id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:1939
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.3 ose-machine-config-operator-container security update
|
machine-config-operator-container: mmap stressor makes the cluster unresponsive
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 6.5 | null | null |
RHSA-2004:591
|
Red Hat Security Advisory: squid security update
|
Squid SNMP DoS
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:1013
|
Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.2.1 security update
|
guava: local information disclosure via temporary directory created with unsafe permissions bouncycastle: Timing issue within the EC math library mysql-connector-java: unauthorized access to critical kubernetes-client: Insecure deserialization in unmarshalYaml method protobuf-java: potential DoS in the parsing procedure for binary data maven: Block repositories using http by default jersey: Local information disclosure via system temporary directory jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way xml-security: XPath Transform abuse allows for information disclosure cron-utils: template Injection leading to unauthenticated Remote Code Execution h2: Remote Code Execution in Console
|
[
"cpe:/a:redhat:camel_quarkus:2.2.1"
] | null | 9.8 | null | null |
RHSA-2019:3883
|
Red Hat Security Advisory: kernel security update
|
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 8.8 | null |
RHSA-2020:2664
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2023:7376
|
Red Hat Security Advisory: libqb security update
|
libqb: Buffer overflow in log_blackbox.c
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 7.2 | null | null |
RHSA-2017:2799
|
Red Hat Security Advisory: kernel security update
|
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
RHSA-2011:1321
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: gro: only reset frag0 when skb can be pulled
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:0876
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.1 update
|
keycloak: user deletion via incorrect permissions check wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage keycloak: timing attack in JWS signature verification
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.1"
] | null | null | 3.7 | null |
RHSA-2009:1123
|
Red Hat Security Advisory: gstreamer-plugins-good security update
|
gstreamer-plugins-good: PNG decoder integer overflow
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2012:1511
|
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.1 6-Month EOL Notice
|
This is the 6-Month notification of the End Of Life plans for Red Hat
Enterprise Linux Extended Update Support Add-On (EUS) 6.1.
|
[
"cpe:/o:redhat:rhel_eus:6.1"
] | null | null | null | null |
RHSA-2022:8932
|
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.26.0
|
golang: crash in a golang.org/x/crypto/ssh server
|
[
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2024:4243
|
Red Hat Security Advisory: python3 security update
|
python: The zipfile module is vulnerable to zip-bombs leading to denial of service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.2 | null | null |
RHSA-2009:1239
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: uninit op in SOCKOPS_WRAP() leads to privesc kernel: information leak in sigaltstack kernel: execve: must clear current->clear_child_tid
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2023:6679
|
Red Hat Security Advisory: curl security update
|
curl: TELNET option IAC injection curl: SFTP path ~ resolving discrepancy curl: GSS delegation too eager connection re-use curl: SSH connection too eager reuse still
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2025:1186
|
Red Hat Security Advisory: podman security update
|
podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.6 | null | null |
RHSA-2019:1258
|
Red Hat Security Advisory: rh-mariadb102-mariadb and rh-mariadb102-galera security and bug fix update
|
mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mariadb: Replication in sql/event_data_objects.cc occurs before ACL checks mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) mysql: InnoDB unspecified vulnerability (CPU Jan 2018) mysql: Server: DDL unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Client programs unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: MyISAM unspecified vulnerability (CPU Jul 2018) mysql: InnoDB unspecified vulnerability (CPU Jul 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) mysql: InnoDB unspecified vulnerability (CPU Jul 2018) mysql: Server: Options unspecified vulnerability (CPU Jul 2018) mysql: Client programs unspecified vulnerability (CPU Jul 2018) mysql: Server: Parser unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Init script calling kill with root privileges using pid from pidfile owned by mysql user (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Parser unspecified vulnerability (CPU Jan 2019) mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019) mysql: InnoDB unspecified vulnerability (CPU Jan 2019) mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) mysql: C API unspecified vulnerability (CPU Jul 2020)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | 4.9 | null |
RHSA-2023:6818
|
Red Hat Security Advisory: Satellite 6.14 security and bug fix update
|
kubeclient: kubeconfig parsing error can lead to MITM attacks openssl: c_rehash script allows command injection openssl: the c_rehash script allows command injection Pulp: Tokens stored in plaintext foreman: OS command injection via ct_command and fcct_command satellite: Blind SSRF via Referer header python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests rubygem-activerecord: Denial of Service rubygem-rack: denial of service in Content-Disposition parsing rubygem-rack: denial of service in Content-Disposition parsing rubygem-rack: denial of service in Content-Disposition parsing ruby-git: code injection vulnerability ruby-git: code injection vulnerability Foreman: Arbitrary code execution through templates Foreman: Stored cross-site scripting in host tab puppet: Puppet Server ReDoS rubygem-actionpack: Denial of Service in Action Dispatch rubygem-activerecord: SQL Injection rubygem-actionpack: Denial of Service in Action Dispatch rubygem-activesupport: Regular Expression Denial of Service rubygem-globalid: ReDoS vulnerability rubygem-rack: Denial of service in Multipart MIME parsing rubygem-rack: denial of service in header parsing golang: net/http: insufficient sanitization of Host header sqlparse: Parser contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) python-django: Potential bypass of validation when uploading multiple files using one form field python-requests: Unintended leak of Proxy-Authorization header python-django: Potential regular expression denial of service vulnerability in EmailValidator/URLValidator golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) GitPython: Insecure non-multi options in clone and clone_from is not blocked HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:satellite:6.14::el8",
"cpe:/a:redhat:satellite_capsule:6.14::el8",
"cpe:/a:redhat:satellite_maintenance:6.14::el8",
"cpe:/a:redhat:satellite_utils:6.14::el8"
] | null | 7.5 | null | null |
RHSA-2013:0276
|
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
|
libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks
|
[
"cpe:/a:redhat:storage:3:server:el6",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:8111
|
Red Hat Security Advisory: skopeo security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2002:124
|
Red Hat Security Advisory: xchat security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2015:1920
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: missing type checks in IIOPInputStream (CORBA, 8076392) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) OpenJDK: incomplete supportDTD enforcement (JAXP, 8130078)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHBA-2023:5653
|
Red Hat Bug Fix Advisory: Red Hat Ansible Automation Platform 2.4 Setup Bundle Release Update
|
platform: ec2_key module prints out the private key directly to the standard output
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9"
] | null | 7.3 | null | null |
RHSA-2009:1536
|
Red Hat Security Advisory: pidgin security update
|
Pidgin: Invalid pointer dereference (crash) after receiving contacts from SIM IM client
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2023:4065
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2022:5096
|
Red Hat Security Advisory: grub2, mokutil, shim, and shim-unsigned-x64 security update
|
grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling grub2: Crafted JPEG image can lead to buffer underflow write in the heap grub2: Integer underflow in grub_net_recv_ip4_packets grub2: Out-of-bound write when handling split HTTP headers grub2: shim_lock verifier allows non-kernel files to be loaded grub2: use-after-free in grub_cmd_chainloader() shim: Buffer overflow when loading crafted EFI images
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.3 | null | null |
RHSA-2020:1021
|
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
|
gnome-shell: partial lock screen bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2024:9615
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.23 bug fix and security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 5.9 | null | null |
RHSA-2018:0842
|
Red Hat Security Advisory: xdg-user-dirs security and bug fix update
|
gnome-session: Xsession creation of XDG user directories does not honor system umask policy
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2012:0810
|
Red Hat Security Advisory: busybox security and bug fix update
|
ncompress: .bss buffer underflow in decompression busybox: udhcpc insufficient checking of DHCP options
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:2622
|
Red Hat Security Advisory: openstack-nova security and bug fix update
|
openstack-nova: Nova server resource faults leak external exception details
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 6.5 | null |
RHSA-2022:8291
|
Red Hat Security Advisory: rsync security and bug fix update
|
zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2015:1833
|
Red Hat Security Advisory: qemu-kvm security update
|
Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:0561
|
Red Hat Security Advisory: Red Hat Enterprise Linux 5 One-Year Retirement Notice
|
This is the One-Year notification for the retirement of Red Hat Enterprise
Linux 5. This notification applies only to those customers subscribed to
the channel for Red Hat Enterprise Linux 5.
[Updated 19 April 2016]
This advisory has been updated with a corrected list of architectures
supported with the RHEL 5 Extended Life Cycle Support (ELS) Add-On.
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0601
|
Red Hat Security Advisory: bind security update
|
bind: malformed packet sent to rndc can trigger assertion failure bind: malformed signature records for DNAME records can trigger assertion failure
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2016:1432
|
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
|
tomcat: URL Normalization issue JGroups: Authorization bypass
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 9.8 | null |
RHSA-2024:4853
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.24 packages and security update
|
haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers go-retryablehttp: url might write sensitive information to log file
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 6 | null | null |
RHSA-2025:1721
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.1 | null | null |
RHSA-2024:3989
|
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
|
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() css-tools: Improper Input Validation causes Denial of Service via Regular Expression jetty: Improper addition of quotation marks to user inputs in CgiServlet axios: exposure of confidential data stored in cookies css-tools: regular expression denial of service (ReDoS) when parsing CSS io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx keycloak: path transversal in redirection validation io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file commons-compress: OutOfMemoryError unpacking broken Pack200 file follow-redirects: Possible credential leak commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator() commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree webpack-dev-middleware: lack of URL validation may lead to file leak
|
[
"cpe:/a:redhat:migration_toolkit_applications:6.2::el8",
"cpe:/a:redhat:migration_toolkit_applications:6.2::el9"
] | null | 7.4 | null | null |
RHSA-2021:0150
|
Red Hat Security Advisory: dnsmasq security update
|
dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2024:6313
|
Red Hat Security Advisory: kpatch-patch-5_14_0-284_52_1 and kpatch-patch-5_14_0-284_79_1 security update
|
kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
|
[
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.1 | null | null |
RHSA-2010:0143
|
Red Hat Security Advisory: cpio security update
|
cpio: Heap-based buffer overflow by expanding a specially-crafted archive
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:0741
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use after free bug in "quota" handling kernel: race condition with PTRACE_SETREGS
|
[
"cpe:/o:redhat:rhel_eus:6.2::server"
] | null | null | null | null |
RHSA-2021:3884
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 3.7 | null | null |
RHSA-2013:1860
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: dm: dm-snapshot data leak
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2002:132
|
Red Hat Security Advisory: : : : Updated util-linux package fixes password locking race
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2022:8900
|
Red Hat Security Advisory: grub2 security update
|
grub2: Integer underflow in grub_net_recv_ip4_packets
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2024:0232
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.4 | null | null |
RHSA-2013:0855
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
SSL/TLS: CBC padding timing attack (lucky-13) OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: remote code loading enabled by default (RMI, 8001040) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:4459
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.8 packages and security update
|
golang: net/http, net/textproto: denial of service from excessive memory allocation golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.3 | null | null |
RHSA-2021:0003
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2005:327
|
Red Hat Security Advisory: telnet security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:1743
|
Red Hat Security Advisory: postgresql:16 security update
|
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.1 | null | null |
RHSA-2023:0951
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2024:3927
|
Red Hat Security Advisory: Red Hat Ceph Storage 7.1 container image security, and bug fix update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) jinja2: HTML attribute injection when passing user input as keys to xmlattr filter
|
[
"cpe:/a:redhat:ceph_storage:7.1::el9"
] | null | 5.4 | null | null |
RHSA-2016:2094
|
Red Hat Security Advisory: bind97 security update
|
bind: assertion failure triggered by a packet with malformed options
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 7.5 | null |
RHSA-2003:028
|
Red Hat Security Advisory: pam security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2019:1580
|
Red Hat Security Advisory: virt:rhel security update
|
libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients libvirt: arbitrary command execution via virConnectGetDomainCapabilities API libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.8 | null |
RHSA-2021:4598
|
Red Hat Security Advisory: annobin security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.5 | null | null |
RHSA-2024:5143
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.18 Security update
|
undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 7.5 | null | null |
RHSA-2007:0876
|
Red Hat Security Advisory: tomcat security update
|
tomcat accept-language xss flaw tomcat examples jsp XSS tomcat host manager XSS tomcat handling of cookies tomcat handling of cookie values tomcat host manager xss
|
[
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
RHSA-2024:10929
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.20 Security update
|
undertow: information leakage via HTTP/2 request header reuse
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 0 | null | null |
RHSA-2024:3460
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: netfilter: nf_tables: disallow anonymous set with timeout flag kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: net: ip_tunnel: prevent perpetual headroom growth kernel: cifs: fix underflow in parse_server_interfaces() kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 5.5 | null | null |
RHSA-2020:2783
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.23 security update
|
EAP: Vault system property security attribute value is revealed on CLI 'reload' command tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | 7.6 | 5.4 | null |
RHSA-2014:1067
|
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
|
This is the 3-year notification of the target date to migrate systems from
Red Hat Network Classic Hosted to Red Hat Subscription Management. All
systems using Red Hat Network Classic Hosted must be migrated to Red Hat
Subscription Management.
|
[] | null | null | null | null |
RHSA-2013:0788
|
Red Hat Security Advisory: subscription-manager security update
|
subscription-manager: rhn-migrate-classic-to-rhsm missing SSL certificate verification
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5314
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.6 security and bug fix update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding distribution/distribution: DoS from malicious API request golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results containerd: Supplementary groups are not set up properly
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.1::el8"
] | null | 7.3 | null | null |
RHSA-2024:1004
|
Red Hat Security Advisory: edk2 security update
|
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2021:4116
|
Red Hat Security Advisory: firefox security update
|
Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2024:4549
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: OPVP device arbitrary code execution via custom Driver library
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null |
RHSA-2021:3982
|
Red Hat Security Advisory: rh-ruby30-ruby security update
|
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.4 | null | null |
RHSA-2020:1544
|
Red Hat Security Advisory: Ansible security and bug fix update (2.7.17)
|
ansible: insecure temporary directory when running become_user from become directive ansible: path injection on dest parameter in fetch module ansible: Extract-Zip function in win_unzip module does not check extracted path ansible: svn module leaks password when specified as a parameter ansible: secrets readable after ansible-vault edit ansible: Information disclosure issue in ldap_attr and ldap_entry modules Ansible: code injection when using ansible_facts as a subkey Ansible: modules which use files encrypted with vault are not properly cleaned up
|
[
"cpe:/a:redhat:ansible_engine:2.7::el7"
] | null | 5 | null | null |
RHSA-2018:1456
|
Red Hat Security Advisory: dhcp security update
|
dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script
|
[
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 7.5 | null |
RHSA-2015:1714
|
Red Hat Security Advisory: spice security update
|
spice: memory corruption in worker_update_monitors_config()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2005:007
|
Red Hat Security Advisory: unarj security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2020:0161
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.6 on RHEL 8 security update
|
hibernate-validator: safeHTML validator allows XSS jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig EAP: Vault system property security attribute value is revealed on CLI 'reload' command undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | null | 8.1 | null |
RHSA-2022:1291
|
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.21.1
|
spring-cloud-function: Remote code execution by malicious Spring Expression
|
[
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 9.8 | null | null |
RHSA-2023:1804
|
Red Hat Security Advisory: thunderbird security update
|
Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2020:4181
|
Red Hat Security Advisory: unbound security update
|
unbound: amplification of an incoming query into a large number of queries directed to a target unbound: infinite loop via malformed DNS answers received from upstream servers
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2023:5933
|
Red Hat Security Advisory: Openshift Secondary Scheduler Operator 1.1.3 security update
|
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift_secondary_scheduler:1.1::el8"
] | null | 7.5 | null | null |
RHSA-2022:8598
|
Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-1]
|
libksba: integer overflow may lead to remote code execution bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code expat: a use-after-free in the doContent function in xmlparse.c device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2024:4075
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
|
[
"cpe:/o:redhat:rhel_e4s:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2024:4543
|
Red Hat Security Advisory: git-lfs security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:4511
|
Red Hat Security Advisory: curl security and bug fix update
|
curl: Leak of authentication credentials in URL via automatic Referer curl: TELNET stack contents disclosure curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.1 | null | null |
RHSA-2020:1495
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free while running the nsDocShell destructor Mozilla: Use-after-free when handling a ReadableStream Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2022:4587
|
Red Hat Security Advisory: pcs security update
|
sinatra: path traversal possible outside of public_dir when serving static files
|
[
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 7.5 | null | null |
RHSA-2007:0892
|
Red Hat Security Advisory: krb5 security update
|
krb5 incomplete fix for CVE-2007-3999
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:3134
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 4.7 | null |
RHSA-2025:4030
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2023:3582
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.3 | null | null |
RHSA-2024:5239
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update
|
httpd: Encoding problem in mod_proxy httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: Security issues via backend applications whose response headers are malicious or exploitable httpd: NULL pointer dereference in mod_proxy httpd: Potential SSRF in mod_rewrite
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 7.4 | null | null |
RHSA-2023:4410
|
Red Hat Security Advisory: mod_auth_openidc:2.3 security update
|
cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2022:8915
|
Red Hat Security Advisory: Red Hat Certificate System 9.7 security update
|
pki-core: access to external entities when parsing XML can lead to XXE
|
[
"cpe:/a:redhat:certificate_system:9.7::el7"
] | null | 7.5 | null | null |
RHSA-2019:4096
|
Red Hat Security Advisory: OpenShift Container Platform 4.2 openshift-external-storage security update
|
kubernetes-csi: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 4.8 | null |
RHSA-2022:1975
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: avoid cyclic entity chains due to malformed USB descriptors kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c kernel: use-after-free in nouveau kernel module kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() kernel: possible use-after-free in bluetooth module kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks kernel: DoS in ccp_run_aes_gcm_cmd() function kernel: sctp: Invalid chunks may be used to remotely remove existing associations kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients kernel: stack information leak in infiniband RDMA kernel: possible leak or coruption of data residing on hugetlbfs kernel: security regression for CVE-2018-13405 kernel: fget: check that the fd still exists after getting a ref to it kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io kernel: Buffer overwrite in decode_nfs_fh function kernel: cgroup: Use open-time creds and namespace for migration perm checks kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write kernel: Heap buffer overflow in firedtv driver kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device kernel: use-after-free in the TEE subsystem kernel: information leak in the IPv6 implementation kernel: information leak in the IPv4 implementation kernel: dm: fix mempool NULL pointer race when completing IO kernel: tcp: fix page frag corruption on page fault kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce() kernel: mptcp: fix deadlock in __mptcp_push_pending() kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm hw: cpu: intel: Branch History Injection (BHI) hw: cpu: intel: Intra-Mode BTI kernel: Local denial of service in bond_ipsec_add_sa kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c kernel: information leak in copy_page_to_iter() in iov_iter.c kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize() kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats() kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() kernel: Copy_from_user on 64-bit versions may leak kernel information kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.9 | null | null |
RHSA-2025:2789
|
Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.5.0 release
|
golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect libxml2: Use-After-Free in libxml2 crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec krb5: overflow when calculating ulog block size libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
|
[
"cpe:/a:redhat:openshift_distributed_tracing:3.5::el8"
] | null | 7.8 | null | null |
RHSA-2024:10379
|
Red Hat Security Advisory: pam security update
|
pam: libpam: Libpam vulnerable to read hashed password pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2007:0060
|
Red Hat Security Advisory: samba security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:0980
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.5 security and bug fix update
|
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
|
[
"cpe:/a:redhat:acm:2.1::el8"
] | null | 7.5 | null | null |
RHSA-2024:7346
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.