id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2013:0122
Red Hat Security Advisory: tcl security and bug fix update
postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:2191
Red Hat Security Advisory: gzip security update
gzip: arbitrary-file-write vulnerability
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2023:0389
Red Hat Security Advisory: OpenJDK 17.0.6 Security Update for Portable Linux Builds
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:openjdk:17" ]
null
3.7
null
null
RHSA-2020:2430
Red Hat Security Advisory: kernel security and bug fix update
kernel: NULL pointer dereference due to KEYCTL_READ on negative key
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.5
null
RHSA-2023:1953
Red Hat Security Advisory: Logging Subsystem 5.6.5 - Red Hat OpenShift security update
rubygem-rack: denial of service in header parsing rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice
[ "cpe:/a:redhat:logging:5.6::el8" ]
null
6.1
null
null
RHSA-2009:0446
Red Hat Security Advisory: mod_jk security update
mod_jk: session information leak
[ "cpe:/a:redhat:rhel_application_stack:2" ]
null
null
null
null
RHSA-2022:8553
Red Hat Security Advisory: firefox security update
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
6.1
null
RHSA-2014:1906
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.1.9 security, bug fix, and enhancement update
OpenShift: /proc/net/tcp information disclosure Enterprise: gears fail to properly isolate network traffic
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2022:0860
Red Hat Security Advisory: OpenShift Container Platform 4.9.25 security update
CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter
[ "cpe:/a:redhat:openshift:4.9::el7", "cpe:/a:redhat:openshift:4.9::el8" ]
null
8.8
null
null
RHSA-2023:4539
Red Hat Security Advisory: postgresql:10 security update
postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining.
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.2
null
null
RHSA-2020:3944
Red Hat Security Advisory: unoconv security update
unoconv: mishandling of pathname leads to SSRF and local file inclusion
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2014:0196
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple flaws lead to arbitrary code execution (APSB14-07) flash-plugin: multiple flaws lead to arbitrary code execution (APSB14-07) flash-plugin: multiple flaws lead to arbitrary code execution (APSB14-07)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2014:1873
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: qemu: out-of-bounds read access in qemuDomainGetBlockIoTune() due to invalid index libvirt: domain_conf: domain deadlock DoS libvirt: dumpxml: information leak with migratable flag
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2013:1436
Red Hat Security Advisory: kernel security and bug fix update
Kernel: net: panic while pushing pending data out of a IPv6 socket with UDP_CORK enabled kernel: dm: dm-snapshot data leak
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2010:0122
Red Hat Security Advisory: sudo security update
sudo: sudoedit option can possibly allow for arbitrary code execution sudo: Fails to reset group permissions if runas_default set
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2229
Red Hat Security Advisory: spice-gtk security and bug fix update
spice-client: Insufficient encoding checks for LZ can cause different integer/buffer overflows
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.6
null
RHSA-2018:2071
Red Hat Security Advisory: Red Hat Virtualization Manager security, bug fix, and enhancement update
ovirt-engine-setup: unfiltered db password in engine-backup log ovirt-engine: Unfiltered password when choosing manual db provisioning
[ "cpe:/a:redhat:rhev_manager:4.2" ]
null
null
5
null
RHSA-2022:8431
Red Hat Security Advisory: podman security, bug fix, and enhancement update
podman: possible information disclosure and modification buildah: possible information disclosure and modification
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.1
null
null
RHSA-2013:1376
Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 Advanced Mission Critical 6-month Notice
This is the 6-month notification for the retirement of Red Hat Enterprise Linux 5.3 Advanced Mission Critical (AMC).
[ "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2009:1066
Red Hat Security Advisory: squirrelmail security update
SquirrelMail: Multiple cross site scripting issues SquirrelMail: Server-side code injection in map_yp_alias username map SquirrelMail: CSS positioning vulnerability
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:3981
Red Hat Security Advisory: 389-ds-base security and bug fix update
389-ds-base: Read permission check bypass via the deref plugin
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2002:136
Red Hat Security Advisory: mod_ssl security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2020:2475
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux 7 security update
dotnet: Denial of service via untrusted input
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
7.5
null
null
RHSA-2023:0466
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
ArgoCD: JWT audience claim is not verified
[ "cpe:/a:redhat:openshift_gitops:1.6::el8" ]
null
8.8
null
null
RHSA-2020:1936
Red Hat Security Advisory: OpenShift Container Platform 4.4.3 haproxy security update
haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
[ "cpe:/a:redhat:openshift:4.4::el7", "cpe:/a:redhat:openshift:4.4::el8" ]
null
8.8
5.9
null
RHSA-2017:3403
Red Hat Security Advisory: rh-postgresql94-postgresql security update
postgresql: Start scripts permit database administrator to modify root-owned files postgresql: Start scripts permit database administrator to modify root-owned files
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
6.5
null
RHSA-2020:4654
Red Hat Security Advisory: python27:2.7 security update
python: infinite loop in the tarfile module via crafted TAR archive python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
RHSA-2021:4361
Red Hat Security Advisory: NetworkManager security, bug fix, and enhancement update
systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.1
null
null
RHSA-2007:0073
Red Hat Security Advisory: java-1.5.0-ibm security update
openssl signature forgery security flaw security flaw security flaw security flaw
[ "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2020:1496
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free while running the nsDocShell destructor Mozilla: Use-after-free when handling a ReadableStream Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
9.8
null
null
RHSA-2019:1421
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.2 on RHEL 8 security update
picketlink: reflected XSS in SAMLRequest via RelayState parameter picketlink: URL injection via xinclude parameter undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" ]
null
null
5.3
null
RHSA-2024:1197
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
5.9
null
null
RHSA-2023:3349
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2024:5871
Red Hat Security Advisory: bind security update
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.5
null
null
RHSA-2005:021
Red Hat Security Advisory: kdegraphics security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:4731
Red Hat Security Advisory: OpenShift Container Platform 4.13.10 security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2024:10179
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.8 bug fixes and container updates
elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
[ "cpe:/a:redhat:multicluster_engine:2.3::el8" ]
null
8.2
null
null
RHSA-2022:5542
Red Hat Security Advisory: squid security update
squid: DoS when processing gopher server responses
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2020:0481
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R15 security and bug fix update
jquery: Cross-site scripting via cross-domain ajax requests infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods
[ "cpe:/a:redhat:jboss_fuse:6.3" ]
null
null
7.5
null
RHSA-2024:7785
Red Hat Security Advisory: python-gevent security update
python-gevent: privilege escalation via a crafted script to the WSGIServer component
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
9.1
null
null
RHSA-2012:0370
Red Hat Security Advisory: xen security and bug fix update
qemu: e1000: process_tx_desc legacy mode packets heap overflow
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:1355
Red Hat Security Advisory: kernel-rt security and bug fix update
Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7.8
null
RHSA-2019:3755
Red Hat Security Advisory: sudo security update
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7
null
RHSA-2011:0838
Red Hat Security Advisory: gimp security update
Gimp: Integer overflow in the BMP image file plugin Gimp: Stack-based buffer overflow in Lighting plug-in Gimp: Stack-based buffer overflow in SphereDesigner plug-in Gimp: Stack-based buffer overflow in Gfig plug-in Gimp: Heap-based buffer overflow in Paint Shop Pro (PSP) plug-in Gimp: Integer overflow in the PCX image file plug-in
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:4005
Red Hat Security Advisory: libxslt security update
libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
6.3
null
RHSA-2020:2443
Red Hat Security Advisory: OpenShift Container Platform 4.3.25 containernetworking-plugins security update
containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters
[ "cpe:/a:redhat:openshift:4.3::el7", "cpe:/a:redhat:openshift:4.3::el8" ]
null
6
null
null
RHSA-2020:4026
Red Hat Security Advisory: mariadb security and bug fix update
mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.2
4.9
null
RHSA-2025:3454
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.3 release and security update
tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8", "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9" ]
null
8.6
null
null
RHSA-2024:9315
Red Hat Security Advisory: kernel security update
kernel: use after free in i2c kernel: bluetooth: BR/EDR Bluetooth Impersonation Attacks (BIAS) kernel: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations kernel: asix: fix uninit-value in asix_mdio_read() kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field kernel: powerpc/64s: fix program check interrupt emergency stack path kernel: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI kernel: lib/generic-radix-tree.c: Don't overflow in peek() kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible() kernel: usbnet: sanity check for maxpacket kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells kernel: aio: fix use-after-free due to missing POLLFREE handling kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes() kernel: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR kernel: vt_ioctl: fix array_index_nospec in vt_setactivate kernel: bpf: Fix crash due to out of bounds access into reg2btf_ids. kernel: mmc: core: use sysfs_emit() instead of sprintf() kernel: vduse: Fix NULL pointer dereference on sysfs access kernel: x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails kernel: pvrusb2: fix use after free on context disconnection kernel: powerpc: Fix access beyond end of drmem array kernel: iommu: Don't reserve 0-length IOVA region kernel: bpf: fix check for attempt to corrupt spilled pointer kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c kernel: out-of-bounds read in pci_dev_for_each_resource() kernel: null pointer dereference in of_syscon_register() kernel: NULL pointer dereference in zone registration error path kernel: use-after-free in powermate_config_complete kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors kernel: x86/srso: Add SRSO mitigation for Hygon processors kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling kernel: dmaengine: fix NULL pointer in channel unregistration function kernel: PM: sleep: Fix possible deadlocks in core system-wide PM code kernel: ring-buffer: Do not attempt to read past "commit" kernel: RDMA/siw: Fix connection failure handling kernel: platform/x86: think-lmi: Fix reference leak kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() kernel: wifi: rt2x00: restart beacon queue when hardware reset kernel: powerpc/lib: Validate size for vector operations kernel: PM / devfreq: Fix buffer overflow in trans_stat_show kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng kernel: pstore/ram: Fix crash when setting number of cpus to an odd number kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers kernel: ext4: avoid online resizing failures due to oversized flex bg kernel: drm/amd/display: Wake DMCUB before executing GPINT commands kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface kernel: drm/amdkfd: lock dependency warning with srcu kernel: drm/amd/display: Fix disable_otg_wa logic kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] kernel: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) kernel: iio: core: fix memleak in iio_device_register_sysfs kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state kernel: drm/vkms: Avoid reading beyond LUT array kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node kernel: io_uring: drop any code related to SCM_RIGHTS kernel: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type kernel: drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node kernel: ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe() kernel: net: atlantic: eliminate double free in error handling logic kernel: ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put() kernel: bpf: Guard stack limits against 32bit overflow kernel: of: Fix double free in of_parse_phandle_with_args_map kernel: ALSA: scarlett2: Add missing error checks to *_ctl_get() kernel: ACPI: LPIT: Avoid u32 multiplication overflow kernel: powerpc/powernv: Add a null pointer check in opal_event_init() kernel: ALSA: scarlett2: Add missing mutex lock around get meter levels kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one() kernel: powerpc/powernv: Add a null pointer check in opal_powercap_init() kernel: ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL kernel: calipso: fix memory leak in netlbl_calipso_add_pass() kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path kernel: mmc: sdio: fix possible resource leaks in some error paths kernel: fbdev: Fix invalid page access after closing deferred I/O devices kernel: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch kernel: spi: Fix null dereference on suspend kernel: smb: client: fix use-after-free in smb2_query_info_compound() kernel: pwm: Fix double shift bug kernel: smb: client: fix potential deadlock when releasing mids kernel: i2c: dev: copy userspace array safely kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size kernel: net/smc: avoid data corruption caused by decline kernel: bonding: stop the device in bond_setup_by_slave() kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls kernel: i2c: core: Run atomic i2c xfer when !preemptible kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET kernel: drm/amdgpu: Fix potential null pointer derefernce kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga kernel: cpu/hotplug: Don't offline the last non-isolated CPU kernel: Bluetooth: btusb: Add date->evt_skb is NULL check kernel: atl1c: Work around the DMA RX overflow issue kernel: nbd: fix uaf in nbd_open kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() kernel: perf: hisi: Fix use-after-free when register pmu fails kernel: drm/radeon: possible buffer overflow kernel: pstore/platform: Add check for kstrdup kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds kernel: nommu: fix memory leak in do_mmap() error path kernel: mm/khugepaged: fix ->anon_vma race kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() kernel: stack overflow problem in Open vSwitch kernel module leading to DoS kernel: NULL Pointer dereference bluetooth allows Overflow Buffers kernel: Integer Overflow in raid5_cache_count kernel: use-after-free in cec_queue_msg_fh kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function kernel: bluetooth: race condition in sniff_{min,max}_interval_set() kernel: crash due to a missing check for leb_size kernel: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS kernel: bpf: Fix re-attachment branch in bpf_tracing_prog_attach kernel: ext4: regenerate buddy after block freeing failed if under fc replay kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever kernel: PCI/ASPM: Fix deadlock when enabling ASPM kernel: xsk: fix usage of multi-buffer BPF helpers for ZC XDP kernel: netfs, fscache: Prevent Oops in fscache_put_cache() kernel: tcp: make sure init the accept_queue's spinlocks once hw: arm64/sme: Always exit sme_alloc() early with existing storage kernel: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work kernel: nbd: always initialize struct msghdr completely kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() kernel: tracing: Ensure visibility when inserting an element into tracing_map kernel: thermal: intel: hfi: Add syscore callbacks for system-wide PM kernel: p2sb_bar() calls during PCI device probe kernel: drm/amdgpu: use-after-free vulnerability kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301 kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()' kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() kernel: hwmon: (coretemp) Fix out-of-bounds memory access kernel: net/sched: flower: Fix chain template offload kernel: arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' kernel: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups kernel: ppp_async: limit MRU to 64K kernel: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section kernel: inet: read sk->sk_family once in inet_recv_error() kernel: net: atlantic: Fix DMA mapping for PTP hwts ring kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: KVM: arm64: Fix circular locking dependency kernel: drm/amd/display: Fix MST Null Ptr for RV kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() kernel: mptcp: really cope with fastopen race kernel: powerpc/kasan: Fix addr error caused by page alignment kernel: HID: i2c-hid-of: fix NULL-deref on failed power up kernel: nouveau: offload fence uevents work to workqueue kernel: dpll: fix possible deadlock during netlink dump operation kernel: arp: Prevent overflow in arp_req_get(). kernel: devlink: fix possible use-after-free and memory leaks in devlink_init() kernel: net/sched: act_mirred: use the backlog for mirred ingress kernel: RDMA/qedr: Fix qedr_create_user_qp error flow kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter kernel: dmaengine: idxd: Ensure safe user copy of completion record kernel: md: Don't ignore read-only array in md_check_recovery() kernel: md: Don't ignore suspended array in md_check_recovery() kernel: mm/swap: fix race when skipping swapcache kernel: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window kernel: drm/amd/display: fixed integer types and null check locations kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt kernel: mptcp: fix double-free on socket dismantle kernel: iommufd: Fix protection fault in iommufd_test_syz_conv_iova kernel: iommufd: Fix iopt_access_list_id overwrite bug kernel: net: veth: clear GRO when clearing XDP even when down kernel: vfio/pci: Create persistent INTx handler kernel: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check kernel: netfilter: nf_tables: set dormant flag on hook register failure kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload kernel: RDMA/irdma: Fix KASAN issue with tasklet kernel: cachefiles: fix memory leak in cachefiles_add_cache() kernel: efi: runtime: Fix potential overflow of soft-reserved region size kernel: nvme-fc: do not wait in vain when unloading module kernel: geneve: make sure to pull inner header in geneve_rx() kernel: wireguard: receive: annotate data-race around receiving_counter.counter kernel: packet: annotate data-races around ignore_outgoing kernel: hsr: Fix uninit-value access in hsr_get_node() kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup kernel: quota: Fix potential NULL pointer dereference kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() kernel: Bluetooth: hci_core: Fix possible buffer overflow kernel: Bluetooth: btrtl: fix out of bounds memory access kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq() kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() kernel: block: fix deadlock between bd_link_disk_holder and partition scan kernel: md: fix kmemleak of rdev->serial kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit kernel: tracing/trigger: Fix to return error if failed to alloc snapshot kernel: inet: inet_defrag: prevent sk release while still in use kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly kernel: netfilter: nft_set_pipapo: do not free live element kernel: ASoC: SOF: Add some bounds checking to firmware data kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show() kernel: USB: core: Fix deadlock in port "disable" sysfs attribute kernel: USB: core: Fix deadlock in usb_deauthorize_interface() kernel: drm/i915/gt: Reset queue_priority_hint on parking kernel: drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() kernel: drm/i915/vma: Fix UAF on destroy against retire race kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed kernel: wireguard: netlink: access device through ctx instead of peer kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list kernel: net: esp: fix bad handling of pages from page_pool kernel: nfs: fix UAF in direct writes kernel: mm: swap: fix race between free_swap_and_cache() and swapoff() kernel: dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma kernel: fat: fix uninitialized field in nostale filehandles kernel: powercap: intel_rapl: Fix a NULL pointer dereference kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed kernel: nouveau: fix instmem race condition around ptr stores kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled kernel: init/main.c: Fix potential static_command_line memory overflow kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save() kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status kernel: KVM: x86/pmu: Disable support for adaptive PEBS kernel: clk: Get runtime PM before walking tree for clk_summary kernel: clk: Get runtime PM before walking tree during disable_unused kernel: net/sched: Fix mirred deadlock on device recursion kernel: netfilter: nf_tables: fix memleak in map from abort path kernel: netfilter: nf_tables: restore set elements when delete set fails kernel: tun: limit printing rate when illegal packet received by tun dev kernel: net/mlx5e: Prevent deadlock while disabling aRFS kernel: netfilter: flowtable: incorrect pppoe tuple kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump kernel: md: Fix missing release of 'active_io' for flush kernel: nbd: null check for nla_nest_start kernel: clk: Fix clk_core_get NULL dereference kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' kernel: wifi: brcm80211: handle pmk_op allocation failure kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend kernel: nouveau: lock the client object tree. kernel: iommu/vt-d: Fix NULL domain on device release kernel: pstore: inode: Only d_invalidate() is needed kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit kernel: mptcp: fix data races on remote_id kernel: wifi: nl80211: reject iftype change with mesh ID change kernel: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back kernel: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found. kernel: vfio/pci: Disable auto-enable of exclusive INTx IRQ kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline kernel: md/md-bitmap: fix incorrect usage for sb_index kernel: dm-raid: really frozen sync_thread during suspend kernel: drm/amdgpu: fix deadlock while reading mqd from debugfs kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD kernel: dm snapshot: fix lockup in dm_exception_table_exit kernel: ext4: fix corruption during on-line resize kernel: md/dm-raid: don't call md_reap_sync_thread() directly kernel: PCI/PM: Drain runtime-idle callbacks before driver removal kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory kernel: usb: cdc-wdm: close race between read and workqueue kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag kernel: usb: udc: remove warning when queue disabled ep kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume kernel: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() kernel: io_uring: Fix release of pinned pages when __io_uaddr_map fails kernel: net/mlx5e: fix a double-free in arfs_create_groups kernel: wifi: mac80211: fix potential sta-link leak kernel: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() kernel: iommu/vt-d: Use device rbtree in iopf reporting path kernel: irqchip/gic-v3-its: Prevent double free on error kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update kernel: block: fix module reference leakage from bdev_open_by_dev error path kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted() kernel: smb: client: fix potential UAF in is_valid_oplock_break() kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break() kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break() kernel: smb: client: fix potential UAF in cifs_dump_full_key() kernel: smb: client: fix potential UAF in cifs_stats_proc_show() kernel: smb: client: guarantee refcounted children from parent session kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() kernel: x86/mm/pat: fix VM_PAT handling in COW mappings kernel: of: module: prevent NULL pointer dereference in vsnprintf() kernel: io_uring/kbuf: hold io_buffer_list reference over mmap kernel: ipv6: Fix infinite recursion in fib6_dump_done(). kernel: erspan: make sure erspan_base_hdr is present in skb->head kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() kernel: mptcp: prevent BPF accessing lowat from a subflow socket. kernel: netfilter: nf_tables: reject new basechain after table flag update kernel: selinux: avoid dereference of garbage after mount failure kernel: bpf: Protect against int overflow for stack access size kernel: tls: get psock ref after taking rxlock to avoid leak kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks kernel: wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF kernel: randomize_kstack: Improve entropy diffusion kernel: io_uring: clear opcode specific data for an early failure kernel: usb: typec: ucsi: Limit read size on v1.2 kernel: block: prevent division by zero in blk_rq_stat_sum() kernel: drm: Check output polling initialized before disabling kernel: drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB kernel: dma-direct: Leak pages on dma_set_decrypted() failure kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() kernel: wifi: rtw89: fix null pointer access when abort scan kernel: dyndbg: fix old BUG_ON in >control parser kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex kernel: drm/ast: Fix soft lockup kernel: scsi: sg: Avoid sg device teardown race kernel: iommu/vt-d: Fix WARN_ON in iommu probe path kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow kernel: geneve: fix header validation in geneve[6]_xmit_skb kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING kernel: raid1: fix use-after-free for original bio in raid1_write_request() kernel: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS kernel: dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses kernel: dpll: fix dpll_pin_on_pin_register() for multiple parent pins kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage kernel: igb: Fix string truncation warnings in igb_set_fw_version kernel: ppdev: Add an error check in register_device kernel: drm/amdgpu: Init zone device and drm client after mode-1 reset on reload kernel: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio() kernel: octeontx2-af: fix the double free in rvu_npc_freemem() kernel: keys: Fix overwrite of key expiration on instantiation kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer kernel: mm/userfaultfd: reset ptes when close() for wr-protected ones kernel: mm: use memalloc_nofs_save() in page_cache_ra_order() kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault() kernel: drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference kernel: USB: core: Fix access violation during port device removal kernel: ipv6: prevent NULL dereference in ip6_output() kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets kernel: block: fix overflow in blk_ioctl_discard() kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE kernel: ipv4: Fix uninit-value access in __ip_make_skb() kernel: s390/qeth: Fix kernel panic after setting hsuid kernel: spi: fix null pointer dereference within spi_sync kernel: thermal/debugfs: Prevent use-after-free from occurring after cdev removal kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). kernel: efi/unaccepted: touch soft lockup during memory accept kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). kernel: pinctrl: core: delete incorrect free in pinctrl_enable() kernel: Reapply "drm/qxl: simplify qxl_fence_wait" kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route() kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() kernel: thermal/debugfs: Free all thermal zone debug memory on zone removal kernel: drm/vmwgfx: Fix invalid reads in fence signaled events kernel: thermal/debugfs: Fix two locking issues with thermal zone debug kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode() kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup kernel: net/mlx5: Discard command completions in internal error kernel: drm/amdgpu/mes: fix use-after-free issue kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg kernel: md: fix resync softlockup when bitmap size is less than array size kernel: ALSA: Fix deadlocks with kctl removals at disconnection kernel: block: refine the EOF check in blkdev_iomap_begin kernel: ALSA: core: Fix NULL module pointer assignment at card init kernel: ALSA: timer: Set lower bound of start tick time kernel: stm class: Fix a double free in stm_register_device() kernel: dmaengine: idxd: Avoid unnecessary destruction of file_ida kernel: vfio/pci: fix potential memory leak in vfio_intx_enable() kernel: soundwire: cadence: fix invalid PDI offset kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() kernel: mm/memory-failure: fix handling of dissolved but not taken off from buddy pages kernel: drm/amdgpu: add error handle to avoid out-of-bounds kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension kernel: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL kernel: drm/i915/hwmon: Get rid of devm kernel: drm/drm_file: Fix pid refcounting race kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY kernel: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() kernel: drivers: core: synchronize really_probe() and dev_uevent() kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type kernel: net: hns3: fix kernel crash problem in concurrent scenario kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps kernel: net/mlx5: Always stop health timer during driver removal kernel: ionic: fix kernel panic in XDP_TX action kernel: cachefiles: defer exposing anon_fd until after copy_to_user() succeeds kernel: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() kernel: io_uring/rsrc: don't lock while !TASK_RUNNING kernel: vmxnet3: disable rx data ring on dma allocation failure kernel: drm/i915/dpt: Make DPT object unshrinkable kernel: block: fix request.queuelist usage in flush kernel: wifi: cfg80211: validate HE operation element parsing kernel: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail kernel: iommu: Return right value in iommu_sva_bind_device() kernel: mm/page_table_check: fix crash on ZONE_DEVICE kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer kernel: tty: add the option to have a tty reject a new ldisc kernel: serial: imx: Introduce timeout when waiting on transmitter empty kernel: drm/radeon: fix UBSAN warning in kv_dpm.c kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit kernel: io_uring/sqpoll: work around a potential audit memory leak kernel: tcp: avoid too many retransmit packets kernel: drm/amdgpu: change vm->task_info handling kernel: filelock: Remove locks reliably when fcntl/close race is detected kernel: filelock: Fix fcntl/close race recovery compat path kernel: mm: vmalloc: check if a hash-index is in cpu_possible_mask kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers kernel: firmware: cs_dsp: Fix overflow checking of wmfw header kernel: netfilter: nf_tables: prefer nft_chain_validate kernel: filelock: fix potential use-after-free in posix_lock_inode kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files kernel: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() kernel: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() kernel: drm/radeon: check bo_va->bo is non-NULL before using it kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace kernel: null_blk: fix validation of block size kernel: nvmet: always initialize cqe.result kernel: nvme-fabrics: use reserved tag for reg read/write command kernel: cxl/region: Avoid null pointer dereference in region lookup kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers kernel: drm/amdgpu: avoid using null object of framebuffer kernel: drm/fbdev-dma: Only set smem_start is enable per module option kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers kernel: nfsd: initialise nfsd_info.mutex early. kernel: ftruncate: pass a signed offset kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values kernel: drm/amdgpu: fix double free err_addr pointer warnings kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband kernel: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX kernel: Bluetooth: ISO: Check socket flag instead of hcon kernel: tcp_metrics: validate source addr length kernel: scsi: mpi3mr: Sanitise num_phys kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc kernel: firmware: cs_dsp: Validate payload length before processing block kernel: firmware: cs_dsp: Return error if block header overflows file kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation kernel: Revert "sched/fair: Make sure to try to detach at least one movable task" kernel: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines kernel: net/mlx5: Fix missing lock on sync reset reload kernel: net/iucv: fix use after free in iucv_sock_close() kernel: nvme-pci: add missing condition check for existence of mapped data kernel: dev/parport: fix the array out-of-bounds risk kernel: net: missing check virtio kernel: nfs: pass explicit offset/count to trace events kernel: leds: trigger: Unregister sysfs attributes before calling deactivate() kernel: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() kernel: dma: fix call order in dmam_free_coherent kernel: s390/fpu: Re-add exception handling in load_fpu_state() kernel: net/mlx5: Always drain health in shutdown callback kernel: perf: Fix event leak upon exec and file release kernel: perf: Fix event leak upon exit kernel: wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() kernel: mm: list_lru: fix UAF for memory cgroup kernel: memcg: protect concurrent access to mem_cgroup_idr kernel: wifi: mac80211: fix NULL dereference at band check in starting tx ba session kernel: fuse: Initialize beyond-EOF page contents before setting uptodate kernel: usb: gadget: core: Check for unset descriptor kernel: x86/mm: Fix pti_clone_pgtable() alignment assumption kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink kernel: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT kernel: KVM: s390: fix validity interception issue when gisa is switched off
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.4
null
null
RHSA-2019:2126
Red Hat Security Advisory: libwpd security update
libwpd: NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2025:0384
Red Hat Security Advisory: RHSA: Submariner 0.18.4 - bug and security fixes
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:acm:2.11::el9" ]
null
7.5
null
null
RHSA-2002:152
Red Hat Security Advisory: libpng security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2007:1077
Red Hat Security Advisory: python security update
pcre integer overflow python off-by-one locale.strxfrm() (possible memory disclosure)
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2025:2524
Red Hat Security Advisory: kernel-rt security update
kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
[ "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
5.8
null
null
RHSA-2023:2101
Red Hat Security Advisory: RHUI 4.4.0 release - Security Fixes, Bug Fixes, and Enhancements Update
python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server python-django: Potential denial-of-service via Accept-Language headers python-django: Potential denial-of-service vulnerability in file uploads
[ "cpe:/a:redhat:rhui:4::el8" ]
null
7.5
null
null
RHSA-2020:0779
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Insufficient policy enforcement in media
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
null
null
RHSA-2024:3088
Red Hat Security Advisory: gstreamer1-plugins-base security update
gstreamer-plugins-base: heap overwrite in subtitle parsing
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2021:2167
Red Hat Security Advisory: kpatch-patch security update
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: SCSI target (LIO) write to any block on ILO backstore
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
8.1
null
null
RHSA-2017:3322
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: information leak due to a data race in ALSA timer
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
4.7
null
RHSA-2021:4517
Red Hat Security Advisory: vim security update
vim: heap-based buffer overflow in utf_ptr2char() in mbyte.c vim: use-after-free in nv_replace() in normal.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.3
null
null
RHSA-2019:0980
Red Hat Security Advisory: httpd:2.4 security update
httpd: privilege escalation from modules scripts httpd: mod_ssl: access control bypass when using per-location client certification authentication
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
6.8
null
RHSA-2023:0446
Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2010:0975
Red Hat Security Advisory: bind security update
bind: failure to clear existing RRSIG records when a NO DATA is negatively cached could DoS named bind: key algorithm rollover may mark secure answers as insecure
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2011:1165
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards Mozilla: Private data leakage using RegExp.input
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2015:2550
Red Hat Security Advisory: libxml2 security update
libxml2: denial of service processing a crafted XML document libxml2: CPU exhaustion when processing specially crafted XML input libxml2: Heap-based buffer overflow in xmlDictComputeFastQKey libxml2: Heap-based buffer overflow in xmlParseXmlDecl libxml2: Heap-based buffer overflow in xmlGROW libxml2: Heap buffer overflow in xmlParseMisc libxml2: Out-of-bounds memory access libxml2: heap-based buffer overflow in xmlParseConditionalSections() libxml2: Buffer overread with XML parser in xmlNextChar libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration libxml2: out-of-bounds memory access when parsing an unclosed HTML comment
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:2120
Red Hat Security Advisory: zsh security update
zsh: Prompt expansion vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2021:0916
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.4 (etcd) security update
etcd: Large slice causes panic in decodeRecord method etcd: DoS in wal/wal.go etcd: directories created via os.MkdirAll are not checked for permissions etcd: gateway can include itself as an endpoint resulting in resource exhaustion and leads to DoS etcd: improper validation of passwords allow an attacker to guess or brute-force user's passwords etcd: no authentication is performed against endpoints provided in the --endpoints flag
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
6.5
null
null
RHSA-2024:0448
Red Hat Security Advisory: kernel security and bug fix update
kernel: nfp: use-after-free in area_cache_get() kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: use-after-free in smb2_is_status_io_timeout() kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: use-after-free in netfilter: nf_tables kernel: use after free in nft_immediate_deactivate kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: NULL pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c amd: Return Address Predictor vulnerability leading to information disclosure kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: eBPF: insufficient stack type checks in dynptr kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: SEV-ES local priv escalation kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy()
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.5
null
null
RHSA-2023:0979
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan
[ "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime" ]
null
7.8
null
null
RHSA-2017:0173
Red Hat Security Advisory: eap7-jboss-ec2-eap security update
EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7::el7" ]
null
null
4.3
null
RHSA-2020:4900
Red Hat Security Advisory: cryptsetup security update
cryptsetup: Out-of-bounds write when validating segments
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
RHSA-2014:0288
Red Hat Security Advisory: gnutls security update
gnutls: incorrect error handling in certificate verification (GNUTLS-SA-2014-2)
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es", "cpe:/o:redhat:rhel_eus:5.9", "cpe:/o:redhat:rhel_eus:6.3::computenode", "cpe:/o:redhat:rhel_eus:6.3::server", "cpe:/o:redhat:rhel_eus:6.4::computenode", "cpe:/o:redhat:rhel_eus:6.4::server", "cpe:/o:redhat:rhel_mission_critical:5.3", "cpe:/o:redhat:rhel_mission_critical:5.6", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2022:1759
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
hivex: stack overflow due to recursive call of _get_children() nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu libvirt: segmentation fault during VM shutdown can lead to vdsm hang QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c QEMU: block: fdc: null pointer dereference may lead to guest crash ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() ntfs-3g: Out-of-bounds access in ntfs_decompress() ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute libnbd: nbdcopy: missing error handling may create corrupted destination image
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
4.8
null
null
RHSA-2024:5306
Red Hat Security Advisory: orc security update
orc: Stack-based buffer overflow vulnerability in ORC
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.7
null
null
RHSA-2019:3788
Red Hat Security Advisory: openstack-octavia security and bug fix update
openstack-octavia: amphora-agent not requiring client certificate
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
6.7
null
RHSA-2014:0705
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: null xmlns handling issue (Security, 8025026) OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) libjpeg: information leak (read of uninitialized memory) libpng: unhandled zero-length PLTE chunk or NULL palette OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insecure subject principals set handling (JAAS, 8024306) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767) OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Deployment) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) JDK: Vulnerability in the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
null
null
RHSA-2016:1969
Red Hat Security Advisory: Red Hat JBoss BPM Suite security update
stored XSS in JBoss BPM suite business process editor
[ "cpe:/a:redhat:jboss_bpms:6.3" ]
null
null
5.4
null
RHSA-2016:2670
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: net: out of bounds read in net_checksum_calculate()
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
4.7
null
RHSA-2023:2125
Red Hat Security Advisory: libreswan security update
libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.5
null
null
RHSA-2013:1012
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update
httpd: multiple XSS flaws due to unescaped hostnames tomcat: Limited DoS in chunked transfer encoding input filter httpd: XSS flaw in mod_proxy_balancer manager interface tomcat: Session fixation in form authenticator tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el6" ]
null
null
null
null
RHSA-2024:10907
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.13
cross-spawn: regular expression denial of service
[ "cpe:/a:redhat:service_mesh:2.4::el8" ]
null
4.4
null
null
RHSA-2023:3461
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
8.1
null
null
RHSA-2023:5485
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update on RHEL 8
nodejs-semver: Regular expression denial of service eap-7: heap exhaustion via deserialization wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor tough-cookie: prototype pollution in cookie memstore log4j1-socketappender: DoS via hashmap logging bouncycastle: potential blind LDAP injection attack using a self-signed certificate netty: SniHandler 16MB allocation leads to OOM
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
6.5
null
null
RHSA-2024:9413
Red Hat Security Advisory: bluez security update
BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability bluez: AVRCP stack-based buffer overflow remote code execution vulnerability bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability bluez: OBEX library out-of-bounds read information disclosure vulnerability bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.1
5.4
null
RHSA-2011:0308
Red Hat Security Advisory: mailman security update
mailman: Multiple security flaws leading to cross-site scripting (XSS) attacks Mailman: Three XSS flaws due improper escaping of the full name of the member
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHEA-2019:1283
Red Hat Enhancement Advisory: RHUI 3.1 bug fix and enhancement update
pulp: Improper path parsing leads to overwriting of iso repositories
[ "cpe:/a:redhat:rhui:3::el7" ]
null
null
6.8
null
RHSA-2024:10384
Red Hat Security Advisory: tuned security update
tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/a:redhat:enterprise_linux:9::sap", "cpe:/a:redhat:enterprise_linux:9::sap_hana", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2017:0501
Red Hat Security Advisory: kernel security and bug fix update
kernel: use after free in dccp protocol
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
7.8
null
RHSA-2018:2835
Red Hat Security Advisory: firefox security update
Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords Mozilla: Crash in TransportSecurityInfo due to cached data
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.1
null
RHSA-2002:099
Red Hat Security Advisory: : Updated mailman packages available
security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2024:5323
Red Hat Security Advisory: firefox security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
6.1
null
null
RHSA-2024:10785
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL row security below e.g. subqueries disregards user ID changes postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2021:4173
Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update
exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata exiv2: Use of uninitialized memory in isWebPType() may lead to information leak exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS exiv2: DoS due to quadratic complexity in ProcessUTF8Portion exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
4.7
null
null
RHSA-2014:1657
Red Hat Security Advisory: java-1.7.0-oracle security update
JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: incorrect optimization of range checks in C2 compiler (Hotspot, 8022783) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: StAX parser parameter entity XXE (JAXP, 8039533) OpenJDK: missing BootstrapMethods bounds check (Hotspot, 8041717) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2014:1004
Red Hat Security Advisory: yum-updatesd security update
yum: yum-cron installs unsigned packages
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:0870
Red Hat Security Advisory: tomcat5 security update
tomcat: Improper TOMCAT_LOG management in init script (DoS, ACE)
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2015:0135
Red Hat Security Advisory: java-1.6.0-ibm security update
ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) JDK: unspecified full Java sandbox bypass fixed in Feb 2015 update JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:0261
Red Hat Security Advisory: Satellite 6.12.1 Async Security Update
activerecord: Possible RCE escalation bug with Serialized Columns in Active Record jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS apache-commons-text: variable interpolation RCE
[ "cpe:/a:redhat:satellite:6.12::el8", "cpe:/a:redhat:satellite_capsule:6.12::el8", "cpe:/a:redhat:satellite_maintenance:6.12::el8", "cpe:/a:redhat:satellite_utils:6.12::el8" ]
null
0
null
null
RHSA-2022:0318
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.1.0 security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net/http/httputil: panic due to racy read of persistConn after handler panic
[ "cpe:/a:redhat:openshift_distributed_tracing:2.1::el8" ]
null
5.9
null
null
RHSA-2024:4662
Red Hat Security Advisory: OpenShift Virtualization 4.15.3 Images security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:container_native_virtualization:4.15::el9" ]
null
5.9
null
null