id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:7855
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 9
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
7.7
null
null
RHSA-2021:1512
Red Hat Security Advisory: postgresql security update
postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
7.5
null
RHSA-2023:7878
Red Hat Security Advisory: postgresql:10 security update
postgresql: Buffer overrun from integer overflow in array modification
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2022:1153
Red Hat Security Advisory: OpenShift Container Platform 4.8.36 security update
haproxy: Denial of service via set-cookie2 header
[ "cpe:/a:redhat:openshift:4.8::el7", "cpe:/a:redhat:openshift:4.8::el8" ]
null
7.5
null
null
RHSA-2021:1597
Red Hat Security Advisory: libxml2 security update
libxml2: Buffer overflow vulnerability in xmlEncodeEntitiesInternal() in entities.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2024:1317
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP3 security update
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow mod_cluster/mod_proxy_cluster: Stored Cross site Scripting httpd: mod_macro: out-of-bounds read vulnerability libxml2: crafted xml can cause global buffer overflow curl: information disclosure by exploiting a mixed case flaw curl: excessively long file name may lead to unknown HSTS status libxml2: use-after-free in XMLReader
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7.5
null
null
RHSA-2023:2633
Red Hat Security Advisory: libreswan security update
libreswan: remote DoS via crafted TS payload with an incorrect selector length
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2019:3901
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Vert.x 3.8.3 security update
infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: default typing mishandling leading to remote code execution netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
null
7.5
null
RHSA-2010:0458
Red Hat Security Advisory: perl security update
perl: File:: Path rmtree race condition (CVE-2005-0448) reintroduced after upstream rebase to 5.8.8-1 perl: File:: Path rmtree race condition (CVE-2004-0452) reintroduced after upstream rebase to 5.8.8-1 Safe: Intended restriction bypass via object references perl: Safe restriction bypass when reference to subroutine in compartment is called from outside
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2008:0136
Red Hat Security Advisory: tk security update
Tk GIF processing buffer overflow tk: GIF handling buffer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:4998
Red Hat Security Advisory: wget security update
wget: Misinterpretation of input may lead to improper behavior
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
5.5
null
null
RHSA-2019:3007
Red Hat Security Advisory: OpenShift Container Platform 4.1.20 openshift-enterprise-builder-container security update
atomic-openshift: OpenShift builds don't verify SSH Host Keys for the git repository containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
6.4
null
RHSA-2021:0476
Red Hat Security Advisory: dotnet5.0 security and bugfix update
dotnet: certificate chain building recursion Denial of Service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2025:2753
Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.19.0 release
katex: \htmlData does not validate attribute names in KaTeX
[ "cpe:/a:redhat:openshift_devspaces:3::el9" ]
null
6.3
null
null
RHSA-2020:1113
Red Hat Security Advisory: bash security update
bash: BASH_CMD is writable in restricted bash shells
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2023:1365
Red Hat Security Advisory: nss security and bug fix update
nss: Arbitrary memory write via PKCS 12
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2022:0075
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Use-after-free leading to arbitrary code execution
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
null
null
RHSA-2022:7025
Red Hat Security Advisory: firefox security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.1
null
null
RHSA-2021:2119
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.6 (tripleo-ansible) security update
tripleo-ansible: ansible.log file is visible to unprivileged users
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2019:3044
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.4 security update on RHEL 6
undertow: Information leak in requests for directories without trailing slashes jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
null
5
null
RHSA-2017:2669
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: ext4 filesystem page fault race condition with fallocate call. kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c kernel: Use after free in SCSI generic device interface kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user kernel: Memory leaks in xfs_attr_list.c error paths kernel: netlink: double-free in netlink_dump kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression) kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c kernel: ping socket / AF_LLC connect() sin_family race kernel: S_ISGD is not cleared when setting posix ACLs in tmpfs (CVE-2016-7097 incomplete fix) kernel: ipv4: Invalid IP options could cause skb->dst drop kernel: Race condition between multiple sys_perf_event_open() calls kernel: NULL pointer dereference in keyring_search_aux function kernel: scsi: Stack-based buffer overflow in sg_ioctl function kernel: ext4: power failure during write(2) causes on-disk information leak kernel: a race between inotify_handle_event() and sys_rename() kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option kernel: net: sctp_v6_create_accept_sk function mishandles inheritance kernel: net: IPv6 DCCP implementation mishandles inheritance kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
6.5
null
RHSA-2024:4522
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
python-jwcrypto: malicious JWE token can cause denial of service jinja2: accepts keys containing non-attribute characters requests: subsequent requests to the same host ignore cert verification
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
5.6
null
null
RHSA-2002:175
Red Hat Security Advisory: : Updated nss_ldap packages fix buffer overflow
security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2016:0369
Red Hat Security Advisory: rabbitmq-server security and bug fix update
RabbitMQ: /api/... XSS vulnerability RabbitMQ: /api/definitions response splitting vulnerability
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2003:209
Red Hat Security Advisory: : : : updated ghostscript packages fix vulnerabilities
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2021:1373
Red Hat Security Advisory: kernel security and bug fix update
kernel: iscsi: unrestricted access to sessions and handles kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
7.8
null
null
RHBA-2022:5747
Red Hat Bug Fix Advisory: .NET 6.0 bugfix update
eventsource: Exposure of Sensitive Information
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
9.3
null
null
RHSA-2003:234
Red Hat Security Advisory: : Updated semi packages fix vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2020:2524
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-proxy security update
nghttp2: overly large SETTINGS frames can lead to DoS
[ "cpe:/a:redhat:service_mesh:1.0::el8" ]
null
7.5
null
null
RHSA-2014:0626
Red Hat Security Advisory: openssl097a and openssl098e security update
openssl: SSL/TLS MITM vulnerability
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:3353
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.9 security fixes and container updates
vm2: Inspect Manipulation vm2: Sandbox Escape
[ "cpe:/a:redhat:multicluster_engine:2.0::el8" ]
null
9.8
null
null
RHSA-2024:7182
Red Hat Security Advisory: OpenShift Container Platform 4.15.35 packages and security update
containers/image: digest type does not guarantee valid type webob: WebOb's location header normalization during redirect leads to open redirect
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9", "cpe:/a:redhat:openshift_ironic:4.15::el9" ]
null
6.1
null
null
RHSA-2012:1455
Red Hat Security Advisory: gegl security update
gegl: Integer overflow, leading to heap-based buffer overflow by parsing PPM image headers
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:4770
Red Hat Security Advisory: thunderbird security update
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
null
8.8
null
RHSA-2023:7408
Red Hat Security Advisory: samba security update
samba: smbd allows client access to unix domain sockets on the file system as root samba: SMB clients can truncate files with read-only permissions samba: "rpcecho" development server allows denial of service via sleep() call on AD DC
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
6.5
null
null
RHSA-2012:0144
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: multiple code execution flaws (APSB12-03) flash-plugin: universal cross-site scripting flaw (APSB12-03)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:6914
Red Hat Security Advisory: python3.11-pip security update
python: tarfile module directory traversal
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2018:0676
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: unlimiting the stack disables ASLR kernel: media: use-after-free in [tuner-xc2028] media driver kernel: Buffer overflow in firewire driver via crafted incoming packets kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register kernel: memory leak when merging buffers in SCSI IO vectors kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker kernel: Missing permission check in move_pages system call kernel: Null pointer dereference in rngapi_reset function kernel: vfs: BUG in truncate_inode_pages_range() and fuse client kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: dereferencing NULL payload with nonzero length kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ Kernel: KVM: DoS via write flood to I/O port 0x80 kernel: Stack information leak in the EFS element kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact kernel: Race condition in sound system can lead to denial of service
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
4.7
null
RHSA-2013:0004
Red Hat Security Advisory: tomcat6 security update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.0" ]
null
null
null
null
RHSA-2010:0681
Red Hat Security Advisory: firefox security update
Mozilla Dangling pointer vulnerability in nsTreeSelection (MFSA 2010-54) Mozilla SJOW creates scope chains ending in outer object (MFSA 2010-59) Mozilla Information leak via XMLHttpRequest statusText (MFSA 2010-63) Mozilla Frameset integer overflow vulnerability (MFSA 2010-50) Mozilla Crash and remote code execution in normalizeDocument (MFSA 2010-57) Mozilla Dangling pointer vulnerability using DOM plugin array (MFSA 2010-51) Mozilla UTF-7 XSS by overriding document charset using <object> type attribute (MFSA 2010-61) Mozilla Copy-and-paste or drag-and-drop into designMode document allows XSS (MFSA 2010-62) nsTextFrameUtils:: TransformText (MFSA 2010-53) Mozilla Dangling pointer vulnerability in nsTreeContentView (MFSA 2010-56) Mozilla XUL tree removal crash and remote code execution (MFSA 2010-55) Mozilla Miscellaneous memory safety hazards
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:4941
Red Hat Security Advisory: subversion:1.14 security update
subversion: Subversion's mod_dav_svn is vulnerable to memory corruption
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2021:3074
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
5.3
null
RHSA-2024:6840
Red Hat Security Advisory: pcp security update
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
4.4
null
null
RHSA-2003:225
Red Hat Security Advisory: : : : Updated LPRng packages fix psbanner vulnerability
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2020:4185
Red Hat Security Advisory: spice and spice-gtk security update
spice: multiple buffer overflow vulnerabilities in QUIC decoding code
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.1::crb" ]
null
6.6
null
null
RHSA-2014:1370
Red Hat Security Advisory: Apache POI security update
apache-poi: XML eXternal Entity (XXE) flaw apache-poi: entity expansion (billion laughs) flaw
[ "cpe:/a:redhat:jboss_fuse_service_works:6.0" ]
null
null
null
null
RHBA-2019:0944
Red Hat Bug Fix Advisory: Red Hat OpenStack Platform 14 bug fix and enhancement advisory
python-novajoin: novajoin API lacks access control
[ "cpe:/a:redhat:openstack:14::el7" ]
null
null
7.1
null
RHSA-2017:0366
Red Hat Security Advisory: kernel security update
kernel: use after free in dccp protocol
[ "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_tus:6.5::server" ]
null
null
7.8
null
RHSA-2021:3147
Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update
dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging
[ "cpe:/a:redhat:rhel_dotnet:5.0::el7" ]
null
5.5
null
null
RHSA-2007:0087
Red Hat Security Advisory: ekiga security update
security flaw Ekiga format string flaw
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2024:1647
Red Hat Security Advisory: bind9.16 security update
bind9: Parsing large DNS messages may cause excessive CPU load bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind9: Specific recursive query patterns may lead to an out-of-memory condition bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2023:1978
Red Hat Security Advisory: haproxy security update
haproxy: segfault DoS haproxy: request smuggling attack in HTTP/1 header parsing
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.2
null
null
RHSA-2013:1803
Red Hat Security Advisory: libjpeg-turbo security update
libjpeg: information leak (read of uninitialized memory) libjpeg: information leak (read of uninitialized memory)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:0483
Red Hat Security Advisory: openssl security and bug fix update
openssl: timing side channel attack in the ECDSA signature generation openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.8
null
RHSA-2003:021
Red Hat Security Advisory: krb5 security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2024:1074
Red Hat Security Advisory: 389-ds:1.4 security update
389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
5.5
null
null
RHSA-2018:1345
Red Hat Security Advisory: kernel security update
Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
7.8
null
RHSA-2005:080
Red Hat Security Advisory: cpio security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2021:4251
Red Hat Security Advisory: openjpeg2 security update
openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c openjpeg: integer overflow in opj_j2k_setup_encoder function in openjp2/j2k.c openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode() openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes() openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.2
3.3
null
RHSA-2020:1942
Red Hat Security Advisory: OpenShift Container Platform 4.4.3 presto-container security update
operator-framework/presto: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
7
null
null
RHSA-2024:11193
Red Hat Security Advisory: mpg123 security update
mpg123: Buffer overflow when writing decoded PCM samples
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.7
null
null
RHSA-2021:1756
Red Hat Security Advisory: qt5-qtbase security and bug fix update
qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2022:0339
Red Hat Security Advisory: OpenShift Container Platform 4.9.19 security update
jenkins: no POST request is required for the endpoint handling manual build requests which could result in CSRF jenkins-2-plugins/docker-commons: does not sanitize the name of an image or a tag which could result in an OS command execution
[ "cpe:/a:redhat:openshift:4.9::el7", "cpe:/a:redhat:openshift:4.9::el8" ]
null
8.8
null
null
RHSA-2009:1505
Red Hat Security Advisory: java-1.4.2-ibm security update
OpenJDK RSA public key length denial-of-service (6497740) JDK: XML parsing Denial-Of-Service (6845701)
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2024:11219
Red Hat Security Advisory: edk2:20240524 security update
edk2: Integer overflows in PeCoffLoaderRelocateImage
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.9
null
null
RHSA-2025:0535
Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.15.0
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:cert_manager:1.15::el9" ]
null
7.5
null
null
RHSA-2022:6781
Red Hat Security Advisory: bind9.16 security update
bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2021:1879
Red Hat Security Advisory: python38:3.8 security update
python: CRLF injection via HTTP request method in httplib/http.client python-lxml: mXSS due to the use of improper parser python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2023:7334
Red Hat Security Advisory: rh-varnish6-varnish security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2019:2552
Red Hat Security Advisory: OpenShift Container Platform 3.10 atomic-openshift-web-console security update
xterm.js: Mishandling of special characters allows for remote code execution
[ "cpe:/a:redhat:openshift:3.10::el7" ]
null
null
7.5
null
RHSA-2018:0515
Red Hat Security Advisory: 389-ds-base security update
389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2019:3476
Red Hat Security Advisory: squid:4 security and bug fix update
squid: XSS via user_name or auth parameter in cachemgr.cgi
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
4.3
null
RHSA-2009:1061
Red Hat Security Advisory: freetype security update
freetype: multiple integer overflows
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:4670
Red Hat Security Advisory: thunderbird security update
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in NSS Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2006:0754
Red Hat Security Advisory: gnupg security update
: gnupg2 < 2.0.1 buffer overflow security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:1551
Red Hat Security Advisory: firefox security update
Mozilla: Favicon network connection persists when page is closed (MFSA 2016-62) Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62) Mozilla: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77) Mozilla: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64) Mozilla: Stack underflow during 2D graphics rendering (MFSA 2016-67) Mozilla: Use-after-free when using alt key and toplevel menus (MFSA 2016-70) Mozilla: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72) Mozilla: Use-after-free in service workers with nested sync events (MFSA 2016-73) Mozilla: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76) Mozilla: Type confusion in display transformation (MFSA 2016-78) Mozilla: Use-after-free when applying SVG effects (MFSA 2016-79) Mozilla: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2022:1628
Red Hat Security Advisory: web-admin-build security update
golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:storage:3.5:wa:el7" ]
null
7.5
null
null
RHBA-2022:7667
Red Hat Bug Fix Advisory: qatzip bug fix and enhancement update
qatzip: local privilege escalation
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
RHSA-2020:2062
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" ]
null
null
7.5
null
RHSA-2024:4427
Red Hat Security Advisory: fence-agents security update
jinja2: accepts keys containing non-attribute characters
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::highavailability", "cpe:/a:redhat:rhel_eus:9.2::resilientstorage" ]
null
5.4
null
null
RHSA-2023:6542
Red Hat Security Advisory: perl-HTTP-Tiny security update
http-tiny: insecure TLS cert default
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.8
null
null
RHSA-2019:4154
Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update
kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service kernel: use-after-free Read in vhost_transport_send_pkt kernel: Information leak in cdrom_ioctl_drive_status Kernel: KVM: OOB memory access via mmio ring buffer
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
7
null
RHSA-2024:8707
Red Hat Security Advisory: container-tools:rhel8 security update
buildah: Buildah allows arbitrary directory mount
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.8
null
null
RHSA-2022:7720
Red Hat Security Advisory: e2fsprogs security and bug fix update
e2fsprogs: out-of-bounds read/write via crafted filesystem
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.8
null
null
RHSA-2023:1888
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.3 security fixes and bug fixes
RHACM: unauthenticated SSRF in console API endpoint http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
[ "cpe:/a:redhat:acm:2.7::el8" ]
null
9.8
null
null
RHSA-2024:2936
Red Hat Security Advisory: go-toolset:rhel8 security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2011:0511
Red Hat Security Advisory: flash-plugin security update
flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2019:1650
Red Hat Security Advisory: qemu-kvm security update
QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
2.8
null
RHSA-2022:7053
Red Hat Security Advisory: OpenJDK 17.0.5 Security Update for Portable Linux Builds
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
[ "cpe:/a:redhat:openjdk:17" ]
null
3.7
null
null
RHSA-2023:3935
Red Hat Security Advisory: python3 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
7.5
null
null
RHSA-2021:0657
Red Hat Security Advisory: thunderbird security update
Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2022:7054
Red Hat Security Advisory: OpenJDK 11.0.17 Security Update for Portable Linux Builds
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
[ "cpe:/a:redhat:openjdk:11" ]
null
3.7
null
null
RHSA-2022:4816
Red Hat Security Advisory: container-tools:3.0 security update
psgo: Privilege escalation in 'podman top' podman: Default inheritable capabilities for linux container should be empty buildah: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
4.8
null
null
RHSA-2023:4449
Red Hat Security Advisory: .NET 6.0 security update
dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
8.1
null
null
RHSA-2020:3224
Red Hat Security Advisory: kernel security and bug fix update
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.1
null
null
RHSA-2022:2211
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in RDMA listen() kernel: cgroups v1 release_agent feature may allow privilege escalation
[ "cpe:/o:redhat:rhel_e4s:7.6::server" ]
null
7
null
null
RHSA-2024:1385
Red Hat Security Advisory: ovn23.06 security update
ovn: insufficient validation of BFD packets may lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
RHSA-2023:5728
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
5.3
null
null
RHSA-2020:0912
Red Hat Security Advisory: tomcat6 security update
tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
7.6
null
null
RHSA-2024:3846
Red Hat Security Advisory: python-idna security update
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null