id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:1856
Red Hat Security Advisory: opencryptoki security update
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
[ "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.9
null
null
RHBA-2020:3527
Red Hat Bug Fix Advisory: kernel-rt bug fix update
kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
6.5
null
null
RHSA-2013:0625
Red Hat Security Advisory: java-1.6.0-ibm security update
JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: disable Gopher support by default (Gopher, 7189567) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2016:1019
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: incorrect banked access bounds checking in vga module
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
7.6
null
RHSA-2024:8831
Red Hat Security Advisory: bcc security update
bcc: unprivileged users can force loading of compromised linux headers
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
2.8
null
null
RHSA-2021:2790
Red Hat Security Advisory: shim and fwupd security update
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.5
null
null
RHSA-2020:3286
Red Hat Security Advisory: postgresql-jdbc security update
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.7
null
null
RHSA-2024:1265
Red Hat Security Advisory: OpenShift Container Platform 4.12.53 bug fix and security update
helm: getHostByName Function Information Disclosure
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
4.3
null
null
RHSA-2016:0455
Red Hat Security Advisory: ruby193 security update
rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller rubygem-activerecord: Nested attributes rejection proc bypass in Active Record rubygem-actionpack: possible object leak and denial of service attack in Action Pack rubygem-actionpack: directory traversal flaw in Action View rubygem-actionpack: directory traversal in Action View, incomplete CVE-2016-0752 fix rubygem-actionpack: code injection vulnerability in Action View
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2022:1292
Red Hat Security Advisory: Release of OpenShift Serverless 1.21.1
spring-cloud-function: Remote code execution by malicious Spring Expression
[ "cpe:/a:redhat:serverless:1.21::el8" ]
null
9.8
null
null
RHSA-2025:3550
Red Hat Security Advisory: libreoffice security update
libreoffice: Macro URL arbitrary script execution
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.6
null
null
RHSA-2020:2562
Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 13 security update
undertow: Client can use bogus uri in Digest authentication undertow: HTTP header injection using CRLF with UTF-8 Encoding (incomplete fix of CVE-2016-4993) jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)
[ "cpe:/a:redhat:jboss_enterprise_application_platform_cd:13" ]
null
null
7.6
null
RHSA-2015:1583
Red Hat Security Advisory: kernel security and bug fix update
kernel: ping sockets: use-after-free leading to local privilege escalation
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2012:0034
Red Hat Security Advisory: java-1.6.0-ibm security update
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) JDK: unspecified vulnerability fixed in 6u29 (Sound) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) JDK: unspecified vulnerability fixed in 6u29 (AWT) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) JDK: unspecified vulnerability fixed in 6u29 (Deployment)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:1765
Red Hat Security Advisory: cups security and bug fix update
cups: stack-buffer-overflow in libcups's asn1_get_type function cups: stack-buffer-overflow in libcups's asn1_get_packed function
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
3.5
null
RHSA-2016:1041
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:38.8) (MFSA 2016-39) Mozilla: Miscellaneous memory safety hazards (rv:46.0 / rv:45.1 / rv:38.8) (MFSA 2016-39)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:4051
Red Hat Security Advisory: pki-core security update
ca: token authentication bypass vulnerability
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2022:1842
Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update
exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.5
null
null
RHSA-2018:2569
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
8.4
null
RHSA-2011:1341
Red Hat Security Advisory: firefox security update
Mozilla: Code installation through holding down Enter (MFSA 2011-40) Mozilla: Miscellaneous memory safety hazards (MFSA 2011-36) Mozilla: Integer underflow when using JavaScript RegExp (MFSA 2011-37) Mozilla: XSS via plugins and shadowed window.location object (MFSA 2011-38) Mozilla: Defense against multiple Location headers due to CRLF Injection (MFSA 2011-39)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2024:0433
Red Hat Security Advisory: linux-firmware security update
amd: Return Address Predictor vulnerability leading to information disclosure
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
5.6
null
null
RHSA-2021:1751
Red Hat Security Advisory: mailman:2.1 security update
mailman: arbitrary content injection via the options login page mailman: arbitrary content injection via the private archive login page
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.7
null
null
RHSA-2012:0683
Red Hat Security Advisory: bind-dyndb-ldap security update
bind-dyndb-ldap: Bind DoS (named hang) by processing DNS query for zone served by bind-dyndb-ldap
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2003:029
Red Hat Security Advisory: : : : Updated lynx packages fix CRLF injection vulnerability
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2007:0150
Red Hat Security Advisory: freetype security update
Multiple font integer overflows (CVE-2007-1352)
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:1349
Red Hat Security Advisory: krb5-appl security update
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
9.8
null
null
RHSA-2018:0576
Red Hat Security Advisory: Red Hat JBoss BRMS 6.4.9 security update
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:6.4" ]
null
null
8.1
null
RHSA-2023:0675
Red Hat Security Advisory: tigervnc and xorg-x11-server security update
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2024:0692
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps 1.10.2 security update
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients argo-cd: vulnerable to a cross-server request forgery (CSRF) attack
[ "cpe:/a:redhat:openshift_gitops:1.10::el8" ]
null
8.3
null
null
RHSA-2014:0887
Red Hat Security Advisory: JBoss Remoting security update
5: Remote code execution via unauthenticated JMX/RMI connector
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.2", "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1", "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2", "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1" ]
null
null
null
null
RHSA-2018:2666
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Out of bounds write in V8 chromium-browser: Out of bounds read in Blink chromium-browser: Out of bounds read in WebAudio chromium-browser: Out of bounds write in Mojo chromium-browser: Out of bounds read in SwiftShader chromium-browser: Integer overflow in Skia chromium-browser: Use after free in WebRTC chromium-browser: Site Isolation bypass after tab restore chromium-browser: Site Isolation bypass using Blob URLS chromium-browser: Local file access in Blink chromium-browser: Out of bounds read in PDFium chromium-browser: Content security policy bypass in Blink chromium-browser: Credit card information leak in Autofill chromium-browser: URL spoof in permission dialogs chromium-browser: URL spoof in full screen mode chromium-browser: Local file access in DevTools chromium-browser: Stack buffer overflow in SwiftShader chromium-browser: Out of bounds read in WebRTC chromium-browser: User confirmation bypass in external protocol handling chromium-browser: Use after free in Memory Instrumentation chromium-browser: Script injection in New Tab Page chromium-browser: Multiple download restriction bypass chromium-browser: User gesture requirement bypass
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
RHSA-2023:1251
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7.8
null
null
RHSA-2023:0337
Red Hat Security Advisory: expat security update
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2021:0343
Red Hat Security Advisory: perl security update
perl: heap-based buffer overflow in regular expression compiler leads to DoS perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2024:6882
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 for OpenShift image enhancement update
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
6.1
null
null
RHSA-2013:0622
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: block: default SCSI command filter does not accomodate commands overlap across device classes kernel: x86/msr: /dev/cpu/*/msr local privilege escalation kernel: net: infinite loop in __skb_recv_datagram() kernel: race condition with PTRACE_SETREGS kernel: sock_diag: out-of-bounds access to sock_diag_handlers[]
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2006:0157
Red Hat Security Advisory: struts security update for Red Hat Application Server
security flaw
[ "cpe:/a:redhat:rhel_application_server:1" ]
null
null
null
null
RHSA-2018:1374
Red Hat Security Advisory: kernel-alt security and bug fix update
hw: cpu: speculative execution permission faults handling kernel: ptrace() incorrect error handling leads to corruption and DoS
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
7.8
null
RHSA-2010:0141
Red Hat Security Advisory: tar security update
tar/cpio stack crashing in safer_name_suffix cpio: Heap-based buffer overflow by expanding a specially-crafted archive
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2011:0871
Red Hat Security Advisory: tigervnc security update
tigervnc: vncviewer can send password to server without proper validation of the X.509 certificate
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2021:2521
Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update
QEMU: msix: OOB access during mmio operations may lead to DoS qemu: out-of-bound heap buffer access via an interrupt ID field
[ "cpe:/a:redhat:advanced_virtualization:8.2::el8" ]
null
2.5
null
null
RHSA-2013:0124
Red Hat Security Advisory: net-snmp security and bug fix update
net-snmp: Array index error, leading to out-of heap-based buffer read (snmpd crash)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:3587
Red Hat Security Advisory: thunderbird security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2024:9984
Red Hat Security Advisory: RHOSP 17.1.4 (python-sqlparse) security update
sqlparse: parsing heavily nested list leads to denial of service
[ "cpe:/a:redhat:openstack:17.1::el9" ]
null
7.5
null
null
RHSA-2010:0167
Red Hat Security Advisory: gnutls security update
TLS: MITM attacks via session renegotiation gnutls: gnutls_x509_crt_get_serial incorrect serial decoding from ASN1 (BE64) [GNUTLS-SA-2010-1]
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:6661
Red Hat Security Advisory: python3-setuptools security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
[ "cpe:/o:redhat:rhel_els:7" ]
null
8.8
null
null
RHSA-2012:0469
Red Hat Security Advisory: acroread security update
acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2014:0090
Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update
Heat: CFN policy rules not all enforced Heat: ReST API doesn't respect tenant scoping
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2004:093
Red Hat Security Advisory: : Updated sysstat packages fix security vulnerabilities
security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2023:6635
Red Hat Security Advisory: c-ares security, bug fix, and enhancement update
c-ares: buffer overflow in config_sortlist() due to missing string length check c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation c-ares: Buffer Underwrite in ares_inet_net_pton() c-ares: Insufficient randomness in generation of DNS query IDs
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.9
null
null
RHSA-2017:0057
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2019:2670
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use-after-free in Blink
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2003:258
Red Hat Security Advisory: : GDM allows local user to read any file.
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2019:3200
Red Hat Security Advisory: Red Hat AMQ Streams 1.3.0 release and security update
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution jackson-databind: Polymorphic typing issue related to logback/JNDI jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource jackson-databind: Serialization gadgets in classes of the ehcache package
[ "cpe:/a:redhat:amq_streams:1" ]
null
null
7.5
null
RHSA-2020:3141
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
6.5
null
null
RHSA-2017:2692
Red Hat Security Advisory: openvswitch security update
openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function openvswitch: Invalid processing of a malicious OpenFlow role status message openvswitch: Buffer over-read while parsing the group mod OpenFlow message
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
5.6
null
RHSA-2005:284
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2023:2104
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.8 security updates and bug fixes
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
[ "cpe:/a:redhat:acm:2.5::el8" ]
null
7.5
null
null
RHSA-2022:1490
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
5.3
null
null
RHSA-2015:0090
Red Hat Security Advisory: glibc security update
glibc: __nss_hostname_digits_dots() heap-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:1567
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash kernel: Null pointer dereference in the sound/usb/line6/pcm.c kernel: Null pointer dereference in the sound/usb/line6/driver.c kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: The flow_dissector feature allows device tracking kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) kernel: a memory leak in the ath9k management function in allows local DoS kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications kernel: some ipv6 protocols not encrypted over ipsec tunnel kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open kernel: net/sched: cbs NULL pointer dereference when offloading is enabled
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.5
4.6
null
RHSA-2022:4590
Red Hat Security Advisory: firefox security update
Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
7.5
null
RHSA-2020:2479
Red Hat Security Advisory: OpenShift Container Platform 3.11 atomic-openshift security update
libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions kubernetes: Denial of service in API server via crafted YAML payloads by authorized users kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
6.3
6.5
null
RHSA-2018:1642
Red Hat Security Advisory: kernel-rt security update
hw: cpu: speculative store bypass
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
5.6
null
RHSA-2018:0842
Red Hat Security Advisory: xdg-user-dirs security and bug fix update
gnome-session: Xsession creation of XDG user directories does not honor system umask policy
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2017:1441
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Qemu: cirrus: heap buffer overflow via vnc connection Qemu: VNC: memory corruption due to unchecked resolution limit Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
5.5
null
RHSA-2008:0029
Red Hat Security Advisory: XFree86 security update
xfs integer overflow in the build_range function xfs heap overflow in the swap_char2b function Xorg / XFree86 file existence disclosure vulnerability xfree86: memory corruption via XInput extension xfree86: information disclosure via TOG-CUP extension xfree86: integer overflow in EVI extension Xorg / XFree86 PCF font parser buffer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2021:4532
Red Hat Security Advisory: OpenJDK 17.0.1 security update for Portable Linux Builds
OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/a:redhat:openjdk:17" ]
null
3.7
null
null
RHSA-2021:0734
Red Hat Security Advisory: nodejs:12 security update
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2023:3408
Red Hat Security Advisory: openssl security update
openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.5
null
null
RHSA-2018:3397
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
5.6
null
RHSA-2013:0517
Red Hat Security Advisory: util-linux-ng security, bug fix and enhancement update
util-linux: mount folder existence information disclosure
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:2816
Red Hat Security Advisory: Red Hat Ceph Storage security, bug fix, and enhancement update
Ceph: RGW Denial of Service by sending null or specially crafted POST object requests
[ "cpe:/a:redhat:ceph_storage:2::ubuntu16.04" ]
null
null
6.5
null
RHSA-2014:1065
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
This is the 3-year notification of the target date to migrate systems from Red Hat Network Classic Hosted to Red Hat Subscription Management. All systems using Red Hat Network Classic Hosted must be migrated to Red Hat Subscription Management.
[]
null
null
null
null
RHSA-2017:2628
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Qemu: qemu-nbd crashes due to undefined I/O coroutine
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.3
null
RHSA-2012:1122
Red Hat Security Advisory: bind97 security update
bind: heavy DNSSEC validation load can cause assertion failure
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2010:0161
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: create_elf_tables can leave urandom in a bad state kernel: tty->pgrp races kernel: infoleak if print-fatal-signals=1 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN kernel: untangle the do_mremap() kernel: OOM/crash in drivers/connector kernel: sys_move_pages infoleak kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference kernel: futex: Handle user space corruption gracefully
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2022:6066
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2023:1948
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-nova) security update
openstack-nova: Compute service fails to restart if the vnic_type of a bound port changed from direct to macvtap
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
3.3
null
null
RHSA-2023:3481
Red Hat Security Advisory: emacs security update
emacs: command injection vulnerability in htmlfontify.el
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2015:1087
Red Hat Security Advisory: qemu-kvm security update
qemu: pcnet: multi-tmd buffer overflow in the tx path
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:1481
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
7.4
null
null
RHSA-2024:1911
Red Hat Security Advisory: firefox security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2011:0952
Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0 security update
JBoss Seam EL interpolation in exception handling
[ "cpe:/a:redhat:jboss_soa_platform:4.3", "cpe:/a:redhat:jboss_soa_platform:5.1" ]
null
null
null
null
RHSA-2023:5727
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
5.3
null
null
RHSA-2018:1125
Red Hat Security Advisory: python-paramiko security update
python-paramiko: Authentication bypass in transport.py
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
9.8
null
RHBA-2018:0489
Red Hat Bug Fix Advisory: Red Hat OpenShift Container Platform 3.9 RPM Release Advisory
atomic-openshift: image import whitelist can be bypassed by creating an imagestream or using oc tag atomic-openshift: cluster-reader can escalate to creating builds via webhooks in any project
[ "cpe:/a:redhat:openshift:3.9::el7" ]
null
null
5
null
RHSA-2018:2090
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
8.1
null
RHSA-2024:0970
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2024:7705
Red Hat Security Advisory: systemd security update
systemd: privilege escalation via the less pager
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.1
null
null
RHSA-2020:2751
Red Hat Security Advisory: Red Hat AMQ Broker 7.7 release and security update
apache-commons-configuration: uncontrolled class instantiation when loading YAML files broker: resetUsers operation stores password in plain text netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
[ "cpe:/a:redhat:amq_broker:7" ]
null
7.5
null
null
RHSA-2024:2816
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.12.2 security update
webpack-dev-middleware: lack of URL validation may lead to file leak argo-cd: API server does not enforce project sourceNamespaces
[ "cpe:/a:redhat:openshift_gitops:1.12::el8" ]
null
4.8
null
null
RHSA-2024:0712
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 security update
jgit: arbitrary file overwrite santuario: Private Key disclosure in debug-log output
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
6.5
null
null
RHSA-2024:0241
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.4
null
null
RHBA-2019:3248
Red Hat Bug Fix Advisory: redhat-virtualization-host security update
kernel: hw: Spectre SWAPGS gadget vulnerability sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.4
null
RHBA-2019:2339
Red Hat Bug Fix Advisory: lldpad bug fix and enhancement update
lldptool: improper sanitization of shell-escape codes
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2024:2145
Red Hat Security Advisory: libX11 security update
libX11: out-of-bounds memory access in _XkbReadKeySyms() libX11: stack exhaustion from infinite recursion in PutSubImage() libX11: integer overflow in XCreateImage() leading to a heap overflow
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
RHSA-2008:0297
Red Hat Security Advisory: dovecot security and bug fix update
Directory traversal in dovecot with zlib plugin Dovecot possible privilege ascalation in ACL plugin dovecot LDAP+auth cache user login mixup dovecot: insecure mail_extra_groups option
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:5442
Red Hat Security Advisory: OpenShift Container Platform 4.15.28 packages and security update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
6.7
null
null
RHSA-2015:2417
Red Hat Security Advisory: autofs security, bug fix and enhancement update
autofs: priv escalation via interpreter load path for program based automount maps
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null