id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:8037
|
Red Hat Security Advisory: OpenIPMI security update
|
openipmi: missing check on the authorization type on incoming LAN messages in IPMI simulator
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5 | null | null |
RHSA-2018:0020
|
Red Hat Security Advisory: kernel security update
|
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution bounds-check bypass hw: cpu: speculative execution permission faults handling
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | 5.5 | null |
RHSA-2019:3736
|
Red Hat Security Advisory: php:7.3 security update
|
php: underflow in env_path_info in fpm_main.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.1 | null |
RHSA-2021:0072
|
Red Hat Security Advisory: OpenShift Serverless 1.9.0 release and security update
|
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
|
[
"cpe:/a:redhat:serverless:1"
] | null | 7.5 | null | null |
RHSA-2012:1550
|
Red Hat Security Advisory: pki security update
|
System: Multiple cross-site scripting flaws by displaying CRL or processing profile pki-tps: Temporary denial of service on interrupted token format operations pki-tps: Connection reset when performing empty certificate search in TPS
|
[
"cpe:/a:redhat:certificate_system:8::el5"
] | null | null | null | null |
RHSA-2008:0971
|
Red Hat Security Advisory: net-snmp security update
|
net-snmp: numresponses calculation integer overflow in snmp_agent.c
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:2210
|
Red Hat Security Advisory: ksh security update
|
ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.4 | null | null |
RHSA-2017:1222
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer JDK: XML External Entity Injection (XXE) error when processing XML data OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520) OpenJDK: newline injection in the FTP client (Networking, 8170222) OpenJDK: MD5 allowed for jar verification (Security, 8171121) OpenJDK: newline injection in the SMTP client (Networking, 8171533)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 3.7 | null |
RHSA-2023:6615
|
Red Hat Security Advisory: python-cryptography security update
|
python-cryptography: memory corruption via immutable objects
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2024:2396
|
Red Hat Security Advisory: squashfs-tools security update
|
squashfs-tools: unvalidated filepaths allow writing outside of destination squashfs-tools: possible Directory Traversal via symbolic link
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.1 | null | null |
RHSA-2016:0722
|
Red Hat Security Advisory: openssl security update
|
OpenSSL: Fix memory issues in BIO_*printf functions openssl: EVP_EncodeUpdate overflow openssl: EVP_EncryptUpdate overflow openssl: Padding oracle in AES-NI CBC MAC check openssl: Memory corruption in the ASN.1 encoder openssl: ASN.1 BIO handling of large amounts of data openssl: doapr_outch function does not verify that certain memory allocation succeeds
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4 | null |
RHSA-2024:5065
|
Red Hat Security Advisory: kernel security update
|
kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling kernel: tcp: add sanity checks to rx zerocopy kernel: vfio/pci: Lock external INTx masking ops kernel: mptcp: fix data re-injection from stale subflow kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge kernel: tls: fix missing memory barrier in tls_init kernel: net/mlx5: Discard command completions in internal error
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.4 | null | null |
RHSA-2020:1003
|
Red Hat Security Advisory: mod_auth_mellon security and bug fix update
|
mod_auth_mellon: Open Redirect via the login?ReturnTo= substring which could facilitate information theft
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.1 | null |
RHSA-2023:0698
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.52 security update
|
go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2012:1591
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 update
|
httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled apache-cxf: Certain child policies of WS-SecurityPolicy 1.1 SupportingToken policy not applied on the client side apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token Mojarra: deployed web applications can read FacesContext from other applications under certain conditions httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled JBoss: Datasource connection manager returns valid connection for wrong credentials when using security-domains apache-cxf: SOAPAction spoofing on document literal web services AS: EJB authorization succeeds for any role when allowed roles list is empty JACC: Security constraints configured for EJBs are incorrectly interpreted and not applied
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2016:1473
|
Red Hat Security Advisory: openstack-neutron security and bug fix update
|
openstack-neutron: ICMPv6 source address spoofing vulnerability openstack-neutron: DHCP spoofing vulnerability openstack-neutron: MAC source address spoofing vulnerability
|
[
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 6.3 | null |
RHSA-2013:0689
|
Red Hat Security Advisory: bind security and bug fix update
|
bind: libdns regular expressions excessive resource consumption DoS
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5633
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update
|
nodejs-y18n: prototype pollution vulnerability kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters heketi: gluster-block volume password details available in logs golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash jwt-go: access restriction bypass vulnerability golang-github-gorilla-websocket: integer overflow leads to denial of service crewjam/saml: authentication bypass in saml authentication golang: math/big: panic during recursive division of very large numbers golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 5.3 | null | null |
RHSA-2022:1296
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.4 security update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j-core: remote code execution via JDBC Appender log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 8.8 | null | null |
RHSA-2021:5030
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) JDK: unspecified vulnerability fixed in 8u311 (Deployment) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) JDK: IllegalAccessError exception not thrown for MethodHandles that invoke inaccessible interface methods
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
RHSA-2023:7886
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.6 | null | null |
RHSA-2024:2368
|
Red Hat Security Advisory: mod_http2 security update
|
httpd: mod_http2: DoS in HTTP/2 with initial window size 0 mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:3537
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding containerd: Supplementary groups are not set up properly buildkit: Data disclosure in provenance attestation describing a build
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6.5 | null | null |
RHSA-2023:0759
|
Red Hat Security Advisory: Red Hat Virtualization security and bug fix update
|
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.5 | null | null |
RHSA-2025:0281
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:6866
|
Red Hat Security Advisory: jboss-amq-6-amq63-openshift-container security update
|
activemq-openwire: OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack
|
[
"cpe:/a:redhat:rhosemc:1.0::el7"
] | null | 9.8 | null | null |
RHSA-2015:2411
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: crypto api unprivileged arbitrary module load via request_module() kernel: memcg: OOM handling DoS kernel: partial ASLR bypass through TLS base addresses leak kernel: crypto api unprivileged arbitrary module load via request_module() Kernel: vfs: Do not allow escaping from bind mounts kernel: race condition between chown() and execve() kernel: pty layer race condition on tty ldisc shutdown. kernel: Creating multiple sockets when SCTP module isn't loaded leads to kernel panic kernel: Unauthorized access to IPC objects with SysV shm kernel: securelevel disabled after kexec
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2007:1037
|
Red Hat Security Advisory: openldap security and enhancement update
|
openldap slapd DoS via objectClasses attribute
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:5615
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.9 packages and security update
|
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
|
[
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 9.8 | null | null |
RHSA-2024:0771
|
Red Hat Security Advisory: squid:4 security update
|
squid: DoS against HTTP and HTTPS squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management squid: denial of service in HTTP request parsing
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2167
|
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update
|
Updates for rh-dotnet20-dotnet, rh-dotnet21-dotnet, rh-dotnetcore10-dotnetcore, and rh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact of Low.
|
[
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.0::el7",
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | null | null | null |
RHSA-2018:2881
|
Red Hat Security Advisory: firefox security update
|
Mozilla: type confusion in JavaScript Mozilla: stack out-of-bounds read in Array.prototype.push
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.8 | null |
RHSA-2013:1157
|
Red Hat Security Advisory: Red Hat CloudForms Management Engine security update
|
interface: Ruby code injection
|
[
"cpe:/a:redhat:cloudforms:2.0"
] | null | null | null | null |
RHSA-2020:3602
|
Red Hat Security Advisory: Ansible security and bug fix update (2.9.13)
|
ansible: dnf module install packages with no GPG signature
|
[
"cpe:/a:redhat:ansible_engine:2::el7",
"cpe:/a:redhat:ansible_engine:2::el8"
] | null | 6.3 | null | null |
RHSA-2013:1217
|
Red Hat Security Advisory: xml-security security update
|
Java: XML signature spoofing
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2023:5463
|
Red Hat Security Advisory: python3.11 security update
|
python: TLS handshake bypass
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.6 | null | null |
RHSA-2023:7034
|
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
|
python: tarfile module directory traversal python-requests: Unintended leak of Proxy-Authorization header
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.1 | null | null |
RHSA-2023:2041
|
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
|
keycloak: path traversal via double URL encoding spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow CXF: SSRF Vulnerability
|
[
"cpe:/a:redhat:migration_toolkit_applications:6.1::el8"
] | null | 9.8 | null | null |
RHSA-2019:0935
|
Red Hat Security Advisory: openstack-neutron security and bug fix update
|
openstack-neutron: incorrect validation of port settings in iptables security group driver openstack-neutron: DOS via broken port range merging in security group
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7.5 | null |
RHSA-2006:0604
|
Red Hat Security Advisory: ruby security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:3763
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.13.2 container image updates
|
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
|
[
"cpe:/a:redhat:acm:2.13::el9"
] | null | 7.5 | null | null |
RHSA-2018:2390
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: speculative bounds check bypass store kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: race condition in snd_seq_write() may lead to UAF or OOB-access kernel: kvm: vmx: host GDT limit corruption kernel: Race condition in sound system can lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.7 | null |
RHSA-2023:6107
|
Red Hat Security Advisory: Updated Kogito for Red Hat Process Automation Manager 7.13.4 SP1 Images
|
quarkus: HTTP security policy bypass
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2005:416
|
Red Hat Security Advisory: kdbg security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2014:2000
|
Red Hat Security Advisory: thermostat1-thermostat security update
|
thermostat: local JMX URL disclosure
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2023:5689
|
Red Hat Security Advisory: bind security update
|
bind: stack exhaustion in control channel code may lead to DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2024:11035
|
Red Hat Security Advisory: python3.12 security update
|
python: Virtual environment (venv) activation scripts don't quote paths python: Unbounded memory buffering in SelectorSocketTransport.writelines()
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 7.5 | null | null |
RHSA-2024:1882
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: tls: use-after-free with partial reads and async decrypt kernel: tls: handle backlogging of crypto requests kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 6.7 | null | null |
RHSA-2018:2143
|
Red Hat Security Advisory: Red Hat Decision Manager 7.0.1 bug fix and security update
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:7.0"
] | null | null | 8.1 | null |
RHSA-2013:0574
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution flaws (APSB13-08) flash-plugin: Firefox sandbox permissions issue (APSB13-08) flash-plugin: multiple code execution flaws (APSB13-08)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:0579
|
Red Hat Security Advisory: nodejs:10 security update
|
nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string nodejs: HTTP request smuggling using malformed Transfer-Encoding header nodejs: HTTP header values do not have trailing optional whitespace trimmed npm: Symlink reference outside of node_modules folder through the bin field upon installation npm: Arbitrary file write via constructed entry in the package.json bin field npm: Global node_modules Binary Overwrite
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.8 | null | null |
RHSA-2020:0593
|
Red Hat Security Advisory: systemd security update
|
systemd: line splitting via fgets() allows for state injection during daemon-reexec systemd: out-of-bounds read when parsing a crafted syslog message
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 4.3 | null |
RHSA-2002:191
|
Red Hat Security Advisory: gaim security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2023:4448
|
Red Hat Security Advisory: .NET 6.0 security update
|
dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 8.1 | null | null |
RHSA-2024:2517
|
Red Hat Security Advisory: wpa_supplicant security update
|
wpa_supplicant: potential authorization bypass
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2020:3587
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R17 security and bug fix update
|
hawtio: server side request forgery via initial /proxy/ substring of a URI apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default camel: server-side template injection and arbitrary file disclosure on templating components
|
[
"cpe:/a:redhat:jboss_amq:6.3"
] | null | 7.5 | 7.3 | null |
RHSA-2025:1985
|
Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.12
|
openssl: RFC7250 handshakes with unauthenticated servers don't abort as expected rubygem-rack: Possible Log Injection in Rack::CommonLogger
|
[
"cpe:/a:redhat:logging:5.9::el9"
] | null | 6.5 | null | null |
RHSA-2019:2973
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
|
wildfly-security-manager: security manager authorization bypass
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | null | 7.5 | null |
RHSA-2014:1636
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) OpenJDK: insufficient SharedArchiveFile checks (Hotspot, 8044269) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) OpenJDK: incorrect optimization of range checks in C2 compiler (Hotspot, 8022783) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) OpenJDK: StAX parser parameter entity XXE (JAXP, 8039533) OpenJDK: missing BootstrapMethods bounds check (Hotspot, 8041717) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846) OpenJDK: incorrect handling of zip entries with NUL in name (Libraries, 8048025)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:0039
|
Red Hat Security Advisory: microcode_ctl security update
|
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2021:0650
|
Red Hat Security Advisory: xterm security update
|
xterm: crash when processing combining characters
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 9.6 | null | null |
RHSA-2006:0619
|
Red Hat Security Advisory: httpd security update
|
httpd: Expect header XSS
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6744
|
Red Hat Security Advisory: samba security update
|
samba: smbd allows client access to unix domain sockets on the file system as root samba: SMB clients can truncate files with read-only permissions samba: "rpcecho" development server allows denial of service via sleep() call on AD DC
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2024:1061
|
Red Hat Security Advisory: Red Hat Satellite 6 security and bug fix update
|
satellite: Blind SSRF via Referer header mosquitto: memory leak leads to unresponsive broker mosquitto: memory leak leads to unresponsive broker foreman: World readable file containing secrets mosquitto: memory leak leads to unresponsive broker
|
[
"cpe:/a:redhat:satellite:6.13::el8",
"cpe:/a:redhat:satellite_capsule:6.13::el8",
"cpe:/a:redhat:satellite_maintenance:6.13::el8",
"cpe:/a:redhat:satellite_utils:6.13::el8"
] | null | 7.5 | null | null |
RHSA-2003:043
|
Red Hat Security Advisory: : : : Updated WindowMaker packages fix vulnerability in theme-loading
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2016:0095
|
Red Hat Security Advisory: redis security advisory
|
redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2022:7715
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: Incorrect server side include parsing can lead to XSS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.1 | null | null |
RHSA-2023:5195
|
Red Hat Security Advisory: frr security and bug fix update
|
frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2025:1733
|
Red Hat Security Advisory: libpq security update
|
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.1 | null | null |
RHSA-2022:5799
|
Red Hat Security Advisory: go-toolset and golang security and bug fix update
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2023:7545
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Extension scripts replace objects not belonging to the extension. postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2009:1672
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: SELinux and mmap_min_addr kernel: fs: pipe.c null pointer dereference
|
[
"cpe:/o:redhat:rhel_eus:5.2"
] | null | null | null | null |
RHSA-2020:5236
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:3324
|
Red Hat Security Advisory: pcp security, bug fix, and enhancement update
|
pcp: exposure of the redis server backend allows remote command execution via pmproxy
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2017:2596
|
Red Hat Security Advisory: rh-maven33-groovy security update
|
groovy: remote execution of untrusted code in class MethodClosure Groovy: Remote code execution via deserialization
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 9.6 | null |
RHSA-2005:413
|
Red Hat Security Advisory: ImageMagick security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:1087
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 update
|
tomcat: directory disclosure tomcat: Session fixation tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext()
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6"
] | null | null | 6.3 | null |
RHSA-2014:1620
|
Red Hat Security Advisory: java-1.7.0-openjdk security and bug fix update
|
OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) OpenJDK: incorrect optimization of range checks in C2 compiler (Hotspot, 8022783) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) OpenJDK: StAX parser parameter entity XXE (JAXP, 8039533) OpenJDK: missing BootstrapMethods bounds check (Hotspot, 8041717) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2018:3500
|
Red Hat Security Advisory: openvswitch security, bug fix, and enhancement update
|
openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
|
[
"cpe:/o:redhat:enterprise_linux:7::fastdatapath",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 4.9 | null |
RHSA-2020:5194
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.21 bug fix and security update
|
kubernetes: compromised node could escalate to cluster level privileges
|
[
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 6.4 | null | null |
RHBA-2019:0448
|
Red Hat Bug Fix Advisory: Red Hat OpenStack Platform 13.0 director Bug Fix Advisory
|
openstack-mistral: std.ssh action may disclose presence of arbitrary files
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 4.3 | null |
RHSA-2023:2234
|
Red Hat Security Advisory: sysstat security and bug fix update
|
sysstat: arithmetic overflow in allocate_structures() on 32 bit systems
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2022:4888
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2020:2784
|
Red Hat Security Advisory: httpd24-nghttp2 security update
|
nghttp2: overly large SETTINGS frames can lead to DoS
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2018:1233
|
Red Hat Security Advisory: OpenShift Container Platform 3.6 security and bug fix update
|
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
|
[
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 9.9 | null |
RHSA-2024:1919
|
Red Hat Security Advisory: sssd security update
|
sssd: Race condition during authorization leads to GPO policies functioning inconsistently
|
[
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.1 | null | null |
RHSA-2024:2891
|
Red Hat Security Advisory: httpd:2.4 security update
|
mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487) httpd: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3915
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.542 security update
|
kubernetes: Node disk DOS by writing to container /etc/hosts
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 5.5 | null | null |
RHSA-2020:1984
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 4.7 | null | null |
RHSA-2022:1552
|
Red Hat Security Advisory: vim security update
|
vim: use after free in utf_ptr2char
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2019:2566
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 4.4 | null |
RHSA-2012:1037
|
Red Hat Security Advisory: postgresql and postgresql84 security update
|
crypt(): DES encrypted password weakness postgresql: Ability of database owners to install procedural languages via CREATE LANGUAGE found unsafe (DoS)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:2645
|
Red Hat Security Advisory: openssh security update
|
openssh: the functions order_hostkeyalgs() and list_hostkey_types() leads to double-free vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2019:4082
|
Red Hat Security Advisory: OpenShift Container Platform 4.1 operator security update
|
openshift: Secret data written to pod logs when operator set at Debug level or higher
|
[
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 5.3 | null |
RHSA-2016:2702
|
Red Hat Security Advisory: policycoreutils security update
|
policycoreutils: SELinux sandbox escape via TIOCSTI ioctl
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.6 | null |
RHSA-2013:1133
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_rewrite allows terminal escape sequences to be written to the log file httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2005:325
|
Red Hat Security Advisory: kdelibs security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0652
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.27 security update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS prometheus/client_golang: Denial of service using InstrumentHandlerCounter
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2016:0701
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
JDK: buffer overflow vulnerability in the IBM JVM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2021:1578
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver kernel: possible out of bounds write in kbd_keycode of keyboard.c kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c kernel: DoS by corrupting mountpoint reference counter kernel: Integer overflow in Intel(R) Graphics Drivers kernel: Improper input validation in some Intel(R) Graphics Drivers kernel: Null pointer dereference in some Intel(R) Graphics Drivers kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c kernel: buffer uses out of index in ext3/4 filesystem kernel: Use After Free vulnerability in cgroup BPF component kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: incomplete permission checking for access to rbd devices kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow kernel: perf_event_parse_addr_filter memory kernel: use-after-free in kernel midi subsystem kernel: child process is able to access parent mm through hfi dev file handle kernel: slab-out-of-bounds read in fbcon kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations kernel: race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys, causing a use-after-free in con_shutdown(). kernel: netfilter: use-after-free in the packet processing context kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds kernel: integer overflow in ext4_es_cache_extent kernel: remote DoS in TIPC kernel module
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.