id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2025:3540
Red Hat Security Advisory: Red Hat Integration Camel K 1.10.10 release and security update.
io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
[ "cpe:/a:redhat:camel_k:1.10.10" ]
null
7.5
null
null
RHSA-2008:0181
Red Hat Security Advisory: krb5 security update
krb5: uninitialized pointer use in krb5kdc krb5: possible leak of sensitive data from krb5kdc using krb4 request krb5: incorrect handling of high-numbered file descriptors in RPC library
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2017:1464
Red Hat Security Advisory: openstack-heat security and bug fix update
openstack-heat: Template source URL allows network port scan openstack-heat: /var/log/heat/ is world readable
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
5.9
null
RHSA-2020:2506
Red Hat Security Advisory: Red Hat JBoss Web Server 5.3.1 security update
tomcat: deserialization flaw in session persistence storage leading to RCE
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el6", "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el8" ]
null
7
null
null
RHSA-2023:1590
Red Hat Security Advisory: kpatch-patch security update
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHBA-2024:10826
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.16.26 packages and security update
cri-o: Checkpoint restore can be triggered from different namespaces
[ "cpe:/a:redhat:openshift:4.16::el8", "cpe:/a:redhat:openshift:4.16::el9" ]
null
7.4
null
null
RHSA-2022:8857
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (erlang) security update
erlang/otp: Client Authentication Bypass
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
9.4
null
null
RHSA-2014:1959
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: insufficient permision checks of netlink messages
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:2184
Red Hat Security Advisory: perl security update
perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.5
null
null
RHSA-2023:7428
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty xorg-x11-server: Use-after-free bug in DestroyWindow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
4.7
null
null
RHSA-2023:5457
Red Hat Security Advisory: frr security update
frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2021:0346
Red Hat Security Advisory: qemu-kvm-ma security update
QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
3.8
null
null
RHSA-2013:1284
Red Hat Security Advisory: ruby193-puppet security update
puppet: remote code execution on master from unauthenticated clients Puppet: resource_type service code execution Puppet: Local Privilege Escalation/Arbitrary Code Execution
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2008:0715
Red Hat Security Advisory: nss_ldap security and bug fix update
nss_ldap randomly replying with wrong user's data
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:1777
Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update
webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Type confusion issue leading to arbitrary code execution webkitgtk: Logic issue leading to HSTS bypass webkitgtk: Out-of-bounds read leading to memory disclosure webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Multiple memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: CSS compositing issue leading to revealing of the browsing history webkitgtk: Logic issue leading to Content Security Policy bypass webkitgtk: Information leak via Content Security Policy reports webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Logic issue leading to universal cross-site scripting webkitgtk: Cross-origin data exfiltration via resource timing API webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create webkitgtk: use-after-free in WebCore::ContainerNode::firstChild webkitgtk: use-after-free in WebCore::Frame::page webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free webkitgtk: logic issue was addressed with improved state management
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2023:7765
Red Hat Security Advisory: podman security update
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2024:1362
Red Hat Security Advisory: OpenShift Container Platform 4.14.17 low-latency extras security update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
5.9
null
null
RHSA-2021:1842
Red Hat Security Advisory: raptor2 security and bug fix update
raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.5
null
null
RHSA-2014:0799
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 update
CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill JAX-RS: Information disclosure via XML eXternal Entity (XXE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2024:10928
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.20 Security update
undertow: information leakage via HTTP/2 request header reuse
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
0
null
null
RHSA-2021:0663
Red Hat Security Advisory: Ansible security and bug fix update (2.9.18)
ansible: user data leak in snmp_facts module module: bitbucket_pipeline_variable exposes secured values ansible: multiple modules expose secured values ansible: basic.py no_log with fallback option
[ "cpe:/a:redhat:ansible_engine:2::el7", "cpe:/a:redhat:ansible_engine:2::el8" ]
null
5
null
null
RHSA-2024:2037
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2014:0745
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2009:0466
Red Hat Security Advisory: java-1.5.0-ibm security update
OpenJDK JMX allows illegal operations with local monitoring (6332953) JRE allows unauthorized file access and connections to localhost JRE allows unauthorized memory read access via a crafted ZIP file OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK RSA public key length denial-of-service (6497740) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753)
[ "cpe:/a:redhat:network_satellite:5.2::el4", "cpe:/a:redhat:network_satellite:5.2::el5" ]
null
null
null
null
RHSA-2023:7389
Red Hat Security Advisory: kernel-rt security update
kernel: use-after-free due to race condition in qdisc_graft() kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free hw: amd: Cross-Process Information Leak kernel: netfilter: potential slab-out-of-bound access due to integer underflow
[ "cpe:/a:redhat:rhel_eus:9.0::nfv", "cpe:/a:redhat:rhel_eus:9.0::realtime" ]
null
7
null
null
RHSA-2017:1647
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: ipv4/tcp: Infinite loop in tcp_splice_read() kernel: nfsd: Incorrect handling of long RPC replies kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
2.9
null
RHSA-2025:1280
Red Hat Security Advisory: kernel-rt security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/a:redhat:rhel_extras_rt_els:7" ]
null
7.3
null
null
RHSA-2023:1286
Red Hat Security Advisory: Migration Toolkit for Runtimes security bug fix and enhancement update
spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow CXF: SSRF Vulnerability
[ "cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8" ]
null
9.8
null
null
RHSA-2017:0212
Red Hat Security Advisory: nagios security update
snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
7.3
null
RHSA-2012:0050
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
qemu: e1000: process_tx_desc legacy mode packets heap overflow
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0100
Red Hat Security Advisory: systemd security and bug fix update
systemd: buffer overrun in format_timespan() function
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2023:5751
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2023:5530
Red Hat Security Advisory: Logging Subsystem 5.7.7 - Red Hat OpenShift security update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:logging:5.7::el8" ]
null
7.5
null
null
RHSA-2005:137
Red Hat Security Advisory: mailman security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:0470
Red Hat Security Advisory: .NET Core 2.1 on Red Hat Enterprise Linux security and bugfix update
dotnet: certificate chain building recursion Denial of Service
[ "cpe:/a:redhat:rhel_dotnet:2.1::el7" ]
null
6.5
null
null
RHSA-2024:4316
Red Hat Security Advisory: OpenShift Container Platform 4.16.2 bug fix and security update
go-retryablehttp: url might write sensitive information to log file
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
6
null
null
RHSA-2024:4563
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.4
null
null
RHSA-2023:2802
Red Hat Security Advisory: container-tools:4.0 security and bug fix update
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions podman: possible information disclosure and modification golang: net/http: handle server errors after sending GOAWAY golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests podman: symlink exchange attack in podman export volume
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.8
null
null
RHSA-2022:0951
Red Hat Security Advisory: expat security update
expat: Large number of prefixed XML attributes on a single tag can crash libexpat expat: Integer overflow in doProlog in xmlparse.c expat: Integer overflow in addBinding in xmlparse.c expat: Integer overflow in build_model in xmlparse.c expat: Integer overflow in defineAttribute in xmlparse.c expat: Integer overflow in lookup in xmlparse.c expat: Integer overflow in nextScaffoldPart in xmlparse.c expat: Integer overflow in storeAtts in xmlparse.c expat: Integer overflow in function XML_GetBuffer expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames()
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
9.8
null
null
RHSA-2016:0072
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6 chromium-browser: bad cast in V8 chromium-browser: use-after-free in PDFium chromium-browser: information leak in Blink chromium-browser: origin confusion in Omnibox chromium-browser: various fixes from internal audits chromium-browser: various fixes from internal audits chromium-browser: weak random number generator in Blink chromium-browser: out-of-bounds read in PDFium chromium-browser: various fixes from internal audits chromium-browser: Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17 chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2018:1204
Red Hat Security Advisory: java-1.8.0-oracle security update
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) JDK: unspecified vulnerability fixed in 8u171 and 10.0.1 (Install) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
[ "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
5.3
null
RHSA-2019:1594
Red Hat Security Advisory: redhat-virtualization-host security update
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.3
null
RHSA-2022:0187
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: fs_context: heap overflow in legacy parameter handling
[ "cpe:/a:redhat:rhel_eus:8.4::nfv", "cpe:/a:redhat:rhel_eus:8.4::realtime" ]
null
7.8
null
null
RHSA-2007:0729
Red Hat Security Advisory: kdegraphics security update
xpdf integer overflow
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2020:0464
Red Hat Security Advisory: 389-ds:1.4 security update
389-ds-base: Read permission check bypass via the deref plugin
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
null
6.5
null
RHSA-2007:0892
Red Hat Security Advisory: krb5 security update
krb5 incomplete fix for CVE-2007-3999
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHEA-2021:5066
Red Hat Enhancement Advisory: MTV 2.2.0 Images
nodejs-axios: Regular expression denial of service in trim function moby: `docker cp` allows unexpected chmod of host file
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.2::el8" ]
null
5.3
null
null
RHSA-2015:1739
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2021:2065
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.7 security update on RHEL 8
keycloak: Internationalized domain name (IDN) homograph attack to impersonate users keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
7.1
null
null
RHSA-2015:1629
Red Hat Security Advisory: mysql55-mysql security update
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Client programs (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2011:0861
Red Hat Security Advisory: subversion security update
(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:2206
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2004:392
Red Hat Security Advisory: php security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHBA-2011:0054
Red Hat Bug Fix Advisory: samba3x bug fix and enhancement update
samba: mount.cifs improper device name and mountpoint strings sanitization samba: Race condition by mount (mount.cifs) operations
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1213
Red Hat Security Advisory: gdm security update
gdm: TOCTTOU race condition on /tmp/.X11-unix
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:0329
Red Hat Security Advisory: openstack-swift security update
openstack-swift: Information leak via Swift tempurls openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects
[ "cpe:/a:redhat:storage:3.1:server:el6" ]
null
null
null
null
RHSA-2015:2517
Red Hat Security Advisory: Red Hat Fuse Service Works 6.0.0 commons-collections security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_fuse_service_works:6.0" ]
null
null
null
null
RHSA-2020:5340
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6" ]
null
7.5
null
null
RHSA-2020:0803
Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-slave-base-rhel7-container security update
openshift/jenkins: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
7
null
null
RHSA-2016:0624
Red Hat Security Advisory: samba3x security update
samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks
[ "cpe:/o:redhat:rhel_aus:5.9", "cpe:/o:redhat:rhel_mission_critical:5.6" ]
null
null
null
null
RHSA-2024:6734
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 7.2.2 product release [security update]
kubelet: Incorrect permissions on Windows containers logs
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
6.1
null
null
RHSA-2023:0811
Red Hat Security Advisory: firefox security update
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2010:0400
Red Hat Security Advisory: tetex security update
xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) xpdf: Multiple integer overflows in JBIG2 decoder xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) xpdf: multiple integer overflows PDF JBIG2 decoder OOB read PDF JBIG2 multiple input validation flaws PDF JBIG2 integer overflow PDF JBIG2 invalid free() PDF JBIG2 NULL dereference PDF JBIG2 MMR decoder buffer overflows PDF JBIG2 MMR infinite loop DoS xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016) xpdf/poppler: ImageStream:: ImageStream integer overflow texlive: Integer overflow by processing special commands dvipng: Multiple array index errors during DVI-to-PNG translation texlive: Integer overflow by processing special commands
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:1151
Red Hat Security Advisory: Satellite 6.11.5 Async Security Update
activerecord: Possible RCE escalation bug with Serialized Columns in Active Record jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
[ "cpe:/a:redhat:satellite:6.11::el7", "cpe:/a:redhat:satellite:6.11::el8", "cpe:/a:redhat:satellite_capsule:6.11::el7", "cpe:/a:redhat:satellite_capsule:6.11::el8", "cpe:/a:redhat:satellite_maintenance:6.11::el7", "cpe:/a:redhat:satellite_maintenance:6.11::el8", "cpe:/a:redhat:satellite_utils:6.11::el7", "cpe:/a:redhat:satellite_utils:6.11::el8" ]
null
7.5
null
null
RHSA-2015:1718
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2013:1041
Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.3.0 update
RichFaces: Remote code execution due to insecure deserialization
[ "cpe:/a:redhat:jboss_enterprise_web_framework:2.3.0" ]
null
null
null
null
RHSA-2011:1100
Red Hat Security Advisory: icedtea-web security update
icedtea-web: home directory path disclosure to untrusted applications icedtea-web: Java Web Start security warning dialog manipulation
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2019:2837
Red Hat Security Advisory: kernel security and bug fix update
Kernel: page cache side channel attacks kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor", "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
6.2
null
RHSA-2016:0049
Red Hat Security Advisory: java-1.8.0-openjdk security update
TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: PBE incorrect key lengths (Libraries, 8138589) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:6944
Red Hat Security Advisory: protobuf-c security update
protobuf-c: unsigned integer overflow in parse_required_member
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.2
null
null
RHSA-2024:4671
Red Hat Security Advisory: thunderbird security update
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in NSS Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2024:1697
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.3 security update
CD: Users with `create` but not `override` privileges can perform local sync argo-cd: Bypassing Brute Force Protection via Application Crash and In-Memory Data Loss argo-cd: Denial of Service Due to Unsafe Array Modification in Multi-threaded Environment argo-cd: Bypassing Rate Limit and Brute Force Protection Using Cache Overflow argo-cd: uncontrolled memory allocation vulnerability
[ "cpe:/a:redhat:openshift_gitops:1.11::el8" ]
null
6.5
null
null
RHSA-2024:1426
Red Hat Security Advisory: postgresql security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8
null
null
RHSA-2022:4587
Red Hat Security Advisory: pcs security update
sinatra: path traversal possible outside of public_dir when serving static files
[ "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
7.5
null
null
RHSA-2014:0133
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:24.3) (MFSA 2014-01) Mozilla: Clone protected content with XBL scopes (MFSA 2014-02) Mozilla: Inconsistent JavaScript handling of access to Window objects (MFSA 2014-13) Mozilla: Incorrect use of discarded images by RasterImage (MFSA 2014-04) Mozilla: Use-after-free with imgRequestProxy and image proccessing (MFSA 2014-08) Mozilla: Cross-origin information leak through web workers (MFSA 2014-09)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2012:1125
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update
OpenSSO: unspecified vulnerability in the authentication component OpenSSO: unspecified vulnerability in the authentication component JNDI: unauthenticated remote write access is permitted by default jruby: hash table collisions DoS (oCERT-2011-003) RESTEasy: XML eXternal Entity (XXE) flaw OpenSSO: Unspecified vulnerability allows remote attackers to affect integrity via unknown vectors RESTEasy: XML eXternal Entity (XXE) flaw JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started
[ "cpe:/a:redhat:jboss_soa_platform:5.3" ]
null
null
null
null
RHSA-2021:1006
Red Hat Security Advisory: OpenShift Container Platform 4.7.5 security and bug fix update
golang: crypto/elliptic: incorrect operations on the P-224 curve gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
7.4
null
null
RHSA-2022:1354
Red Hat Security Advisory: rh-dotnet31-curl security update
curl: Leak of authentication credentials in URL via automatic Referer curl: Bad connection reuse due to flawed path name checks curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols curl: Server responses received before STARTTLS processed after TLS handshake
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
6.1
null
null
RHSA-2013:1172
Red Hat Security Advisory: condor security update
condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2024:2988
Red Hat Security Advisory: container-tools:rhel8 security update
urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. urllib3: Request body not stripped after redirect from 303 status changes request method to GET ssh: Prefix truncation attack on Binary Packet Protocol (BPP) moby/buildkit: Possible race condition with accessing subpaths from cache mounts
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2025:3612
Red Hat Security Advisory: libxslt security update
libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) libxslt: Use-After-Free in libxslt numbers.c
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.8
null
null
RHSA-2022:4999
Red Hat Security Advisory: OpenShift Container Platform 3.11.715 packages and security update
cri-o: memory exhaustion on the node when access to the kube api
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
6.8
null
null
RHSA-2010:0361
Red Hat Security Advisory: sudo security update
sudo: incomplete fix for the sudoedit privilege escalation issue CVE-2010-0426
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:1852
Red Hat Security Advisory: ghostscript security, bug fix, and enhancement update
ghostscript: use-after-free vulnerability in igc_reloc_struct_ptr() could result in DoS ghostscript: buffer overflow in lprn_is_black() in contrib/lips4/gdevlprn.c could result in a DoS ghostscript: buffer overflow in pj_common_print_page() in devices/gdevpjet.c could result in a DoS ghostscript: buffer overflow in cif_print_page() in devices/gdevcif.c could result in a DoS ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a DoS ghostscript: buffer overflow in contrib/gdevdj9.c could result in a DoS ghostscript: buffer overflow in mj_raster_cmd() in contrib/japanese/gdevmjc.c could result in a DoS ghostscript: NULL pointer dereference in compose_group_nonknockout_nonblend_isolated_allmask_common() in base/gxblend.c could result in a DoS ghostscript: buffer overflow in epsc_print_page() in devices/gdevepsc.c could result in a DoS ghostscript: NULL pointer dereference in clj_media_size() in devices/gdevclj.c could result in a DoS ghostscript: buffer overflow in GetNumWrongData() in contrib/lips4/gdevlips.c could result in a DoS ghostscript: buffer overflow in FloydSteinbergDitheringC() in contrib/gdevbjca.c could result in a DoS ghostscript: buffer overflow in mj_color_correct() in contrib/japanese/gdevmjc.c could result in a DoS ghostscript: division by zero in bj10v_print_page() in contrib/japanese/gdev10v.c could result in a DoS ghostscript: buffer overflow in tiff12_print_page() in devices/gdevtfnx.c could result in a DoS ghostscript: buffer overflow in okiibm_print_page1() in devices/gdevokii.c could result in a DoS ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a privilege escalation ghostscript: use-after-free in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation ghostscript: buffer overflow in image_render_color_thresh() in base/gxicolor.c could result in a DoS ghostscript: buffer overflow in pcx_write_rle() in contrib/japanese/gdev10v.c could result in a DoS ghostscript: NULL pointer dereference in devices/gdevtsep.c could result in a DoS ghostscript: NULL pointer dereference in devices/vector/gdevtxtw.c and psi/zbfont.c could result in a DoS ghostscript: buffer overflow in p_print_image() in devices/gdevcdj.c could result in a DoS ghostscript: buffer overflow in lxm5700m_print_page() in devices/gdevlxm.c could result in a DoS ghostscript: division by zero in dot24_print_page() in devices/gdevdm24.c could result in a DoS ghostscript: buffer overflow in GetNumSameData() in contrib/lips4/gdevlips.c could result in a DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
RHSA-2007:0730
Red Hat Security Advisory: gpdf security update
xpdf integer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:1328
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.9.3 security and bug fix container updates
opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics helm: Dependency management path traversal helm: Missing YAML Content Leads To Panic
[ "cpe:/a:redhat:acm:2.9::el8" ]
null
7.5
null
null
RHSA-2011:1526
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
glibc: ldd unexpected code execution issue glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:2692
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 6 security update
wildfly: XSS via admin console when creating roles in domain mode netty: Request smuggling via content-length header
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6" ]
null
5.9
null
null
RHSA-2007:1063
Red Hat Security Advisory: pcre security update
pcre integer overflow pcre regular expression flaws
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:10942
Red Hat Security Advisory: kernel:5.14.0 security update
kernel: nouveau: lock the client object tree. kernel: filelock: fix potential use-after-free in posix_lock_inode kernel: powerpc/eeh: avoid possible crash when edev->pdev changes kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible kernel: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() kernel: bpf: Fix a sdiv overflow issue kernel: bpf: Fix out-of-bounds write in trie_get_next_key()
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb", "cpe:/a:redhat:rhel_eus:9.4::nfv", "cpe:/a:redhat:rhel_eus:9.4::realtime", "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
6.7
null
null
RHSA-2024:3401
Red Hat Security Advisory: rpm-ostree security update
rpm-ostree: world-readable /etc/shadow file
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.2
null
null
RHSA-2016:0008
Red Hat Security Advisory: openssl security update
TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:0691
Red Hat Security Advisory: openvswitch2.17 security, bug fix and enhancement update
openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV
[ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ]
null
9.8
null
null
RHSA-2023:4421
Red Hat Security Advisory: OpenShift Virtualization 4.12.5 security and bug fix update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding openshift: OCP & FIPS mode golang: html/template: improper handling of JavaScript whitespace
[ "cpe:/a:redhat:container_native_virtualization:4.12::el8" ]
null
8.1
null
null
RHSA-2021:2992
Red Hat Security Advisory: rh-php73-php security, bug fix, and enhancement update
php: Use of freed hash key in the phar_parse_zipfile function php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo php: NULL pointer dereference in SoapClient php: SSRF bypass in FILTER_VALIDATE_URL
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.3
null
null
RHSA-2023:2085
Red Hat Security Advisory: libwebp security update
Mozilla: libwebp: Double-free in libwebp
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2021:4033
Red Hat Security Advisory: binutils security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.5
null
null
RHSA-2016:1994
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.x - 3 Month End Of Life Notice
This is the 3 Month notification for the End of Production Phase 1 of Red Hat OpenShift Enterprise 2.x (2.0, 2.1 and 2.2).
[ "cpe:/a:redhat:openshift:2.0::enterprise" ]
null
null
null
null
RHSA-2020:5149
Red Hat Security Advisory: Release of OpenShift Serverless 1.11.0
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:serverless:1.11::el8" ]
null
7.5
null
null
RHSA-2025:3684
Red Hat Security Advisory: tomcat security update
tomcat: RCE due to TOCTOU issue in JSP compilation tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.6
null
null