id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2011:1196
|
Red Hat Security Advisory: system-config-printer security update
|
system-config-printer: possible arbitrary code execution in pysmb.py due to improper escaping of hostnames
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:4798
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2019:2425
|
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
|
QEMU: seccomp: blacklist is not applied to all threads QEMU: rtl8139: integer overflow leads to buffer overflow QEMU: net: ignore packets with large size QEMU: scsi-generic: possible OOB access while handling inquiry request QEMU: slirp: heap buffer overflow in tcp_emu() QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables
|
[
"cpe:/a:redhat:openstack:10::el7",
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 2.8 | null |
RHSA-2012:1326
|
Red Hat Security Advisory: freeradius security update
|
freeradius: stack-based buffer overflow via long expiration date fields in client X509 certificates
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7022
|
Red Hat Security Advisory: tang security and bug fix update
|
tang: Race condition exists in the key generation and rotation functionality
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2010:0986
|
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
|
TLS: MITM attacks via session renegotiation OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) OpenJDK local network address disclosure (6952603) OpenJDK Swing unsafe reflection usage (6622002) JDK unspecified vulnerability in 2D component OpenJDK Swing mutable static (6938813) OpenJDK IndexColorModel double-free (6925710) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component
|
[
"cpe:/a:redhat:rhel_extras_sap:4",
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2021:0497
|
Red Hat Security Advisory: openvswitch2.13 security and bug fix update
|
lldp/openvswitch: denial of service via externally triggered memory leak openvswitch: limitation in the OVS packet parsing in userspace leads to DoS
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 7.5 | null | null |
RHSA-2024:7349
|
Red Hat Security Advisory: grafana security update
|
net/http: Denial of service due to improper 100-continue handling in net/http
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2003:224
|
Red Hat Security Advisory: openssh security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:7669
|
Red Hat Security Advisory: Red Hat build of Cryostat 2.4.0: new RHEL 8 container images
|
vertx-web: StaticHandler disclosure of classpath resources on Windows when mounted on a wildcard route bouncycastle: potential blind LDAP injection attack using a self-signed certificate netty: SniHandler 16MB allocation leads to OOM
|
[
"cpe:/a:redhat:cryostat:2::el8"
] | null | 6.5 | null | null |
RHSA-2020:0467
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 3.7 | null | null |
RHSA-2025:3297
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.23 bug fix and security update
|
cri-o: Checkpoint restore can be triggered from different namespaces grub2: net: Out-of-bounds write in grub_net_search_config_file() libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 7.8 | null | null |
RHSA-2023:0116
|
Red Hat Security Advisory: libtasn1 security update
|
libtasn1: Out-of-bound access in ETYPE_OK
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2015:2578
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.0 commons-collections security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_brms:6.1"
] | null | null | null | null |
RHSA-2010:0921
|
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging and Grid security update
|
plugin: enable QUEUE_ALL_USERS_TRUSTED for Submit/Hold/Release/Remove ops
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2013:0994
|
Red Hat Security Advisory: openstack-keystone security and bug fix update
|
openstack-keystone: Authentication bypass when using LDAP backend
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2024:0494
|
Red Hat Security Advisory: Red Hat build of Quarkus 2.13.9.SP1 release and security update
|
quarkus: Authorization flaw in Quarkus RestEasy Reactive and Classic when "quarkus.security.jaxrs.deny-unannotated-endpoints" or "quarkus.security.jaxrs.default-roles-allowed" properties are used. quarkus: json payload getting processed prior to security checks when rest resources are used with annotations.
|
[
"cpe:/a:redhat:quarkus:2.13::el8"
] | null | 8.6 | null | null |
RHSA-2024:7855
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0689
|
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps 1.11.1 security update
|
argo-cd: vulnerable to a cross-server request forgery (CSRF) attack
|
[
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 8.3 | null | null |
RHSA-2015:1841
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: information leak in PDF viewer chromium-browser: Cross-origin bypass in DOM chromium-browser: Cross-origin bypass in V8
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2013:0552
|
Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 1-week EOL Notice
|
This is the 1-week notification of the End Of Life plans for Red Hat
Enterprise Virtualization 2.
|
[] | null | null | null | null |
RHSA-2021:1201
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key Mozilla: Thunderbird might execute an alternative OTR library Mozilla: Logic issue potentially leaves key material unlocked
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2018:0223
|
Red Hat Security Advisory: nautilus security update
|
nautilus: Insufficient validation of trust of .desktop files with execute permission
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2022:5823
|
Red Hat Security Advisory: 389-ds:1.4 security update
|
389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.7 | null | null |
RHSA-2024:10927
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.20 Security update
|
undertow: information leakage via HTTP/2 request header reuse
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 0 | null | null |
RHSA-2014:1768
|
Red Hat Security Advisory: php53 security update
|
php: xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime() php: integer overflow in unserialize() php: heap corruption issue in exif_thumbnail() file: out-of-bounds read in elf note headers
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:4904
|
Red Hat Security Advisory: nss security update
|
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2017:0180
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2022:0216
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
|
log4j-core: remote code execution via JDBC Appender log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 5.9 | null | null |
RHSA-2024:9960
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.4 security and bug fix update
|
containers/image: digest type does not guarantee valid type net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.3::el9"
] | null | 5.9 | null | null |
RHSA-2013:0126
|
Red Hat Security Advisory: squirrelmail security and bug fix update
|
squirrelmail: not fixed in RHSA-2012:0103
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1783
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: ext4: AIO vs fallocate stale data exposure kernel: block: passing disk names as format strings kernel: dm: dm-snapshot data leak
|
[
"cpe:/o:redhat:rhel_eus:6.3::computenode",
"cpe:/o:redhat:rhel_eus:6.3::server"
] | null | null | null | null |
RHSA-2024:6235
|
Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.1.2
|
nodejs-async: Regular expression denial of service while parsing function in autoinject
|
[
"cpe:/a:redhat:trusted_profile_analyzer:1.1::el9"
] | null | 5.3 | null | null |
RHSA-2019:0567
|
Red Hat Security Advisory: openstack-octavia security and bug fix update
|
openstack-octavia: Private keys written to world-readable log files
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 5.5 | null |
RHSA-2023:4946
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2023:3581
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.3 | null | null |
RHSA-2018:0013
|
Red Hat Security Advisory: microcode_ctl security update
|
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:1174
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.2 security and bug fix update
|
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.1::el8"
] | null | 5.3 | null | null |
RHSA-2008:0973
|
Red Hat Security Advisory: kernel security and bug fix update
|
Linux Kernel isdn_net_setcfg buffer overflow kernel: linux x86_64 ia32 emulation leaks uninitialized data kernel: sit memory leak kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code Linux kernel local filesystem DoS kernel: missing capability checks in sbni_ioctl() kernel: open() call allows setgid bit when user is not in new file's group
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:1547
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: HTTP request splitting with mod_rewrite and mod_proxy
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2024:0971
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2014:1317
|
Red Hat Security Advisory: cfme security, bug fix, and enhancement update
|
CFME: default routes expose controllers and actions CFME: dangerous send method in performance.rb
|
[
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
] | null | null | null | null |
RHSA-2023:1958
|
Red Hat Security Advisory: emacs security update
|
emacs: command injection vulnerability in org-mode
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2023:0348
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: watch queue race condition can lead to privilege escalation kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access kernel: nfsd buffer overflow by RPC message over TCP with garbage data
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2023:7371
|
Red Hat Security Advisory: samba security update
|
samba: smbd allows client access to unix domain sockets on the file system as root samba: SMB clients can truncate files with read-only permissions samba: "rpcecho" development server allows denial of service via sleep() call on AD DC
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 6.5 | null | null |
RHSA-2022:4991
|
Red Hat Security Advisory: xz security update
|
gzip: arbitrary-file-write vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2007:0533
|
Red Hat Security Advisory: httpd security update
|
httpd mod_status XSS httpd mod_cache segfault
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:1655
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.6 | null |
RHSA-2013:1155
|
Red Hat Security Advisory: rhev 3.2.2 - vdsm security and bug fix update
|
vdsm: incomplete fix for CVE-2013-0167 issue
|
[
"cpe:/a:redhat:enterprise_linux:6::hypervisor",
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2023:6583
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: seg6: fix the iif in the IPv6 socket control block Kernel: race when faulting a device private page in memory manager kernel: use-after-free in l1oip timer handlers kernel: Rate limit overflow messages in r8152 in intr_callback kernel: vmwgfx: use-after-free in vmw_cmd_res_check kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c kernel: gpiolib: fix memory leak in gpiochip_setup_dev() kernel: memcg: fix possible use-after-free in memcg_write_event_control() kernel: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths kernel: char: tpm: Protect tpm_pm_suspend with locks kernel: ixgbevf: Fix resource leak in ixgbevf_init_module() kernel: watch_queue: Actually free the watch kernel: NFSv4: Don't hold the layoutget locks across multiple RPC calls kernel: xprtrdma: treat all calls not a bcall when bc_serv is NULL kernel: af_unix: Fix a data-race in unix_dgram_peer_wake_me(). kernel: regulator: scmi: Fix refcount leak in scmi_regulator_probe kernel: mm/mempolicy: fix uninit-value in mpol_rebind_policy() kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support kernel: irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions kernel: irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions kernel: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() kernel: cpufreq: CPPC: Add u64 casts to avoid overflowing kernel: VMCI: Use threaded irqs instead of tasklets kernel: x86/mm: Randomize per-cpu entry area kernel: HID: check empty report_list in hid_validate_values() kernel: sctp: fail if no bound addresses can be used for a given scope kernel: net/tls: tls_is_tx_ready() checked list_entry kernel: tap: tap_open(): correctly initialize socket uid kernel: Type confusion in pick_next_rt_entity() kernel: hid: Use After Free in asus_remove() kernel: hash collisions in the IPv6 connection lookup table kernel: missing mmap_lock in file_files_note that could possibly lead to a use after free in the coredump code kernel: ovl: fix use after free in struct ovl_aio_req Kernel: a USB-accessible slab-out-of-bounds read in brcmfmac Kernel: use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() kernel: use-after-free bug in remove function xgene_hwmon_remove kernel: Use after free bug in btsdio_remove due to race condition kernel: net: IPv6 RPL protocol reachable assertion leads to DoS kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos kernel: Use after free bug in r592_remove kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: gfs2: NULL pointer dereference in gfs2_evict_inode() kernel: out-of-bounds access in relay_file_read kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf() kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails Kernel: x86/mm: a per-cpu entry area leak was identified through the init_cea_offsets function when prefetchnta and prefetcht2 instructions being used for the per-cpu entry area mapping to the user space kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() kernel: xfrm: out-of-bounds read of XFRMA_MTIMER_THRESH nlattr kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry kernel: mpls: double free on sysctl allocation failure kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() kernel: vmwgfx: race condition leading to information disclosure vulnerability kernel: vmwgfx: double free within the handling of vmw_buffer_object objects kernel: r592: race condition leading to use-after-free in r592_remove() kernel: eBPF: insufficient stack type checks in dynptr kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue() kernel: net: sched: sch: Bounds check priority kernel: net: openvswitch: fix flow memory leak in ovs_flow_cmd_new kernel: ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() kernel: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() kernel: bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. kernel: null pointer when load rlc firmware kernel: drm/dp_mst: Fix resetting msg rx state after topology removal
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.6 | null | null |
RHSA-2018:3350
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2010:0825
|
Red Hat Security Advisory: mysql security update
|
MySQL: Mysqld DoS (crash) by processing joins involving a table with a unique SET column (MySQL BZ#54575) MySQL: mysqld DoS (assertion failure) by using temporary InnoDB engine tables with nullable columns (MySQL bug #54044) MySQL: mysqld DoS (assertion failure) by alternate reads from two indexes on a table using the HANDLER interface (MySQL bug #54007) MySQL: mysqld DoS (crash) by processing EXPLAIN statements for complex SQL queries (MySQL bug #52711) MySQL: CREATE TABLE ... SELECT causes crash when KILL_BAD_DATA is returned (MySQL Bug#55826) MySQL: crash with user variables, assignments, joins... (MySQL Bug #55564) MySQL: pre-evaluating LIKE arguments in view prepare mode causes crash (MySQL Bug#54568) MySQL: crash when group_concat and "with rollup" in prepared statements (MySQL Bug#54476) MySQL: crash with LONGBLOB and union or update with subquery (MySQL Bug#54461) MySQL: server hangs during JOIN query in stored procedures called twice in a row (MySQL Bug#53544) MySQL: crash when loading data into geometry function PolyFromWKB() (MySQL Bug#51875)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:0928
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.8 openshift-clients security update
|
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
|
[
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 7.5 | null | null |
RHSA-2021:3733
|
Red Hat Security Advisory: OpenShift Virtualization 2.6.7 Images security and bug fix update
|
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: crypto/tls: certificate of wrong type is causing TLS client to panic
|
[
"cpe:/a:redhat:container_native_virtualization:2.6::el8"
] | null | 6.5 | null | null |
RHSA-2023:4332
|
Red Hat Security Advisory: bind security update
|
bind: named's configured cache size limit can be significantly exceeded
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2019:2399
|
Red Hat Security Advisory: libssh2 security update
|
libssh2: Integer overflow in transport read resulting in out of bounds write libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7.5 | null |
RHSA-2019:4021
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 security update
|
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 7.5 | null |
RHSA-2025:0889
|
Red Hat Security Advisory: libsoup security update
|
libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 9 | null | null |
RHSA-2024:1417
|
Red Hat Security Advisory: libX11 security update
|
libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.3 | null | null |
RHSA-2024:1508
|
Red Hat Security Advisory: logging for Red Hat OpenShift security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:logging:5.7::el8"
] | null | 5.9 | null | null |
RHSA-2024:5298
|
Red Hat Security Advisory: gnome-shell security update
|
gnome-shell: code execution in portal helper
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2005:791
|
Red Hat Security Advisory: thunderbird security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:0093
|
Red Hat Security Advisory: chromium-browser security update
|
ICU: regexp engine missing look-behind expression range check chromium-browser: use-after-free in IndexedDB chromium-browser: use-after-free in WebAudio ICU: regexp engine incorrect handling of a zero length quantifier chromium-browser: memory corruption in V8 chromium-browser: memory corruption in V8 chromium-browser: use-after-free in DOM chromium-browser: use-after-free in DOM chromium-browser: memory corruption in V8 chromium-browser: use-after-free in DOM chromium-browser: use-after-free in FFmpeg chromium-browser: use-after-free in DOM chromium-browser: use-after-free in Speech chromium-browser: use-after-free in Views chromium-browser: use-after-free in FFmpeg chromium-browser: memory corruption in Fonts chromium-browser: same-origin-bypass in V8 ICU: uninitialized value use in the collation component chromium-browser: out-of-bounds read in UI chromium-browser: uninitialized-value in Fonts chromium-browser: out-of-bounds read in Skia chromium-browser: out-of-bounds read in PDFium chromium-browser: out-of-bounds read in PDFium chromium-browser: out-of-bounds read in Fonts chromium-browser: out-of-bounds read in PDFium chromium-browser: caching error in AppCache icu: insufficient size limit checks in regular expression compiler chromium-browser: multiple unspecified vulnerabilities chromium-browser: unspecified vulnerability in Google V8
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2018:0002
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.9 security update on RHEL 6
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) resteasy: Vary header not added by CORS filter leading to cache poisoning undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files jboss: unsafe chown of server.log in jboss init script allows privilege escalation (Incomplete fix for CVE-2016-8656) Solr: Code execution via entity expansion
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 9.8 | null |
RHSA-2020:1445
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update
|
activemq: Corrupt MQTT frame can cause broker shutdown HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service HTTP/2: flood using empty frames results in excessive resource consumption jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions jetty: error path information disclosure netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 7.5 | 7.5 | null |
RHSA-2015:1462
|
Red Hat Security Advisory: ipa security and bug fix update
|
jquery-ui: XSS vulnerability in jQuery.ui.dialog title option jquery-ui: XSS vulnerability in default content in Tooltip widget
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:0125
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2023:4378
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: KVM: x86/mmu: race condition in direct_page_fault() kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: Spectre v2 SMT mitigations problem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 7.8 | 5.6 | null |
RHSA-2020:5663
|
Red Hat Security Advisory: mariadb:10.3 security, bug fix, and enhancement update
|
mysql: InnoDB unspecified vulnerability (CPU Jan 2019) mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021)
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 4.9 | 3.7 | null |
RHSA-2014:0382
|
Red Hat Security Advisory: python-keystoneclient security update
|
python-keystoneclient: Potential context confusion in Keystone middleware
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2015:0068
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) OpenJDK: class verifier insufficient invokespecial calls verification (Hotspot, 8058982) OpenJDK: insecure hsperfdata temporary file handling (Hotspot, 8050807) OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2009:0326
|
Red Hat Security Advisory: kernel security and bug fix update
|
Linux kernel ext[234] directory corruption denial of service kernel: enforce a minimum SG_IO timeout Linux kernel minor signal handling vulnerability kernel: ecryptfs readlink flaw kernel: dell_rbu local oops kernel: skfp_ioctl inverted logic flaw kernel: memory disclosure in SO_BSDCOMPAT gsopt kernel: rt_cache leak leads to lack of network connectivity
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2004:158
|
Red Hat Security Advisory: : Updated cadaver package fixes security vulnerability in neon
|
security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2025:1669
|
Red Hat Security Advisory: bind security update
|
bind: bind9: Many records in the additional section cause CPU exhaustion
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 7.5 | null | null |
RHSA-2023:1966
|
Red Hat Security Advisory: pki-core:10.6 security update
|
pki-core: access to external entities when parsing XML can lead to XXE
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2012:1024
|
Red Hat Security Advisory: jbossas security update
|
JNDI: unauthenticated remote write access is permitted by default
|
[
"cpe:/a:redhat:jboss_enterprise_portal_platform:4.3"
] | null | null | null | null |
RHSA-2022:5596
|
Red Hat Security Advisory: Red Hat build of Quarkus 2.7.6 release and security update
|
jackson-databind: denial of service via a large depth of nested objects
|
[
"cpe:/a:redhat:quarkus:2.7"
] | null | 7.5 | null | null |
RHSA-2017:1372
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: ipv4/tcp: Infinite loop in tcp_splice_read()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null |
RHSA-2022:1898
|
Red Hat Security Advisory: fapolicyd security, bug fix, and enhancement update
|
fapolicyd: fapolicyd wrongly prepares ld.so path
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.4 | null | null |
RHBA-2019:0028
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.9 bug fix and enhancement update
|
haproxy: Out-of-bounds read in HPACK decoder
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 5.9 | null |
RHSA-2014:1118
|
Red Hat Security Advisory: glibc security update
|
glibc: off-by-one error leading to a heap-based buffer overflow flaw in __gconv_translit_find()
|
[
"cpe:/o:redhat:rhel_eus:5.9",
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_mission_critical:5.6",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2016:2945
|
Red Hat Security Advisory: Red Hat Single Sign-On security update
|
keycloak: account hijacking via auth code fixation
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.0"
] | null | null | 3.7 | null |
RHSA-2020:3579
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.19 openshift security update
|
kubernetes: Node disk DOS by writing to container /etc/hosts
|
[
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 5.5 | null | null |
RHSA-2010:0273
|
Red Hat Security Advisory: curl security, bug fix and enhancement update
|
curl: zlib-compression causes curl to pass more than CURL_MAX_WRITE_SIZE bytes to write callback
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:4058
|
Red Hat Security Advisory: samba security update
|
samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.8 | null | null |
RHSA-2006:0541
|
Red Hat Security Advisory: dia security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0108
|
Red Hat Security Advisory: nss security update
|
nss: timing attack against RSA decryption
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2013:0751
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) OpenJDK: JDBC driver manager improper toString calls (CanSecWest 2013, Libraries, 8009814) OpenJDK: JAXP missing security restrictions (JAXP, 6657673) OpenJDK: remote code loading enabled by default (RMI, 8001040) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: incorrect setter access checks in MethodHandles (Hostspot, 8009677) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) OpenJDK: Wrapper.convert insufficient type checks (Libraries, 8009049)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:1718
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2022:6595
|
Red Hat Security Advisory: nodejs and nodejs-nodemon security and bug fix update
|
nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-normalize-url: ReDoS for data URLs nodejs: npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2020:4913
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2011:0599
|
Red Hat Security Advisory: sudo security and bug fix update
|
sudo: does not ask for password on GID changes
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:2732
|
Red Hat Security Advisory: kernel security update
|
kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.8 | null | null |
RHSA-2024:0448
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: nfp: use-after-free in area_cache_get() kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: use-after-free in smb2_is_status_io_timeout() kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: use-after-free in netfilter: nf_tables kernel: use after free in nft_immediate_deactivate kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: NULL pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c amd: Return Address Predictor vulnerability leading to information disclosure kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: eBPF: insufficient stack type checks in dynptr kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: SEV-ES local priv escalation kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy()
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.5 | null | null |
RHSA-2022:0949
|
Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update
|
QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 libnbd: nbdcopy: missing error handling may create corrupted destination image
|
[
"cpe:/a:redhat:advanced_virtualization:8.5::el8"
] | null | 4.8 | null | null |
RHSA-2015:0101
|
Red Hat Security Advisory: glibc security update
|
glibc: __nss_hostname_digits_dots() heap-based buffer overflow
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2022:0995
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-tripleo-heat-templates) security update
|
openstack-tripleo-heat-templates: data leak of internal URL through keystone_authtoken
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 4.3 | null | null |
RHSA-2019:1891
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: nfs: use-after-free in svc_process_common() kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7 | 8.8 | null |
RHSA-2020:4619
|
Red Hat Security Advisory: frr security and bug fix update
|
frr: default permission issue eases information leaks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2018:2612
|
Red Hat Security Advisory: samba security, bug fix and enhancement update
|
samba: NULL pointer dereference in printer server process samba: Weak authentication protocol regression samba: Insufficient input validation in libsmbclient
|
[
"cpe:/a:redhat:storage:3.4:samba:el6"
] | null | null | 4.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.