id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2019:3179
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
QEMU: qxl: null pointer dereference while releasing spice resources QEMU: slirp: heap buffer overflow during packet reassembly
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7
null
RHSA-2022:2214
Red Hat Security Advisory: zlib security update
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
[ "cpe:/o:redhat:rhel_els:6" ]
null
8.2
null
null
RHSA-2020:2103
Red Hat Security Advisory: kernel security update
Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
5.9
null
null
RHSA-2016:2672
Red Hat Security Advisory: chromium-browser security update
chromium-browser: out of bounds memory access in v8
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2021:2668
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
RHSA-2012:0683
Red Hat Security Advisory: bind-dyndb-ldap security update
bind-dyndb-ldap: Bind DoS (named hang) by processing DNS query for zone served by bind-dyndb-ldap
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:6287
Red Hat Security Advisory: OpenShift Container Platform 4.11.3 packages and security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2022:5219
Red Hat Security Advisory: kpatch-patch security update
kernel: buffer overflow in IPsec ESP transformation code
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2018:0015
Red Hat Security Advisory: linux-firmware security update
An update for linux-firmware is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
null
null
RHSA-2022:7272
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.0 release and security update
Tomcat: Information disclosure tomcat: local privilege escalation vulnerability
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9" ]
null
7
null
null
RHSA-2005:018
Red Hat Security Advisory: xpdf security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:3121
Red Hat Security Advisory: httpd:2.4 security update
httpd: mod_macro: out-of-bounds read vulnerability mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2011:1161
Red Hat Security Advisory: freetype security update
BSD compress LZW decoder buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:7288
Red Hat Security Advisory: openssl security update
OpenSSL: X.509 Email Address Buffer Overflow OpenSSL: X.509 Email Address Variable Length Buffer Overflow
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2022:0041
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
RHSA-2003:315
Red Hat Security Advisory: quagga security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::es" ]
null
null
null
null
RHSA-2024:0800
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update on RHEL 9
guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
6.5
null
null
RHSA-2024:2086
Red Hat Security Advisory: shim security update
shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.1
null
null
RHSA-2015:1053
Red Hat Security Advisory: php55 security and bug fix update
php: use after free vulnerability in unserialize() php: out of bounds read when parsing a crafted .php file file: out of bounds read in mconvert() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in opcache extension php: NULL pointer dereference in pgsql extension php: use after free in phar_object.c regex: heap overflow in regcomp() on 32-bit architectures php: move_uploaded_file() NUL byte injection in file name php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2012:0321
Red Hat Security Advisory: cvs security update
cvs: client proxy_connect heap-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:2858
Red Hat Security Advisory: OpenShift Container Platform 4.1.18 logging-elasticsearch5 security update
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485) jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
9.8
null
RHSA-2018:0017
Red Hat Security Advisory: kernel security update
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution bounds-check bypass hw: cpu: speculative execution permission faults handling
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
5.5
null
RHSA-2017:1220
Red Hat Security Advisory: java-1.8.0-ibm security update
zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer JDK: XML External Entity Injection (XXE) error when processing XML data OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520) OpenJDK: untrusted extension directories search path in Launcher (JCE, 8163528) OpenJDK: newline injection in the FTP client (Networking, 8170222) OpenJDK: MD5 allowed for jar verification (Security, 8171121) OpenJDK: newline injection in the SMTP client (Networking, 8171533)
[ "cpe:/a:redhat:rhel_extras:6", "cpe:/a:redhat:rhel_extras:7" ]
null
null
3.7
null
RHSA-2021:0808
Red Hat Security Advisory: wpa_supplicant security update
wpa_supplicant: Use-after-free in P2P provision discovery processing
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2018:1060
Red Hat Security Advisory: pcs security update
pcs: Privilege escalation via authorized user malicious REST call pcs: Debug parameter removal bypass, allowing information disclosure rack-protection: Timing attack in authenticity_token.rb
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
3.7
null
RHSA-2020:3495
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update on RHEL 6
keycloak: security headers missing on REST endpoints keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
7.5
null
null
RHSA-2012:0743
Red Hat Security Advisory: kernel security and bug fix update
kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl() kernel: thp: __split_huge_page() mapcount != page_mapcount BUG_ON() kernel: macvtap: zerocopy: vector length is not validated before pinning user pages kvm: device assignment page leak kernel: fcaps: clear the same personality flags as suid when fcaps are used kernel: net: insufficient data_len validation in sock_alloc_send_pskb() kernel: kvm: buffer overflow in kvm_set_irq() kernel: rds-ping cause kernel panic kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race condition
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:1916
Red Hat Security Advisory: httpd and mod_http2 security update
httpd: HTTP request splitting with mod_rewrite and mod_proxy
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
9.8
null
null
RHSA-2021:0313
Red Hat Security Advisory: OpenShift Container Platform 4.5.31 bug fix and security update
openshift/installer: Bootstrap nodes allow anonymous authentication on kubelet port 10250
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
8.1
null
null
RHSA-2021:3934
Red Hat Security Advisory: OpenShift Container Platform 4.9.4 packages and security update
coreos-installer: incorrect signature verification on gzip-compressed install images
[ "cpe:/a:redhat:openshift:4.9::el7", "cpe:/a:redhat:openshift:4.9::el8" ]
null
7.5
null
null
RHSA-2023:4918
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.5 security update on RHEL 7
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" ]
null
7.5
null
null
RHSA-2018:0180
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: pmd can become dirty without going through a COW cycle
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
6.1
null
RHSA-2023:5974
Red Hat Security Advisory: Network Observability security update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:network_observ_optr:1.4.0::el9" ]
null
7.5
null
null
RHSA-2015:1137
Red Hat Security Advisory: kernel security and bug fix update
Kernel: fs: isofs: infinite loop in CE record entries kernel: use-after-free during key garbage collection kernel: isofs: unchecked printing of ER records kernel: panic while flushing nftables rules that reference deleted chains. kernel: Linux stack ASLR implementation Integer overflow kernel: pipe: iovec overrun leading to memory corruption kernel: int80 fork from 64-bit tasks mishandling
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2007:1051
Red Hat Security Advisory: kdegraphics security update
CCITTFaxStream:: lookChar()
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2023:2177
Red Hat Security Advisory: grafana-pcp security and enhancement update
golang: net/http: handle server errors after sending GOAWAY
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2012:0074
Red Hat Security Advisory: jbossweb security update
tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
RHSA-2017:1228
Red Hat Security Advisory: chromium-browser security update
chromium-browser: race condition in webrtc
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2019:1579
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients libvirt: arbitrary command execution via virConnectGetDomainCapabilities API libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2019:3758
Red Hat Security Advisory: patch security update
patch: do_ed_script in pch.c does not block strings beginning with a ! character patch: OS shell command injection when processing crafted patch files
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
7.8
null
RHSA-2025:1723
Red Hat Security Advisory: postgresql:13 security update
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.1
null
null
RHSA-2022:1068
Red Hat Security Advisory: expat security update
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames()
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
9.8
null
null
RHSA-2022:5267
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: buffer overflow in IPsec ESP transformation code kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime" ]
null
7.8
null
null
RHSA-2014:1885
Red Hat Security Advisory: libxml2 security update
libxml2: denial of service via recursive entity expansion
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0223
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.4
null
null
RHSA-2025:1443
Red Hat Security Advisory: nodejs:20 security update
undici: Undici Uses Insufficiently Random Values nodejs: Node.js Worker Thread Exposure via Diagnostics Channel nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
7.7
null
RHSA-2024:5930
Red Hat Security Advisory: bind security update
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
RHSA-2012:1301
Red Hat Security Advisory: JBoss Enterprise Data Services Platform 5.3.0 update
Teiid: JDBC socket does not encrypt client login messages by default
[ "cpe:/a:redhat:jboss_enterprise_data_services:5.3" ]
null
null
null
null
RHSA-2013:0681
Red Hat Security Advisory: jakarta-commons-httpclient security update
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
3.7
null
RHSA-2024:3319
Red Hat Security Advisory: kernel security update
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.8
null
null
RHSA-2011:0465
Red Hat Security Advisory: kdenetwork security update
kdenetwork: incomplete fix for CVE-2010-1000
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:7222
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.2 security and bug fix update
nodejs-semver: Regular expression denial of service tough-cookie: prototype pollution in cookie memstore
[ "cpe:/a:redhat:rhmt:1.8::el8" ]
null
6.5
null
null
RHSA-2009:0344
Red Hat Security Advisory: libsoup security update
libsoup: integer overflow in soup_base64_encode()
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:7769
Red Hat Security Advisory: container-tools:rhel8 security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHBA-2020:0063
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 RPM release advisory
jenkins: Stored XSS vulnerability in expandable textbox form control jenkins: XSS vulnerability in combobox form control jenkins: Stored XSS vulnerability in SCM tag action tooltip jenkins: Stored XSS vulnerability in queue item tooltip jenkins: Diagnostic web page exposed Cookie HTTP header jenkins: XSS vulnerability in Jenkins URL setting golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter
[ "cpe:/a:redhat:openshift:4.3::el7", "cpe:/a:redhat:openshift:4.3::el8" ]
null
5.9
4.8
null
RHSA-2018:0030
Red Hat Security Advisory: libvirt security update
An update for libvirt is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2008:0547
Red Hat Security Advisory: seamonkey security update
Firefox malformed web content flaws Firefox javascript arbitrary code execution Firefox XSS attacks Firefox arbitrary signed JAR code execution Firefox arbitrary JavaScript code execution Firefox javascript arbitrary code execution Firefox arbitrary file disclosure Firefox .properties memory leak Firefox file location escaping flaw Firefox self signed certificate flaw Firefox arbitrary file disclosure Firefox block reflow flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:3044
Red Hat Security Advisory: kpatch-patch security update
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2024:6784
Red Hat Security Advisory: ruby:3.3 security update
rexml: DoS vulnerability in REXML rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> rexml: DoS vulnerability in REXML rexml: DoS vulnerability in REXML
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2018:2700
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 5 security and bug fix update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1" ]
null
null
7.5
null
RHSA-2015:2083
Red Hat Security Advisory: postgresql92-postgresql security update
postgresql: limited memory disclosure flaw in crypt() postgresql: stack overflow DoS when parsing json or jsonb inputs
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2024:0452
Red Hat Security Advisory: curl security update
curl: information disclosure by exploiting a mixed case flaw
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.3
null
null
RHSA-2013:0608
Red Hat Security Advisory: kvm security update
qemu: e1000 driver buffer overflow when processing large packets when SBP and LPE flags are disabled
[ "cpe:/a:redhat:rhel_virtualization:5::server" ]
null
null
null
null
RHSA-2023:7403
Red Hat Security Advisory: pixman security update
pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7
null
null
RHSA-2024:1819
Red Hat Security Advisory: OpenJDK 11.0.23 Security Update for Portable Linux Builds
OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: Pack200 excessive memory allocation (8322114) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
[ "cpe:/a:redhat:openjdk:11" ]
null
3.7
null
null
RHSA-2021:2119
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.6 (tripleo-ansible) security update
tripleo-ansible: ansible.log file is visible to unprivileged users
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2022:1284
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
RHSA-2022:5681
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
7.5
null
null
RHSA-2008:0135
Red Hat Security Advisory: tk security update
Tk GIF processing buffer overflow tk: GIF handling buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHBA-2024:6680
Red Hat Bug Fix Advisory: nss bug fix and enhancement update
Mozilla: Memory corruption in NSS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
6.1
null
null
RHSA-2021:3944
Red Hat Security Advisory: redis:5 security update
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
null
null
RHSA-2011:0347
Red Hat Security Advisory: openldap security update
openldap: forwarded bind failure messages cause success openldap: rootpw not verified via slapd.conf when using the NDB backend openldap: DoS when submitting special MODRDN request
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:0271
Red Hat Security Advisory: systemd security update
systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
7.5
null
RHSA-2004:505
Red Hat Security Advisory: Updated kernel packages fix security vulnerability
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2018:0275
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
artemis/hornetq: memory exhaustion via UDP and JGroups discovery tomcat: Remote Code Execution bypass for CVE-2017-12615 jboss-remoting: High CPU Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
4.3
null
RHSA-2008:0877
Red Hat Security Advisory: jbossweb security update
tomcat: Cross-Site-Scripting enabled by sendError call tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHSA-2024:8180
Red Hat Security Advisory: webkit2gtk3 security update
chromium-browser: Use after free in ANGLE webkit: malicious website may exfiltrate audio data cross-origin webkit: processing malicious web content prevents Content Security Policy from being enforced webkit: maliciously crafted webpage may be able to fingerprint the user webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: A maliciously crafted webpage may be able to fingerprint the user webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: A malicious website may exfiltrate data cross-origin webkit: Processing maliciously crafted web content may lead to memory corruption
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2015:0752
Red Hat Security Advisory: openssl security update
openssl: use-after-free on invalid EC private key import openssl: invalid pointer use in ASN1_TYPE_cmp() openssl: ASN.1 structure reuse memory corruption openssl: X509_to_X509_REQ NULL pointer dereference openssl: PKCS7 NULL pointer dereference openssl: integer underflow leading to buffer overflow in base64 decoding openssl: assertion failure in SSLv2 servers openssl: Divide-and-conquer session key recovery in SSLv2 openssl: SSLv2 Bleichenbacher protection overwrites wrong bytes for export ciphers
[ "cpe:/a:redhat:storage:2.1:server:el6" ]
null
null
null
null
RHSA-2024:8675
Red Hat Security Advisory: buildah security update
buildah: Buildah allows arbitrary directory mount
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2024:2184
Red Hat Security Advisory: libsndfile security update
libsndfile: integer overflow in src/mat4.c and src/au.c leads to DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2024:3859
Red Hat Security Advisory: kernel security update
kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: wifi: mac80211: fix potential key use-after-free
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
5.8
null
null
RHSA-2024:11122
Red Hat Security Advisory: gstreamer1-plugins-good security update
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2022:7323
Red Hat Security Advisory: python3.9 security update
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2023:3490
Red Hat Security Advisory: kpatch-patch security update
kernel: net/ulp: use-after-free in listening ULP sockets kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.8
null
null
RHSA-2023:4464
Red Hat Security Advisory: firefox security update
Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
9.8
null
null
RHSA-2023:3920
Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update
golang: cmd/go: go command may generate unexpected code at build time when using cgo golang: runtime: unexpected behavior of setuid/setgid binaries golang: cmd/go: go command may execute arbitrary code at build time when using cgo golang: cmd/cgo: Arbitrary code execution triggered by linker flags
[ "cpe:/a:redhat:devtools:2023::el7" ]
null
7.5
null
null
RHSA-2003:274
Red Hat Security Advisory: pine security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2022:9071
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.1
null
null
RHSA-2022:5317
Red Hat Security Advisory: libxml2 security update
libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.4
null
null
RHSA-2023:7784
Red Hat Security Advisory: postgresql security update
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2019:4056
Red Hat Security Advisory: kernel security update
kernel: Memory corruption due to incorrect socket cloning Kernel: page cache side channel attacks
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
7.1
null
RHSA-2022:7068
Red Hat Security Advisory: firefox security update
Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHBA-2024:0611
Red Hat Bug Fix Advisory: updated Red Hat Enterprise Linux 9 container images
kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy()
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
RHSA-2018:0055
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2024:0989
Red Hat Security Advisory: Red Hat Multicluster GlobalHub 1.0.2 bug fixes and security updates
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:multicluster_globalhub:1.0::el8" ]
null
8.1
null
null
RHSA-2008:0897
Red Hat Security Advisory: ruby security update
ruby: webrick directory traversal ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS) ruby: multiple insufficient safe mode restrictions ruby: WEBrick DoS vulnerability (CPU consumption) ruby: missing "taintness" checks in dl module ruby: DoS vulnerability in the REXML module ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2006:0592
Red Hat Security Advisory: tomcat security update for Red Hat Application Server
tomcat examples XSS
[ "cpe:/a:redhat:rhel_application_server:1" ]
null
null
null
null
RHSA-2024:9092
Red Hat Security Advisory: freerdp security update
freerdp: Integer Overflow leading to Heap Overflow in freerdp_bitmap_planar_context_reset freerdp: Integer overflow & OutOfBound Write in clear_decompress_residual_data freerdp: integer underflow in nsc_rle_decode freerdp: OutOfBound Read in zgfx_decompress_segment freerdp: OutOfBound Read in planar_skip_plane_rle freerdp: out-of-bounds read in ncrush_decompress freerdp: OutOfBound Read in interleaved_decompress FreeRDP: ExtractRunLengthRegular* out of bound read freerdp: freerdp_image_copy out of bound read freerdp: zgfx_decompress out of memory freerdp: rdp_write_logon_info_v1 NULL access freerdp: out-of-bounds read
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2015:1667
Red Hat Security Advisory: httpd security update
httpd: HTTP request smuggling attack against chunked request parser httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.7
null
RHSA-2020:3864
Red Hat Security Advisory: cups security and bug fix update
cups: DNS rebinding attacks via incorrect whitelist cups: stack-buffer-overflow in libcups's asn1_get_type function cups: stack-buffer-overflow in libcups's asn1_get_packed function
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.5
null