:0820
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: improper initialization of the "flags" member of the new pipe_buffer kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7
null
null
RHSA-2024:8690
Red Hat Security Advisory: OpenShift Container Platform 4.13.53 packages and security update
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
5.9
null
null
RHSA-2023:0697
Red Hat Security Advisory: OpenShift Container Platform 4.10.52 security update
SnakeYaml: Constructor Deserialization Remote Code Execution jenkins: Observable timing discrepancy allows determining username validity
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.5
null
null
RHSA-2024:7793
Red Hat Security Advisory: buildah security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2020:3949
Red Hat Security Advisory: librabbitmq security update
librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.6
null
null
RHSA-2022:0233
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096)
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
5.3
null
null
RHSA-2020:0296
Red Hat Security Advisory: openjpeg2 security update
openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor()
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.1
null
null
RHSA-2012:0547
Red Hat Security Advisory: php53 security update
php: command line arguments injection when run in CGI mode (VU#520827)
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2009:0001
Red Hat Security Advisory: kernel security update
kernel Race condition in mincore can cause "ps -ef" to hang fib_semantics.c out of bounds access vulnerability Privilege escalation via PR_SET_PDEATHSIG kernel: Missing ioctl() permission checks in aacraid driver Linux Kernel isdn_net_setcfg buffer overflow I4L: fix isdn_ioctl memory issue Issue with core dump owner kernel: insufficient range checks in fault handlers with mremap kernel: sit memory leak Linux kernel local filesystem DoS kernel: missing capability checks in sbni_ioctl() kernel: open() call allows setgid bit when user is not in new file's group
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:0593
Red Hat Security Advisory: libksba security update
libksba: integer overflow to code execution
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
8.6
null
null
RHSA-2022:0074
Red Hat Security Advisory: samba security update
samba: SMB1 client connections can be downgraded to plaintext authentication samba: Active Directory (AD) domain user could become root on domain members
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
8.1
null
null
RHSA-2023:2257
Red Hat Security Advisory: tigervnc security and bug fix update
xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2024:1411
Red Hat Security Advisory: opencryptoki security update
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
5.9
null
null
RHSA-2019:2690
Red Hat Security Advisory: OpenShift Container Platform 3.10 security update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced
[ "cpe:/a:redhat:openshift:3.10::el7" ]
null
null
5
null
RHSA-2009:1562
Red Hat Security Advisory: tomcat security update
Improve cookie parsing for tomcat5 tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes tomcat: XSS in Apache Tomcat calendar application tomcat XML parser information disclosure
[ "cpe:/a:redhat:rhel_application_server:2" ]
null
null
null
null
RHSA-2019:3694
Red Hat Security Advisory: sudo security update
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
7
null
RHSA-2018:3833
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 firefox: Memory corruption in Angle Mozilla: Use-after-free with select element Mozilla: Buffer overflow in accelerated 2D canvas with Skia Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs Mozilla: Integer overflow when calculating buffer sizes for images
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2024:7101
Red Hat Security Advisory: httpd security update
httpd: Security issues via backend applications whose response headers are malicious or exploitable
[ "cpe:/o:redhat:rhel_els:7" ]
null
9.1
null
null
RHSA-2007:0469
Red Hat Security Advisory: gdb security and bug fix update
GDB buffer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2021:2731
Red Hat Security Advisory: kpatch-patch security update
kernel: Use after free via PI futex state kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
[ "cpe:/o:redhat:rhel_e4s:7.6::server" ]
null
7.8
null
null
RHSA-2014:1861
Red Hat Security Advisory: mariadb security update
mysql: Remote Preauth User Enumeration flaw mysql: unspecified vulnerability related to ENARC (CPU July 2014) mysql: unspecified vulnerability related to SROPTZR (CPU July 2014) mysql: unspecified vulnerability related to ENFED (CPU July 2014) mysql: unspecified vulnerability related to SRINFOSC (CPU July 2014) mysql: unspecified vulnerability related to SRCHAR (CPU July 2014) mysql: unspecified MyISAM temporary file issue fixed in 5.5.39 and 5.6.20 mysql: unspecified vulnerability related to SERVER:CHARACTER SETS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:INNODB DML FOREIGN KEYS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:OPTIMIZER (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:MEMORY STORAGE ENGINE (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DDL (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLDUMP (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLADMIN (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to C API SSL CERTIFICATE HANDLING (CPU October 2014)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2013:0533
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.1 update
JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure Console: XSS in invoke operation Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs JBoss invoker servlets do not require authentication JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided jruby: Murmur hash function collisions (oCERT-2012-001) JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3" ]
null
null
null
null
RHSA-2023:1409
Red Hat Security Advisory: OpenShift Container Platform 4.12.9 security update
mongo-go-driver: specific cstrings input may not be properly validated golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.5
null
null
RHSA-2017:0307
Red Hat Security Advisory: kernel security and bug fix update
kernel: Race condition vulnerability in execve argv arguments kernel: Slab out-of-bounds access in sctp_sf_ootb()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.9
null
RHSA-2022:1764
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: urllib: HTTP client possible infinite loop on a 100 Continue response python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2006:0598
Red Hat Security Advisory: gimp security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:7165
Red Hat Security Advisory: cups security and bug fix update
cups: heap buffer overflow may lead to DoS cups: use-after-free in cupsdAcceptClient() in scheduler/client.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.1
null
null
RHSA-2024:11024
Red Hat Security Advisory: python3.9:3.9.18 security update
python: Virtual environment (venv) activation scripts don't quote paths
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb", "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
6.3
null
null
RHSA-2019:4075
Red Hat Security Advisory: OpenShift Container Platform 4.2 library-go security update
library-go: Secret data written to static pod logs when operator set at Debug level or higher
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
null
5.3
null
RHSA-2009:0267
Red Hat Security Advisory: sudo security update
sudo: incorrect handling of groups in Runas_User
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1204
Red Hat Security Advisory: haproxy security update
haproxy: http_get_hdr()/get_ip_from_hdr2() MAX_HDR_HISTORY handling denial of service
[ "cpe:/a:redhat:openshift:1.2::el6" ]
null
null
null
null
RHSA-2020:4026
Red Hat Security Advisory: mariadb security and bug fix update
mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.2
4.9
null
RHSA-2023:0343
Red Hat Security Advisory: libtasn1 security update
libtasn1: Out-of-bound access in ETYPE_OK
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.9
null
null
RHSA-2022:7628
Red Hat Security Advisory: php:7.4 security, bug fix, and enhancement update
php: Special character breaks path in xml parsing php: Use after free due to php_filter_float() failing for ints php-pear: Directory traversal vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.4
null
null
RHSA-2019:3832
Red Hat Security Advisory: kernel security update
hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
6.5
null
RHSA-2025:3455
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.3 release and security update
tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.8" ]
null
8.6
null
null
RHSA-2024:8801
Red Hat Security Advisory: openexr security update
OpenEXR: Heap Overflow in Scanline Deep Data Parsing
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
9.1
null
null
RHSA-2024:2693
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP4 security update
curl: Usage of disabled protocol curl: QUIC certificate check bypass with wolfSSL curl: HTTP/2 push headers memory-leak curl: TLS certificate check bypass with mbedTLS httpd: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS
[ "cpe:/a:redhat:jboss_core_services:1::el7", "cpe:/a:redhat:jboss_core_services:1::el8" ]
null
5.3
null
null
RHSA-2025:0759
Red Hat Security Advisory: git-lfs security update
git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
8.1
null
null
RHSA-2022:6449
Red Hat Security Advisory: nodejs:16 security and bug fix update
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2020:0243
Red Hat Security Advisory: nss security update
nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
null
8.1
null
RHSA-2003:372
Red Hat Security Advisory: wget security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2020:2486
Red Hat Security Advisory: unzip security update
unzip: overlapping of files in ZIP container leads to denial of service
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
null
4
null
RHSA-2024:7103
Red Hat Security Advisory: grafana-pcp security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2024:6744
Red Hat Security Advisory: kernel security update
kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc kernel: Bluetooth: af_bluetooth: Fix deadlock kernel: crypto: qat - resolve race condition during AER recovery kernel: scsi: qedf: Ensure the copied buf is NUL terminated kernel: cppc_cpufreq: Fix possible null pointer dereference kernel: cpufreq: exit() callback is optional kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: sched/deadline: Fix task_struct reference leak kernel: mm/filemap: skip to create PMD-sized page cache if needed kernel: mm/shmem: disable PMD-sized page cache if needed kernel: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.5
null
null
RHSA-2020:0984
Red Hat Security Advisory: ipmitool security update
ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c
[ "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2020:3616
Red Hat Security Advisory: OpenShift Container Platform 4.3.35 jenkins-2-plugins security update
jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods jenkins-script-security-plugin: sandbox protection bypass during script compilation phase by applying AST transforming annotations jenkins-subversion-plugin: XSS in project repository base url jenkins-script-security-plugin: sandbox protection bypass via crafted constructor calls and crafted constructor bodies jenkins-script-security-plugin: sandbox protection bypass leads to arbitrary code execution jenkins-git-plugin: stored cross-site scripting
[ "cpe:/a:redhat:openshift:4.3::el7" ]
null
5.4
null
null
RHSA-2022:5704
Red Hat Security Advisory: ACS 3.71 enhancement and security update
go-tuf: No protection against rollback attacks for roles other than root
[ "cpe:/a:redhat:advanced_cluster_security:3.71::el8" ]
null
8
null
null
RHSA-2025:0578
Red Hat Security Advisory: kernel security update
kernel: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). kernel: arm64/sve: Discard stale CPU state when handling SVE traps kernel: i40e: fix race condition by adding filter's intermediate sync state
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.7
null
null
RHSA-2015:1673
Red Hat Security Advisory: jboss-ec2-eap bug fix security update
PicketLink: PicketLink IDP ignores role based authorization
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2003:173
Red Hat Security Advisory: : Updated ypserv packages fix a denial of service vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2014:0565
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 update
JBossSX/PicketBox: World readable audit.log file
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.2.3" ]
null
null
null
null
RHSA-2021:3769
Red Hat Security Advisory: grafana security update
grafana: Snapshot authentication bypass
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.3
null
null