id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:4310
Red Hat Security Advisory: OpenShift Container Platform 4.11.46 security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2016:2995
Red Hat Security Advisory: Red Hat Ceph Storage 1.3 security and bug fix update
ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request
[ "cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04" ]
null
null
6.5
null
RHSA-2012:0884
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
openssh: post-authentication resource exhaustion bug via GSSAPI
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2010:0459
Red Hat Security Advisory: openoffice.org security update
openoffice.org Execution of Python code when browsing macros
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2021:5006
Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.9] Async #1
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
9.8
null
null
RHSA-2020:5401
Red Hat Security Advisory: libpq security update
postgresql: Reconnection can downgrade connection security settings postgresql: psql's \gset allows overwriting specially treated variables
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2013:0925
Red Hat Security Advisory: rhev-guest-tools-iso security and bug fix update
rhevm: rhev agent service unquoted search path rhevm: spice service unquoted search path
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2015:0697
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB15-05 flash-plugin: multiple code execution issues fixed in APSB15-05 flash-plugin: multiple code execution issues fixed in APSB15-05 flash-plugin: multiple code execution issues fixed in APSB15-05 flash-plugin: multiple code execution issues fixed in APSB15-05 flash-plugin: cross-domain policy bypass (APSB15-05) flash-plugin: multiple code execution issues fixed in APSB15-05 flash-plugin: multiple code execution issues fixed in APSB15-05 flash-plugin: file upload restriction bypass (APSB15-05) flash-plugin: multiple code execution issues fixed in APSB15-05 flash-plugin: multiple code execution issues fixed in APSB15-05
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:1549
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.8
null
null
RHSA-2020:3836
Red Hat Security Advisory: kernel security update
kernel: Null pointer dereference in search_keyring
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
null
7.8
null
RHSA-2011:1245
Red Hat Security Advisory: httpd security update
httpd: multiple ranges DoS
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2015:2697
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2002:088
Red Hat Security Advisory: : Updated ethereal packages are available
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2020:5430
Red Hat Security Advisory: kernel security and bug fix update
kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c kernel: out of bounds write in i2c driver leads to local escalation of privilege kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: out-of-bounds write via crafted keycode table kernel: sg_write function lacks an sg_remove_request call in a certain failure case
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
6.7
7.8
null
RHBA-2019:3139
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
7.5
null
RHSA-2023:7484
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 9
keycloak: impersonation and lockout possible through incorrect handling of email trust bouncycastle: potential blind LDAP injection attack using a self-signed certificate HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
7.5
null
null
RHSA-2008:0908
Red Hat Security Advisory: thunderbird security update
Mozilla UTF-8 stack buffer overflow mozilla: nsXMLDocument:: OnChannelRedirect() same-origin violation Mozilla privilege escalation via XPCnativeWrapper pollution Mozilla privilege escalation via XPCnativeWrapper pollution Mozilla privilege escalation via XPCnativeWrapper pollution Mozilla layout engine crash Mozilla crashes with evidence of memory corruption Mozilla BOM characters stripped from JavaScript before execution Mozilla low surrogates stripped from JavaScript before execution resource: traversal vulnerability recource: bypass Thunderbird cancelled newsgrop messages
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2024:3618
Red Hat Security Advisory: kernel update
kernel: use after free in i2c kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() kernel: i2c: validate user data in compat ioctl kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send kernel: mtd: require write permissions for locking and badblock ioctls kernel: pid: take a reference when initializing `cad_pid` kernel: i2c: i801: Don't generate an interrupt on bus reset kernel: net: usb: fix memory leak in smsc75xx_bind kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc kernel: vt: fix memory overlapping when deleting chars in the buffer kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: uio: Fix use-after-free in uio_open kernel: pvrusb2: fix use after free on context disconnection kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors kernel: RDMA/siw: Fix connection failure handling kernel: platform/x86: think-lmi: Fix reference leak kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() kernel: wifi: rt2x00: restart beacon queue when hardware reset kernel: s390/ptrace: handle setting of fpc register correctly kernel: powerpc/lib: Validate size for vector operations kernel: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() kernel: Integer Overflow in raid5_cache_count kernel: untrusted VMM can trigger int80 syscall handling kernel: i2c: i801: Fix block process call transactions kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever kernel: wifi: iwlwifi: fix a memory corruption kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump kernel: netfilter: nf_tables: disallow anonymous set with timeout flag kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout kernel: xhci: handle isoc Babble and Buffer Overrun events properly kernel: hwmon: (coretemp) Fix out-of-bounds memory access kernel: wifi: iwlwifi: mvm: fix a crash when we run out of stations kernel: wifi: iwlwifi: fix double-free bug kernel: RDMA/qedr: Fix qedr_create_user_qp error flow kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter kernel: wifi: mac80211: fix race condition on enabling fast-xmit kernel: mptcp: fix double-free on socket dismantle kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq() kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak kernel: usb: ulpi: Fix debugfs directory leak kernel: USB: core: Fix deadlock in port "disable" sysfs attribute kernel: USB: core: Fix deadlock in usb_deauthorize_interface() kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma kernel: fat: fix uninitialized field in nostale filehandles kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() kernel: net/mlx5e: Prevent deadlock while disabling aRFS kernel: wifi: brcm80211: handle pmk_op allocation failure kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work kernel: wifi: iwlwifi: mvm: ensure offloading TID queue exists kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2015:1837
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: ui: vnc: heap memory corruption in vnc_refresh_server_surface
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2017:2390
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.3
null
RHSA-2003:175
Red Hat Security Advisory: : Updated gnupg packages fix validation bug
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2020:0863
Red Hat Security Advisory: OpenShift Container Platform 4.3.8 proglottis/gpgme security update
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
[ "cpe:/a:redhat:openshift:4.3::el7" ]
null
7.5
null
null
RHSA-2020:5341
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7" ]
null
7.5
null
null
RHSA-2023:4060
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.1
null
null
RHSA-2024:1409
Red Hat Security Advisory: cups security update
cups: heap buffer overflow may lead to DoS cups: use-after-free in cupsdAcceptClient() in scheduler/client.c
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.1
null
null
RHSA-2023:4293
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.11 security and bug fix update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: html/template: improper sanitization of CSS values golang-github-gin-gonic-gin: Improper Input Validation golang: html/template: improper handling of empty HTML attributes golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function
[ "cpe:/a:redhat:rhmt:1.7::el8" ]
null
4.3
null
null
RHSA-2011:1303
Red Hat Security Advisory: jbossws-common security update
JBossWS remote Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
null
null
RHSA-2009:0428
Red Hat Security Advisory: cups security update
cups: Integer overflow in the TIFF image filter
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:3233
Red Hat Security Advisory: libssh security update
libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname libssh: Missing checks for return values for digests
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
3.7
null
null
RHSA-2024:5479
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.3 Security update
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8" ]
null
7.5
null
null
RHSA-2023:5476
Red Hat Security Advisory: glibc security update
glibc: buffer overflow in ld.so leading to privilege escalation
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2020:5379
Red Hat Security Advisory: mariadb-galera security update
mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep
[ "cpe:/a:redhat:openstack:10::el7" ]
null
9
null
null
RHSA-2018:1231
Red Hat Security Advisory: OpenShift Container Platform 3.7 security and bug fix update
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
[ "cpe:/a:redhat:openshift:3.7::el7" ]
null
null
9.9
null
RHSA-2021:4679
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.2 security update
undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHSA-2005:357
Red Hat Security Advisory: gzip security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:0005
Red Hat Security Advisory: thunderbird security update
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2019:4075
Red Hat Security Advisory: OpenShift Container Platform 4.2 library-go security update
library-go: Secret data written to static pod logs when operator set at Debug level or higher
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
null
5.3
null
RHSA-2010:0755
Red Hat Security Advisory: cups security update
xpdf/poppler: ImageStream:: ImageStream integer overflow xpdf: uninitialized Gfx::parser pointer dereference
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:0227
Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.3.3)
nodejs-ua-parser-js: ReDoS via malicious User-Agent header log4j-core: remote code execution via JDBC Appender
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
6.6
null
null
RHSA-2022:9072
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2022:6522
Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update
dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion.
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
7.5
null
null
RHSA-2024:6137
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2017:2795
Red Hat Security Advisory: kernel security update
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2015:0863
Red Hat Security Advisory: glibc security and bug fix update
glibc: getaddrinfo() writes DNS queries to random file descriptors under high load glibc: buffer overflow in gethostbyname_r() and related functions with misaligned buffer
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:3487
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2025:1434
Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1, kpatch-patch-5_14_0-427_31_1, and kpatch-patch-5_14_0-427_44_1 security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
7.3
null
null
RHSA-2023:6828
Red Hat Security Advisory: ACS 4.1 enhancement update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:advanced_cluster_security:4.1::el8" ]
null
7.5
null
null
RHSA-2025:0777
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update
django: Potential denial-of-service in django.utils.html.strip_tags() jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method django: potential denial-of-service vulnerability in IPv6 validation
[ "cpe:/a:redhat:ansible_automation_platform:2.5::el8", "cpe:/a:redhat:ansible_automation_platform:2.5::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9" ]
null
5.8
null
null
RHSA-2013:1456
Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update
OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: java.lang.reflect.Method invoke() code execution JDK: java.lang.class code execution JDK: java.lang.ClassLoder defineClass() code execution OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) SSL/TLS: CBC padding timing attack (lucky-13) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: exclusive port binding (Networking, 7170730) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)
[ "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6" ]
null
null
null
null
RHSA-2022:2081
Red Hat Security Advisory: bluez security update
bluez: memory leak in the SDP protocol
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.3
null
null
RHSA-2023:5587
Red Hat Security Advisory: virt:rhel security update
NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2024:4583
Red Hat Security Advisory: kernel security update
kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg kernel: vt: fix memory overlapping when deleting chars in the buffer kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: nvme: fix reconnection fail due to reserved tag allocation kernel: net: ena: Fix incorrect descriptor free behavior kernel: netfilter: tproxy: bail out if IP has been disabled on the device kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). kernel: octeontx2-af: avoid off-by-one read from userspace kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 kernel: blk-cgroup: fix list corruption from resetting io stat
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.4
null
null
RHSA-2022:6872
Red Hat Security Advisory: kernel security update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
5.5
null
null
RHSA-2014:1764
Red Hat Security Advisory: wget security update
wget: FTP symlink arbitrary filesystem access
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHBA-2020:0062
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 image release advisory
golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling
[ "cpe:/a:redhat:openshift:4.3::el7", "cpe:/a:redhat:openshift:4.3::el8" ]
null
5.9
6.5
null
RHSA-2023:1402
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2024:2213
Red Hat Security Advisory: pcp security update
pcp: unsafe use of directories allows pcp to root privilege escalation
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6
null
null
RHSA-2023:7025
Red Hat Security Advisory: ruby:2.5 security update
ruby/cgi-gem: HTTP response splitting in CGI ruby: Buffer overrun in String-to-Float conversion ruby: ReDoS vulnerability in URI ruby: ReDoS vulnerability in Time
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2021:4213
Red Hat Security Advisory: php:7.4 security, bug fix, and enhancement update
php: Use of freed hash key in the phar_parse_zipfile function php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo php: NULL pointer dereference in SoapClient
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2017:2418
Red Hat Security Advisory: openvswitch security, bug fix, and enhancement update
openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function openvswitch: Invalid processing of a malicious OpenFlow role status message openvswitch: Buffer over-read while parsing malformed TCP, UDP and IPv6 packets openvswitch: Buffer over-read while parsing the group mod OpenFlow message
[ "cpe:/o:redhat:enterprise_linux:7::fastdatapath", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.6
null
RHSA-2011:0414
Red Hat Security Advisory: policycoreutils security update
policycoreutils: insecure temporary directory handling in seunshare
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2005:386
Red Hat Security Advisory: Mozilla security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2007:1069
Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server
tomcat multiple content-length header poisioning tomcat DoS tomcat directory listing issue tomcat directory traversal tomcat anonymous cipher issue tomcat handling of cookies tomcat handling of cookie values
[ "cpe:/a:redhat:network_satellite:4.0::el3", "cpe:/a:redhat:network_satellite:4.0::el4", "cpe:/a:redhat:network_satellite:4.1::el3", "cpe:/a:redhat:network_satellite:4.1::el4", "cpe:/a:redhat:network_satellite:4.2::el3", "cpe:/a:redhat:network_satellite:4.2::el4", "cpe:/a:redhat:network_satellite:5.0:el4" ]
null
null
null
null
RHSA-2021:2599
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: security bypass in certs/blacklist.c and certs/system_keyring.c kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
RHSA-2012:1417
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 1-Month EOL Notice
This is the 1-Month notification of the End Of Life plans for Red Hat Enterprise Linux Extended Update Support Add-On (EUS) 6.0.
[ "cpe:/o:redhat:rhel_eus:6.0" ]
null
null
null
null
RHSA-2023:4505
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
7.5
null
null
RHSA-2021:0681
Red Hat Security Advisory: podman security update
podman: container users permissions are not respected in privileged containers
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
7
null
null
RHSA-2010:0115
Red Hat Security Advisory: pidgin security update
pidgin MSN protocol plugin memory corruption pidgin: Finch XMPP MUC Crash pidgin: Smiley Denial of Service
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2023:6799
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2024:4256
Red Hat Security Advisory: less security update
less: missing quoting of shell metacharacters in LESSCLOSE handling less: OS command injection
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.6
null
null
RHSA-2009:1490
Red Hat Security Advisory: squirrelmail security update
squirrelmail: CSRF issues in all forms
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:0827
Red Hat Security Advisory: .NET Core 3.1 security and bugfix update
brotli: buffer overflow when input chunk is larger than 2GiB dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.3
null
null
RHSA-2011:1148
Red Hat Security Advisory: JBoss Communications Platform 5.1.1 update
JBoss Seam privilege escalation caused by EL interpolation in FacesMessages
[ "cpe:/a:redhat:jboss_communications_platform:5.1" ]
null
null
null
null
RHSA-2020:2047
Red Hat Security Advisory: thunderbird security update
usrsctp: Buffer overflow in AUTH chunk input validation Mozilla: Use-after-free during worker shutdown Mozilla: Arbitrary local file access with 'Copy as cURL' Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 Mozilla: Sender Email Address Spoofing using encoded Unicode characters
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
4.3
6.1
null
RHSA-2021:4489
Red Hat Security Advisory: rpm security, bug fix, and enhancement update
rpm: missing length checks in hdrblobInit()
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
3.1
null
null
RHSA-2020:3281
Red Hat Security Advisory: libvncserver security update
libvncserver: websocket decoding buffer overflow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2021:4722
Red Hat Security Advisory: OpenShift Virtualization 2.6.8 RPMs security and bug fix update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:container_native_virtualization:2.6::el7", "cpe:/a:redhat:container_native_virtualization:2.6::el8" ]
null
6.5
null
null
RHSA-2020:4436
Red Hat Security Advisory: gnome-software and fwupd security, bug fix, and enhancement update
fwupd: Possible bypass in signature verification
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.7
null
null
RHSA-2022:5047
Red Hat Security Advisory: .NET 6.0 on RHEL 7 security and bugfix update
dotnet: NuGet Credential leak due to loss of control of third party symbol server domain
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
5
null
null
RHSA-2014:0310
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:24.4) (MFSA 2014-15) Mozilla: Out of bounds read during WAV file decoding (MFSA 2014-17) Mozilla: SVG filters information disclosure through feDisplacementMap (MFSA 2014-28) Mozilla: Information disclosure through polygon rendering in MathML (MFSA 2014-26) Mozilla: Memory corruption in Cairo during PDF font rendering (MFSA 2014-27) Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29) Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29) Mozilla: Use-after-free in TypeObject (MFSA 2014-30) Mozilla: Out-of-bounds read/write through neutering ArrayBuffer objects (MFSA 2014-31) Mozilla: Out-of-bounds write through TypedArrayObject after neutering (MFSA 2014-32)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:2401
Red Hat Security Advisory: procps-ng security update
procps: Integer overflows leading to heap overflow in file2strvec
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
7.3
null
RHSA-2022:0925
Red Hat Security Advisory: kpatch-patch security update
kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7
null
null
RHSA-2014:0341
Red Hat Security Advisory: wireshark security update
wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33) wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36) wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37) wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38) wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33) wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36) wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37) wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38) wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599) wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541) wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39) wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41) wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45) wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49) wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50) wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933) wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52) wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079) wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66) wireshark: NFS dissector crash (wnpa-sec-2014-01) wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:3945
Red Hat Security Advisory: redis:6 security update
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2022:6502
Red Hat Security Advisory: openvswitch2.13 security update
dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
RHSA-2018:2092
Red Hat Security Advisory: patch security update
patch: Malicious patch files cause ed to execute arbitrary commands
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
7.8
null
RHSA-2023:2785
Red Hat Security Advisory: grafana-pcp security update
golang: net/http: handle server errors after sending GOAWAY
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2019:3933
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Security Release on RHEL 7
openssl: timing side channel attack in the DSA signature algorithm openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) httpd: mod_http2: DoS via slow, unneeded request bodies httpd: mod_session_cookie does not respect expiry time httpd: mod_http2: read-after-free on a string compare httpd: mod_http2: possible crash on late upgrade httpd: mod_auth_digest: access control bypass due to race condition HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service
[ "cpe:/a:redhat:jboss_core_services:1::el7" ]
null
null
7.5
null
RHSA-2023:7713
Red Hat Security Advisory: tracker-miners security update
tracker-miners: sandbox escape
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2024:11344
Red Hat Security Advisory: gstreamer1-plugins-base and gstreamer1-plugins-good security update
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer
[ "cpe:/o:redhat:rhel_els:7" ]
null
9.8
null
null
RHSA-2021:3218
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
undertow: buffer leak on incoming websocket PONG message may lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHSA-2015:1199
Red Hat Security Advisory: kernel security and bug fix update
kernel: pipe: iovec overrun leading to memory corruption Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2022:8976
Red Hat Security Advisory: 389-ds-base security update
389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database 389-ds-base: SIGSEGV in sync_repl
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
6.5
null
null
RHSA-2025:0656
Red Hat Security Advisory: OpenShift Container Platform 4.17.14 packages and security update
jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:openshift:4.17::el8", "cpe:/a:redhat:openshift:4.17::el9", "cpe:/a:redhat:openshift_ironic:4.17::el9" ]
null
6.3
null
null
RHSA-2015:0125
Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.7.0 update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix RESTEasy: XXE via parameter entities Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_web_framework:2.7.0" ]
null
null
4.8
null
RHSA-2024:2582
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: divide error in nft_limit_init kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
4.7
null
null
RHSA-2013:0710
Red Hat Security Advisory: puppet security update
Puppet: Directory /var/log/puppet is world readable Puppet: catalog request code execution Puppet: HTTP GET request catalog retrieval Puppet: SSL protocol downgrade Puppet: HTTP PUT report saving code execution vulnerability Puppet: default auth.conf allows authenticated node to submit a report for any other node
[ "cpe:/a:redhat:openstack:2::el6" ]
null
null
null
null
RHSA-2022:7191
Red Hat Security Advisory: device-mapper-multipath security update
device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7.8
null
null
RHSA-2022:4871
Red Hat Security Advisory: firefox security update
Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
9.8
6.1
null
RHSA-2024:1057
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
pygments: ReDoS in pygments python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument python-aiohttp: numerous issues in HTTP parser with header parsing aiohttp: HTTP request modification aiohttp: CRLF injection if user controls the HTTP method using aiohttp client pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex platform: Insecure websocket used when interacting with EDA server jinja2: HTML attribute injection when passing user input as keys to xmlattr filter Django: denial-of-service in ``intcomma`` template filter
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
7.5
null
null