id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:6551
Red Hat Security Advisory: Red Hat Virtualization security update
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation rsync: remote arbitrary files write inside the directories of connecting peers kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2022:8453
Red Hat Security Advisory: device-mapper-multipath security update
device-mapper-multipath: Regression of CVE-2022-41974 fix in Red Hat Enterprise Linux
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.4
null
null
RHSA-2020:0046
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) JDK: unspecified vulnerability fixed in 8u221 (Deployment) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) JDK: Unrestricted access to diagnostic operations
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
null
8.4
null
RHSA-2018:1459
Red Hat Security Advisory: dhcp security update
dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.5
null
RHSA-2014:0876
Red Hat Security Advisory: ruby193-rubygem-activerecord security update
rubygem-activerecord: SQL injection vulnerability in 'bitstring' quoting
[ "cpe:/a:redhat:rhel_software_collections:1::el6", "cpe:/a:redhat:rhel_software_collections:1::el7" ]
null
null
null
null
RHSA-2024:10803
Red Hat Security Advisory: bzip2 security update
bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail).
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
4.4
null
null
RHSA-2024:6687
Red Hat Security Advisory: OpenShift Container Platform 4.16.13 bug fix and security update
openshift/builder: Path traversal allows command injection in privileged BuildContainer using docker build strategy jose-go: improper handling of highly compressed data openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
9.9
null
null
RHSA-2018:3648
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Out of bounds memory access in V8 chromium-browser: Use-after-free in GPU
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2022:6164
Red Hat Security Advisory: thunderbird security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
7.5
null
RHSA-2024:2003
Red Hat Security Advisory: kernel-rt security update
kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference Kernel: bluetooth: Unauthorized management command execution kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: irdma: Improper access control
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
5.6
null
null
RHSA-2024:8077
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update
OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled jose4j: denial of service via specially crafted JWE wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) braces: fails to limit the number of characters it can handle
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
7.5
null
null
RHSA-2020:1511
Red Hat Security Advisory: git security update
git: Crafted URL containing new lines can cause credential leak
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2016:1270
Red Hat Security Advisory: python-django-horizon security update
python-django-horizon: XSS in client side template
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
null
null
RHSA-2023:3277
Red Hat Security Advisory: kernel security update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
[ "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
7.1
null
null
RHSA-2020:2516
Red Hat Security Advisory: libexif security update
libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
9.1
null
null
RHSA-2015:1196
Red Hat Security Advisory: rh-postgresql94-postgresql security update
postgresql: double-free after authentication timeout postgresql: unanticipated errors from the standard library postgresql: pgcrypto has multiple error messages for decryption with an incorrect key.
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2017:0530
Red Hat Security Advisory: rabbitmq-server security and bug fix update
rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
6.5
null
RHSA-2019:2730
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Memory corruption due to incorrect socket cloning kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: nfs: use-after-free in svc_process_common() kernel: hw: Spectre SWAPGS gadget vulnerability
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
5.9
null
RHSA-2019:3600
Red Hat Security Advisory: gnutls security, bug fix, and enhancement update
gnutls: use-after-free/double-free in certificate verification gnutls: invalid pointer access upon receiving async handshake messages
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
5.9
null
RHSA-2009:1203
Red Hat Security Advisory: subversion security update
subversion: multiple heap overflow issues
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0614
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2022:7007
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
RHSA-2024:9333
Red Hat Security Advisory: openssl and openssl-fips-provider security update
openssl: Unbounded memory growth with session handling in TLSv1.3 openssl: Excessive time spent checking DSA keys and parameters openssl: Use After Free with SSL_free_buffers openssl: SSL_select_next_proto buffer overread
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.6
5.9
null
RHSA-2014:1606
Red Hat Security Advisory: file security and bug fix update
file: out of bounds read in CDF parser file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop file: unrestricted recursion in handling of indirect type rules file: out-of-bounds access in search rules with offsets from input file file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:7441
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update
undertow: Improper State Management in Proxy Protocol parsing causes information leakage ion-java: ion-java: Ion Java StackOverflow vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8", "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9" ]
null
7.5
null
null
RHSA-2014:1801
Red Hat Security Advisory: shim security update
shim: out-of-bounds memory read flaw in DHCPv6 packet processing shim: heap-based buffer overflow flaw in IPv6 address parsing shim: memory corruption flaw when processing Machine Owner Keys (MOKs)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2019:3699
Red Hat Security Advisory: evolution security and bug fix update
evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accounts
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
8.1
null
RHSA-2021:2106
Red Hat Security Advisory: kernel security and bug fix update
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Integer overflow in Intel(R) Graphics Drivers kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state
[ "cpe:/a:redhat:rhel_eus:8.1::crb", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7
null
null
RHSA-2024:6197
Red Hat Security Advisory: ghostscript security update
ghostscript: format string injection leads to shell command execution (SAFER bypass) ghostscript: path traversal and command execution due to path reduction ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.8
null
null
RHSA-2022:5903
Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.0 security update
mysql-connector-java: unauthorized access to critical wildfly-elytron: possible timing attack in ScramServer wildfly-core: Invalid Sensitivity Classification of Vault Expression wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users protobuf-java: potential DoS in the parsing procedure for binary data ant: excessive memory allocation when reading a specially crafted TAR archive netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck netty: control chars in header names may lead to HTTP request smuggling spring-expression: Denial of service via specially crafted SpEL expression com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13" ]
null
7.5
null
null
RHSA-2022:4835
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: security regression for CVE-2018-13405 kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies kernel: buffer overflow in IPsec ESP transformation code
[ "cpe:/a:redhat:rhel_eus:8.4::nfv", "cpe:/a:redhat:rhel_eus:8.4::realtime" ]
null
7.8
null
null
RHSA-2024:0749
Red Hat Security Advisory: unbound security update
unbound: integer overflow in the regional allocator via the ALIGN_UP macro
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
9.8
null
null
RHSA-2008:0157
Red Hat Security Advisory: cups security update
cups: double free vulnerability in process_browse_data()
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:1060
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
This is the 3-year notification of the target date to migrate systems from Red Hat Network Classic Hosted to Red Hat Subscription Management. All systems using Red Hat Network Classic Hosted must be migrated to Red Hat Subscription Management.
[]
null
null
null
null
RHSA-2009:1528
Red Hat Security Advisory: samba security and bug fix update
samba: infinite loop flaw in smbd on unexpected oplock break notification reply
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2021:3770
Red Hat Security Advisory: grafana security update
grafana: Snapshot authentication bypass
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.3
null
null
RHSA-2019:3204
Red Hat Security Advisory: sudo security update
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
7
null
RHSA-2023:4499
Red Hat Security Advisory: thunderbird security update
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2019:0735
Red Hat Security Advisory: katello-installer-base security and enhancement update
katello-installer-base: QMF methods exposed to goferd via qdrouterd
[ "cpe:/a:redhat:satellite:6.4::el7", "cpe:/a:redhat:satellite_capsule:6.4::el7" ]
null
null
8
null
RHSA-2005:587
Red Hat Security Advisory: mozilla security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:0861
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 8 security update
tomcat: XSS in SSI printenv tomcat: local privilege escalation tomcat: Session fixation when using FORM authentication tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6", "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" ]
null
7.6
5
null
RHSA-2025:3807
Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release
next.js: next: authorization bypass in Next.js next.js: Next.js Vulnerable to Denial of Service (DoS) with Server Actions
[ "cpe:/a:redhat:trusted_artifact_signer:1.1::el9" ]
null
5.3
null
null
RHSA-2025:3970
Red Hat Security Advisory: openvswitch3.1 security update
dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
null
7.4
null
RHSA-2008:0602
Red Hat Security Advisory: redhat-ds-base and redhat-ds-admin security and bug fix update
Server: temporary DoS via crafted pattern searches Server: multiple memory leaks
[ "cpe:/a:redhat:directory_server:8::el4", "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
RHSA-2023:4164
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2024:0423
Red Hat Security Advisory: samba security update
samba: GnuTLS gnutls_rnd() can fail and give predictable random values samba: out-of-bounds read in winbind AUTH_CRAP samba: infinite loop in mdssvc RPC service for spotlight samba: type confusion in mdssvc RPC service for spotlight samba: spotlight server-side share path disclosure
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
5.3
null
null
RHSA-2023:5730
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
5.3
null
null
RHSA-2025:0903
Red Hat Security Advisory: libsoup security update
libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
9
null
null
RHSA-2013:0257
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update
apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
RHSA-2019:0590
Red Hat Security Advisory: ansible security and bug fix update
Ansible: Information leak in "user" module ansible: Information disclosure in vvv+ mode with no_log on
[ "cpe:/a:redhat:openstack:14::el7" ]
null
5.3
7.8
null
RHSA-2023:7713
Red Hat Security Advisory: tracker-miners security update
tracker-miners: sandbox escape
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2018:3754
Red Hat Security Advisory: OpenShift Container Platform 3.3 security update
kubernetes: authentication/authorization bypass in the handling of non-101 responses
[ "cpe:/a:redhat:openshift:3.3::el7" ]
null
null
8.8
null
RHSA-2023:1789
Red Hat Security Advisory: firefox security update
Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2007:0074
Red Hat Security Advisory: spamassassin security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:2033
Red Hat Security Advisory: libreswan security and bug fix update
libreswan: Missing PreSharedKey for connection can cause crash
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5
null
null
RHSA-2024:6501
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.12 Update
keycloak: potential bypass of brute force protection keycloak: Leak of configured LDAP bind credentials through the Keycloak admin console wildfly-elytron: org.keycloak/keycloak-services: session fixation in elytron saml adapters
[ "cpe:/a:redhat:build_keycloak:22" ]
null
7.1
null
null
RHSA-2016:2036
Red Hat Security Advisory: Red Hat JBoss A-MQ 6.3 security update
Framework: denial-of-service attack with XML input ObjectMessage: unsafe deserialization bouncycastle: Invalid curve attack allowing to extract private keys activemq: Fileserver web application vulnerability allowing RCE shiro: Security constraint bypass
[ "cpe:/a:redhat:jboss_amq:6.3" ]
null
null
7.3
null
RHSA-2018:2224
Red Hat Security Advisory: Red Hat Enterprise Linux 6.7 Extended Update Support Six-Month Notice
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 6.7 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.7.
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
null
null
RHSA-2023:0123
Red Hat Security Advisory: kpatch-patch security update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
null
null
RHSA-2024:0664
Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2021:3746
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update
httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:"
[ "cpe:/a:redhat:jboss_core_services:1::el7", "cpe:/a:redhat:jboss_core_services:1::el8" ]
null
9
null
null
RHSA-2010:0237
Red Hat Security Advisory: sendmail security and bug fix update
sendmail allows external mail with from address [email protected] sendmail: incorrect verification of SSL certificate with NUL in name
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:2882
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
6.1
null
null
RHSA-2023:1766
Red Hat Security Advisory: openvswitch3.1 security update
openvswitch: ip proto 0 triggers incorrect handling
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
8.2
null
null
RHSA-2021:5071
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-eventlet) security update
python-eventlet: improper handling of highly compressed data and memory allocation with excessive size allows DoS
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
5.3
null
null
RHSA-2020:4481
Red Hat Security Advisory: bluez security update
bluez: Improper access control in subsystem could result in privilege escalation and DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.1
null
null
RHSA-2014:0898
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
PicketLink: XXE via insecure DocumentBuilderFactory usage
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
null
null
RHSA-2023:7540
Red Hat Security Advisory: curl security and bug fix update
curl: cookie injection with none file
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
3.7
null
null
RHSA-2001:142
Red Hat Security Advisory: kernel 2.2 and 2.4
security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2025:2960
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.8
null
null
RHSA-2020:2774
Red Hat Security Advisory: virt:rhel security update
QEMU: vnc: memory leakage upon disconnect QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.6
null
null
RHSA-2024:5453
Red Hat Security Advisory: Fence Agents Remediation 0.4.1 - Security update
fence-agents-remediation: Fence Agent Command Line Options Leads to Remote Code Execution
[ "cpe:/a:redhat:workload_availability_fence_agents_remediation:0.4::el8" ]
null
8.8
null
null
RHSA-2019:0049
Red Hat Security Advisory: systemd security update
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2020:1520
Red Hat Security Advisory: Red Hat JBoss Web Server 5.3 release
tomcat: local privilege escalation tomcat: Session fixation when using FORM authentication tomcat: Regression in handling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el6", "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el8" ]
null
7.6
null
null
RHSA-2010:0613
Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager security update
GUI: Man in the middle attack possible on the GUI to Backend SSL connection
[ "cpe:/a:redhat:enterprise_linux:5::hypervisor" ]
null
null
null
null
RHSA-2013:0763
Red Hat Security Advisory: JBoss Web Framework Kit 2.2.0 update
JDK: XML parsing Denial-Of-Service (6845701) jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
[ "cpe:/a:redhat:jboss_enterprise_web_framework:2.2.0" ]
null
null
3.7
null
RHSA-2023:3447
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update
etcd: Information discosure via debug function golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2024:0950
Red Hat Security Advisory: postgresql:15 security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8
null
null
RHSA-2023:5238
Red Hat Security Advisory: kernel security update
kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2024:6880
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 security update on RHEL 9
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
6.1
null
null
RHSA-2024:0028
Red Hat Security Advisory: thunderbird security update
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2018:0054
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2019:1545
Red Hat Security Advisory: Red Hat Fuse 7.3.1 security update
bsh2: remote code execution via deserialization log4j: Socket receiver deserialization vulnerability uima: XML external entity expansion (XXE) can allow attackers to execute arbitrary code mysql-connector-java: Connector/J unspecified vulnerability (CPU October 2018) thrift: Improper Access Control grants access to files outside the webservers docroot path log4j: deserialization of untrusted data in SocketServer
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
9.8
7.5
null
RHSA-2018:2187
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update
openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() openssl: Insufficient TLS session ticket HMAC length checks openssl: certificate message OOB reads openssl: Carry propagating bug in Montgomery multiplication openssl: Truncated packet could crash via OOB read openssl: BN_mod_exp may produce incorrect results on x86_64 openssl: bn_sqrx8x_internal carry bug on x86_64 openssl: Read/write after SSL object in error state openssl: rsaz_1024_mul_avx2 overflow bug on x86_64
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
null
5.9
null
RHSA-2016:0053
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:1326
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R12 security and bug fix update
infinispan: Unsafe deserialization of malicious object injected into data cache
[ "cpe:/a:redhat:jboss_amq:6.3" ]
null
null
8
null
RHSA-2024:4235
Red Hat Security Advisory: 389-ds security update
389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2019:1467
Red Hat Security Advisory: python security update
python: Information Disclosure due to urlsplit improper NFKC normalization
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
RHSA-2023:4413
Red Hat Security Advisory: openssh security update
openssh: Remote code execution in ssh-agent PKCS#11 support
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
9.8
null
null
RHSA-2020:2067
Red Hat Security Advisory: Red Hat build of Thorntail 2.5.1 security and bug fix update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol keycloak: missing signatures validation on CRL used to verify client certificates HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default keycloak: CSRF check missing in My Resources functionality in the Account Console keycloak: SAML broker does not check existence of signature on document allowing any user impersonation hibernate-validator: safeHTML validator allows XSS xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source cxf: does not restrict the number of message attachments cxf: OpenId Connect token service does not properly validate the clientId jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* jackson-databind: lacks certain net.sf.ehcache blocking SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
8.1
8.1
null
RHSA-2024:2724
Red Hat Security Advisory: git-lfs security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2015:1241
Red Hat Security Advisory: java-1.8.0-oracle security update
OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (2D) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Install) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) OpenJDK: GCM cipher issue causing JVM crash (Security, 8067648) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
3.7
null
RHSA-2022:6133
Red Hat Security Advisory: OpenShift Container Platform 4.10.30 bug fix and security update
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
8.6
null
null
RHSA-2023:4071
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2024:5534
Red Hat Security Advisory: python-setuptools security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.8
null
null
RHSA-2018:1345
Red Hat Security Advisory: kernel security update
Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
7.8
null
RHSA-2025:0361
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.2 release and security update
tomcat: RCE due to TOCTOU issue in JSP compilation
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8", "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9" ]
null
8.1
null
null
RHSA-2005:081
Red Hat Security Advisory: ghostscript security update
temporary file vulnerabilities in various ghostscript scripts.
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:3372
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container security update
golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:service_mesh:1.0::el8" ]
null
7.5
null
null
RHSA-2005:133
Red Hat Security Advisory: xemacs security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null