id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2025:3169
Red Hat Security Advisory: libreoffice security update
libreoffice: Macro URL arbitrary script execution
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
7.6
null
null
RHSA-2019:3132
Red Hat Security Advisory: OpenShift Container Platform 4.1.20 openshift security update
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
[ "cpe:/a:redhat:openshift:4.1::el7", "cpe:/a:redhat:openshift:4.1::el8" ]
null
null
7.5
null
RHSA-2023:1596
Red Hat Security Advisory: httpd:2.4 security update
httpd: HTTP request splitting with mod_rewrite and mod_proxy
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
9.8
null
null
RHSA-2016:1034
Red Hat Security Advisory: docker security, bug fix, and enhancement update
docker: privilege escalation via confusion of usernames and UIDs
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
RHSA-2007:0559
Red Hat Security Advisory: cman security update
possible buffer overflow could cause local DoS by crashing cman
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2004:418
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:0231
Red Hat Security Advisory: OpenJDK 11.0.22 security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:openjdk:11" ]
null
7.4
null
null
RHSA-2018:1843
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update
isapi_redirect: Mishandled HTTP request paths in jk_isapi_plugin.c can lead to unintended exposure of application resources via the reverse proxy
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
null
7.5
null
RHSA-2023:5239
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
null
null
RHSA-2017:3368
Red Hat Security Advisory: qemu-kvm security update
Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.4
null
RHSA-2017:1485
Red Hat Security Advisory: kernel security update
kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
2.9
null
RHSA-2018:1777
Red Hat Security Advisory: procps security update
procps: Integer overflows leading to heap overflow in file2strvec procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
4.8
null
RHEA-2024:11005
Red Hat Enhancement Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.15.0
word-wrap: ReDoS
[ "cpe:/a:redhat:openshift_gitops:1.15::el8", "cpe:/a:redhat:openshift_gitops:1.15::el9" ]
null
7.5
null
null
RHSA-2024:8859
Red Hat Security Advisory: xmlrpc-c security update
libexpat: Integer Overflow or Wraparound
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2024:2193
Red Hat Security Advisory: podman security update
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2024:8846
Red Hat Security Advisory: container-tools:rhel8 security update
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction buildah: Buildah allows arbitrary directory mount
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2022:1711
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 7
keycloak: Privilege escalation vulnerability on Token Exchange
[ "cpe:/a:redhat:red_hat_single_sign_on:7.5::el7" ]
null
8
null
null
RHSA-2016:0078
Red Hat Security Advisory: bind security update
bind: delegation handling denial of service bind: TKEY query handling flaw leading to denial of service bind: malformed DNSSEC key failed assertion denial of service bind: responses with a malformed class attribute can trigger an assertion failure in db.c
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
null
null
RHSA-2015:1858
Red Hat Security Advisory: mod_proxy_fcgi and ceph security and bug fix update
httpd: mod_proxy_fcgi handle_headers() buffer over read
[ "cpe:/a:redhat:ceph_storage:1.2::centos:6" ]
null
null
null
null
RHSA-2024:11345
Red Hat Security Advisory: gstreamer1-plugins-base security update
gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2021:0474
Red Hat Security Advisory: dotnet security and bugfix update
dotnet: certificate chain building recursion Denial of Service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2018:2921
Red Hat Security Advisory: tomcat security update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2020:3634
Red Hat Security Advisory: thunderbird security update
Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2012:1351
Red Hat Security Advisory: thunderbird security update
Mozilla: Location object can be shadowed using Object.defineProperty (MFSA 2012-59) Mozilla: Miscellaneous memory safety hazards (rv:10.0.8) (MFSA 2012-74) Mozilla: Some DOMWindowUtils methods bypass security checks (MFSA 2012-77) Mozilla: DOS and crash with full screen and history navigation (MFSA 2012-79) Mozilla: Use-after-free in the IME State Manager (MFSA 2012-87) Mozilla: GetProperty function can bypass security checks (MFSA 2012-81) Mozilla: Spoofing and script injection through location.hash (MFSA 2012-84) Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83) Mozilla: top object and location property accessible by plugins (MFSA 2012-82) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:4635
Red Hat Security Advisory: thunderbird security update
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2021:3723
Red Hat Security Advisory: samba security, bug fix and enhancement update
samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
[ "cpe:/a:redhat:storage:3.5:samba:el7" ]
null
6.8
null
null
RHSA-2022:9029
Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-3]
krb5: integer overflow vulnerabilities in PAC parsing
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
8.8
null
null
RHSA-2005:589
Red Hat Security Advisory: gaim security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2014:0113
Red Hat Security Advisory: openstack-keystone security update
openstack-keystone: unintentional role granting with Keystone LDAP backend
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2024:8703
Red Hat Security Advisory: container-tools:rhel8 security update
buildah: Buildah allows arbitrary directory mount
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.8
null
null
RHSA-2020:0697
Red Hat Security Advisory: OpenShift Container Platform 4.1.38 skopeo security update
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
[ "cpe:/a:redhat:openshift:4.1::el8" ]
null
7.5
null
null
RHSA-2010:0950
Red Hat Security Advisory: apr-util security update
apr-util: high memory consumption in apr_brigade_split_line()
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:6993
Red Hat Security Advisory: kernel security update
kernel: virtio-net: Add validation for used length kernel: mISDN: fix possible use-after-free in HFC_cleanup() kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field kernel: isdn: mISDN: Fix sleeping function called from invalid context kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: uio: Fix use-after-free in uio_open kernel: net: fix possible store tearing in neigh_periodic_work() kernel: bonding: stop the device in bond_setup_by_slave() kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool kernel: platform/x86: wmi: Fix opening of char device kernel: tunnels: fix out of bounds access when building IPv6 PMTU error kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() kernel: mptcp: fix data re-injection from stale subflow kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range kernel: x86/xen: Add some null pointer checking to smp.c kernel: af_unix: Fix garbage collector racing against connect() kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: netfilter: tproxy: bail out if IP has been disabled on the device kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: cppc_cpufreq: Fix possible null pointer dereference kernel: md: fix resync softlockup when bitmap size is less than array size kernel: cpufreq: exit() callback is optional kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: drm/amdgpu: avoid using null object of framebuffer kernel: tcp_metrics: validate source addr length
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
4.4
null
null
RHSA-2023:7712
Red Hat Security Advisory: tracker-miners security update
tracker-miners: sandbox escape
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2021:2174
Red Hat Security Advisory: glib2 security update
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
9.8
null
null
RHSA-2024:5143
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.18 Security update
undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
7.5
null
null
RHSA-2022:6787
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.3 security update
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled keycloak: improper input validation permits script injection keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
6.4
null
null
RHSA-2022:8197
Red Hat Security Advisory: php security, bug fix, and enhancement update
php: Use after free due to php_filter_float() failing for ints php: Uninitialized array in pg_query_params() leading to RCE
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7
null
null
RHSA-2019:1623
Red Hat Security Advisory: thunderbird security update
libical: Heap buffer over read in icalparser.c parser_get_next_char libical: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c libical: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c libical: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c Mozilla: Type confusion in Array.pop Mozilla: Sandbox escape using Prompt:Open
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
10
null
RHEA-2018:2188
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 5.0.0 enhancement update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el7" ]
null
null
7.5
null
RHSA-2003:182
Red Hat Security Advisory: ghostscript security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2013:0249
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0 CP10 security update
JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHSA-2025:3000
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: out-of-bounds write vulnerability
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2021:0705
Red Hat Security Advisory: container-tools:1.0 security update
podman: container users permissions are not respected in privileged containers
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7
null
null
RHSA-2024:4125
Red Hat Security Advisory: Red Hat Service Interconnect 1.4.5 Release security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:service_interconnect:1.4::el8", "cpe:/a:redhat:service_interconnect:1.4::el9" ]
null
5.9
null
null
RHSA-2023:0554
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: SSRF Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
9.8
5.6
null
RHSA-2017:0462
Red Hat Security Advisory: java-1.8.0-ibm security update
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
[ "cpe:/a:redhat:rhel_extras:6", "cpe:/a:redhat:rhel_extras:7" ]
null
null
7.5
null
RHSA-2016:0302
Red Hat Security Advisory: openssl security update
OpenSSL: SSLv2 doesn't block disabled ciphers OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:4922
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.7 bug fixes and security updates
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:acm:2.8::el8" ]
null
7.5
null
null
RHBA-2019:1992
Red Hat Bug Fix Advisory: cloud-init bug fix and enhancement update
cloud-init: extra ssh keys added to authorized_keys on the Azure platform
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
5.4
null
RHSA-2024:7484
Red Hat Security Advisory: linux-firmware security update
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.4
null
null
RHSA-2014:1893
Red Hat Security Advisory: libXfont security update
libXfont: integer overflow of allocations in font metadata file parsing libXfont: unvalidated length fields when parsing xfs protocol replies libXfont: integer overflows calculating memory needs for xfs replies
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:5755
Red Hat Security Advisory: OpenJDK 11.0.16 Security Update for Portable Linux Builds
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:openjdk:11" ]
null
7.5
null
null
RHSA-2008:0297
Red Hat Security Advisory: dovecot security and bug fix update
Directory traversal in dovecot with zlib plugin Dovecot possible privilege ascalation in ACL plugin dovecot LDAP+auth cache user login mixup dovecot: insecure mail_extra_groups option
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:2612
Red Hat Security Advisory: samba security, bug fix and enhancement update
samba: NULL pointer dereference in printer server process samba: Weak authentication protocol regression samba: Insufficient input validation in libsmbclient
[ "cpe:/a:redhat:storage:3.4:samba:el6" ]
null
null
4.3
null
RHSA-2023:5245
Red Hat Security Advisory: linux-firmware security update
hw: amd: Cross-Process Information Leak
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2021:0599
Red Hat Security Advisory: redhat-ds:11 security and bug fix update
389-ds-base: information disclosure during the binding of a DN
[ "cpe:/a:redhat:directory_server:11.1::el8" ]
null
5.3
null
null
RHSA-2020:0638
Red Hat Security Advisory: Red Hat Satellite Proxy 5 - 90 day End Of Life Notice
This is the 90 day notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite Proxy 5: * Red Hat Satellite Proxy 5.8
[ "cpe:/a:redhat:network_proxy:5.8::el6" ]
null
null
null
null
RHSA-2009:1178
Red Hat Security Advisory: python security update
python: imageop module integer overflows python: PyString_FromStringAndSize does not check for negative size values python: Multiple integer overflows in python core python: Multiple buffer overflows in unicode processing python: Multiple integer overflows discovered by Google python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function python: imageop module multiple integer overflows python: stringobject, unicodeobject integer overflows
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:7941
Red Hat Security Advisory: OpenShift Container Platform 4.13.z security update
containers/image: digest type does not guarantee valid type webob: WebOb's location header normalization during redirect leads to open redirect openstack-ironic: Specially crafted image may allow authenticated users to gain access to potentially sensitive data
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", "cpe:/a:redhat:openshift_ironic:4.13::el9" ]
null
6.8
null
null
RHSA-2021:2570
Red Hat Security Advisory: kernel security and bug fix update
kernel: security bypass in certs/blacklist.c and certs/system_keyring.c kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2023:7473
Red Hat Security Advisory: OpenShift Container Platform 4.14.4 packages and security update
python-werkzeug: high resource usage when parsing multipart form data with many fields haproxy: Proxy forwards malformed empty Content-Length headers python-werkzeug: high resource consumption leading to denial of service
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9", "cpe:/a:redhat:openshift_ironic:4.14::el9" ]
null
7.5
null
null
RHSA-2019:0483
Red Hat Security Advisory: openssl security and bug fix update
openssl: timing side channel attack in the ECDSA signature generation openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.8
null
RHSA-2025:2655
Red Hat Security Advisory: grub2 security update
grub2: net: Out-of-bounds write in grub_net_search_config_file()
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.6
null
null
RHSA-2012:1351
Red Hat Security Advisory: thunderbird security update
Mozilla: Location object can be shadowed using Object.defineProperty (MFSA 2012-59) Mozilla: Miscellaneous memory safety hazards (rv:10.0.8) (MFSA 2012-74) Mozilla: Some DOMWindowUtils methods bypass security checks (MFSA 2012-77) Mozilla: DOS and crash with full screen and history navigation (MFSA 2012-79) Mozilla: Use-after-free in the IME State Manager (MFSA 2012-87) Mozilla: GetProperty function can bypass security checks (MFSA 2012-81) Mozilla: Spoofing and script injection through location.hash (MFSA 2012-84) Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83) Mozilla: top object and location property accessible by plugins (MFSA 2012-82) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0606
Red Hat Security Advisory: thunderbird security update
Mozilla: Revocation status of S/Mime signature certificates was not checked
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2008:0131
Red Hat Security Advisory: netpbm security update
netpbm: GIF handling buffer overflow in giftopnm
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:3152
Red Hat Security Advisory: exiv2 security update
exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.1
null
null
RHSA-2010:0528
Red Hat Security Advisory: avahi security update
avahi: remote DoS via legacy unicast mDNS queries avahi: assertion failure after receiving a packet with corrupted checksum
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2012:1556
Red Hat Security Advisory: openstack-keystone security, bug fix, and enhancement update
OpenStack: Keystone /etc/keystone/ec2rc secret key exposure OpenStack: Keystone EC2-style credentials invalidation issue
[ "cpe:/a:redhat:openstack:1::el6" ]
null
null
null
null
RHSA-2020:4003
Red Hat Security Advisory: NetworkManager security and bug fix update
NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
4.3
null
null
RHSA-2023:0402
Red Hat Security Advisory: bind security update
bind: DNS forwarders - cache poisoning vulnerability bind: processing large delegations may severely degrade resolver performance
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2020:2039
Red Hat Security Advisory: squid:4 security update
squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.1
null
null
RHSA-2024:5525
Red Hat Security Advisory: bind9.16 security update
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
7.5
null
null
RHSA-2018:1883
Red Hat Security Advisory: samba4 security and bug fix update
samba: NULL pointer dereference in printer server process
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
4.3
null
RHSA-2021:5107
Red Hat Security Advisory: OpenShift Container Platform 4.7.40 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.1
null
null
RHSA-2022:0312
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
5.3
null
null
RHSA-2016:1944
Red Hat Security Advisory: bind security update
bind: assertion failure in buffer.c while building responses to a specifically constructed request
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2015:1188
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Scheme validation error in WebUI chromium-browser: Cross-origin bypass in Blink chromium-browser: Cross-origin bypass in Blink chromium-browser: Normalization error in HSTS/HPKP preload list
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2022:9082
Red Hat Security Advisory: kpatch-patch security update
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: watch queue race condition can lead to privilege escalation kernel: nfsd buffer overflow by RPC message over TCP with garbage data
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.5
null
null
RHSA-2023:1877
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
3.7
null
null
RHSA-2024:1408
Red Hat Security Advisory: emacs security update
emacs: command execution via shell metacharacters emacs: command injection vulnerability in htmlfontify.el
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.8
null
null
RHSA-2023:6115
Red Hat Security Advisory: OpenShift API for Data Protection security update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_api_data_protection:1.1::el8" ]
null
7.5
null
null
RHSA-2023:4466
Red Hat Security Advisory: Satellite 6.13.3 Async Security Update
python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server Foreman: Arbitrary code execution through templates
[ "cpe:/a:redhat:satellite:6.13::el8", "cpe:/a:redhat:satellite_capsule:6.13::el8", "cpe:/a:redhat:satellite_maintenance:6.13::el8", "cpe:/a:redhat:satellite_utils:6.13::el8" ]
null
9.1
null
null
RHSA-2015:0197
Red Hat Security Advisory: rhevm-spice-client security and bug fix update
openssl: race condition in ssl_parse_serverhello_tlsext openssl: TLS protocol downgrade attack
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2022:1664
Red Hat Security Advisory: Red Hat Software Collections security update
python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.8
null
null
RHSA-2021:2363
Red Hat Security Advisory: gupnp security update
gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.3
null
null
RHSA-2016:1809
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2019:1880
Red Hat Security Advisory: curl security and bug fix update
curl: NTLM password overflow via integer overflow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2021:5127
Red Hat Security Advisory: Openshift Logging security and bug update (5.2.4)
netty: Request smuggling via content-length header netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
[ "cpe:/a:redhat:logging:5.2::el8" ]
null
8.1
null
null
RHSA-2007:0557
Red Hat Security Advisory: httpd security update
httpd mod_status XSS httpd mod_cache segfault httpd scoreboard lack of PID protection
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2013:1866
Red Hat Security Advisory: ca-certificates security update
An updated ca-certificates package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact.
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:5414
Red Hat Security Advisory: kernel security update
kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
7.8
null
null
RHSA-2023:5971
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.1 (director-operator) security update
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openstack:17.1::el9" ]
null
7.5
null
null
RHSA-2016:2067
Red Hat Security Advisory: chromium-browser security update
chromium-browser: universal xss in blink chromium-browser: heap overflow in blink chromium-browser: use after free in pdfium chromium-browser: use after free in pdfium chromium-browser: use after free in blink chromium-browser: out of bounds read in devtools chromium-browser: url spoofing chromium-browser: ui spoofing chromium-browser: url spoofing chromium-browser: use after free in internals chromium-browser: universal xss in bookmarks chromium-browser: cross-origin bypass in blink chromium-browser: scheme bypass chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2016:0156
Red Hat Security Advisory: python-django security update
python-django: Information leak through date template filter
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2022:5840
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix update
cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group
[ "cpe:/a:redhat:rhmt:1.7::el8" ]
null
6.2
null
null
RHSA-2002:036
Red Hat Security Advisory: : Updated ethereal packages available
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/a:redhat:powertools:6.2", "cpe:/a:redhat:powertools:7.0", "cpe:/a:redhat:powertools:7.1" ]
null
null
null
null
RHSA-2021:4826
Red Hat Security Advisory: mailman:2.1 security update
mailman: CSRF token derived from admin password allows offline brute-force attack mailman: CSRF token bypass allows to perform CSRF attacks and account takeover
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
RHSA-2005:165
Red Hat Security Advisory: rsh security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null