id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2014:0536
|
Red Hat Security Advisory: mysql55-mysql security update
|
mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:3384
|
Red Hat Security Advisory: liblouis security update
|
liblouis: incomplete fix for CVE-2014-8184
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2024:0050
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.8 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2013:0151
|
Red Hat Security Advisory: JBoss Enterprise Portal Platform 4.3 CP07 security update
|
Web: Bypass of security constraints
|
[
"cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7"
] | null | null | null | null |
RHSA-2018:2585
|
Red Hat Security Advisory: ansible security update
|
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7.8 | null |
RHSA-2024:0430
|
Red Hat Security Advisory: python3 security update
|
python: tarfile module directory traversal python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: CPU denial of service via inefficient IDNA decoder python: use after free in heappushpop() of heapq module python: DoS when processing malformed Apple Property List files in binary format python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.3 | null | null |
RHSA-2022:1469
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update
|
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 5.9 | null | null |
RHSA-2019:4191
|
Red Hat Security Advisory: sudo security update
|
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
|
[
"cpe:/o:redhat:rhel_els:5"
] | null | null | 7 | null |
RHSA-2017:2760
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Stack overflow via ecryptfs and /proc/$pid/environ
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 8.1 | null |
RHSA-2024:7994
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.3 bug fixes and container updates
|
elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
|
[
"cpe:/a:redhat:acm:2.11::el9"
] | null | 8.2 | null | null |
RHSA-2004:119
|
Red Hat Security Advisory: openssl security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:2113
|
Red Hat Security Advisory: pcs security update
|
rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
|
[
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2023:0476
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2023:6324
|
Red Hat Security Advisory: python3.11-pip security update
|
python: tarfile module directory traversal
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2024:4830
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1631
|
Red Hat Security Advisory: python-urllib3 security update
|
python-urllib3: CRLF injection via HTTP request method
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2019:1971
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7 | 6.2 | null |
RHSA-2021:3125
|
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.1.2 security update
|
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2020:3783
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.23 cluster-network-operator-container security update
|
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 7.5 | null | null |
RHSA-2025:1278
|
Red Hat Security Advisory: kernel security update
|
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.3 | null | null |
RHSA-2011:1508
|
Red Hat Security Advisory: cyrus-imapd security update
|
cyrus-imapd: nntpd authentication bypass cyrus-imapd: NULL pointer dereference via crafted References header in email
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:6787
|
Red Hat Security Advisory: Network Observability security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:network_observ_optr:1.4.0::el9"
] | null | 7.5 | null | null |
RHSA-2014:1371
|
Red Hat Security Advisory: nss security update
|
nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es",
"cpe:/o:redhat:rhel_eus:5.9",
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_mission_critical:5.6",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2012:1378
|
Red Hat Security Advisory: openstack-keystone security update
|
Keystone: Lack of authorization for adding users to tenants OpenStack-Keystone: role revocation token issues 2012.1.1: fails to validate tokens in Admin API 2012.1.1: fails to raise Unauthorized user error for disabled tenant
|
[
"cpe:/a:redhat:openstack:1::el6"
] | null | null | null | null |
RHSA-2017:0276
|
Red Hat Security Advisory: bind security update
|
bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2025:1448
|
Red Hat Security Advisory: RHOAI 2.17.0 - Red Hat OpenShift AI
|
cross-spawn: regular expression denial of service golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x nanoid: nanoid mishandles non-integer values
|
[
"cpe:/a:redhat:openshift_ai:2.17::el8"
] | null | 6.5 | 7.1 | null |
RHSA-2024:7482
|
Red Hat Security Advisory: linux-firmware security update
|
kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
RHSA-2015:1685
|
Red Hat Security Advisory: python-keystoneclient security update
|
keystonemiddleware/keystoneclient: S3Token TLS cert verification option not honored
|
[
"cpe:/a:redhat:openstack:5::el6",
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2021:0423
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.17 security and packages update
|
ant: insecure temporary file vulnerability ant: insecure temporary file jenkins: Arbitrary file read vulnerability in workspace browsers jenkins: XSS vulnerability in notification bar jenkins: Improper handling of REST API XML deserialization errors jenkins: Path traversal vulnerability in agent names jenkins: Arbitrary file existence check in file fingerprints jenkins: Excessive memory allocation in graph URLs leads to denial of service jenkins: Stored XSS vulnerability in button labels jenkins: Missing permission check for paths with specific prefix jenkins: Reflected XSS vulnerability in markup formatter preview jenkins: Stored XSS vulnerability on new item page jenkins: Filesystem traversal by privileged users
|
[
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 5.3 | null | null |
RHSA-2010:0018
|
Red Hat Security Advisory: dbus security update
|
dbus: invalid fix for CVE-2008-3834
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1906
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0694
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: splice: lack of generic write checks Kernel: fs: ext4 race condition kernel: soft lockup on aio kernel: NULL pointer dereference in madvise(MADV_WILLNEED) support kernel: xfs: replacing remote attributes memory corruption
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.2 | null |
RHSA-2023:4157
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2024:4645
|
Red Hat Security Advisory: qt5-qtbase security update
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:2950
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c kernel: use-after-free in read in vt_do_kdgkb_ioctl kernel: a race out-of-bound read in vt kernel: improper input validation may lead to privilege escalation kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges kernel: use-after-free in l1oip timer handlers kernel: local privileges escalation in kernel/bpf/verifier.c kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: cxgb4: use-after-free in ch_flower_stats_cb() kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get kernel: local dos vulnerability in scatterwalk_copychunks kernel: null pointer dereference vulnerability in nft_dynset_init() kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c kernel: use-after-free in IPv4 IGMP kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: usb: out-of-bounds read in read_descriptors kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() kernel: netfilter: xtables out-of-bounds read in u32_match_it() kernel: netfilter: xtables sctp out-of-bounds read in match_flags() kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() kernel: rsvp: out-of-bounds read in rsvp_classify() kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: use-after-free in net/atm/ioctl.c kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: team: NULL pointer dereference when team device type is changed kernel: net/core: kernel crash in ETH_P_1588 flow dissector kernel: netfilter: nf_tables: memory leak when more than 255 elements expired kernel: KVM: s390: fix setting of fpc register kernel: netfilter: nf_tables: disallow timeout for anonymous sets kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters kernel: blk-mq: fix IO hang from sbitmap wakeup race
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 4.4 | 5.3 | null |
RHSA-2023:4021
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
|
[
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.1 | null | null |
RHSA-2023:3179
|
Red Hat Security Advisory: Red Hat Integration Camel Extensions For Quarkus 2.13.2-2 security update
|
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
|
[
"cpe:/a:redhat:camel_quarkus:2.13"
] | null | 7.5 | null | null |
RHSA-2020:4310
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2022:6053
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.56 security and bug fix update
|
golang: compress/gzip: stack exhaustion in Reader.Read
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.5 | null | null |
RHSA-2005:072
|
Red Hat Security Advisory: perl-DBI security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:1354
|
Red Hat Security Advisory: rhev-hypervisor6 security update
|
nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73) bash: specially-crafted environment variables can be used to inject shell commands bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2022:4890
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2017:2533
|
Red Hat Security Advisory: bind security update
|
bind: Too long query name causes segmentation fault in lwresd
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server",
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.9 | null |
RHSA-2003:048
|
Red Hat Security Advisory: python security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2013:1011
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update
|
httpd: multiple XSS flaws due to unescaped hostnames tomcat: Limited DoS in chunked transfer encoding input filter httpd: XSS flaw in mod_proxy_balancer manager interface tomcat: Session fixation in form authenticator tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5"
] | null | null | null | null |
RHSA-2018:0093
|
Red Hat Security Advisory: microcode_ctl security update
|
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation",
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server",
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server",
"cpe:/o:redhat:rhel_tus:6.6::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2021:4510
|
Red Hat Security Advisory: lua security update
|
lua: segmentation fault in getlocal and setlocal functions in ldebug.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2007:0964
|
Red Hat Security Advisory: openssl security update
|
openssl: RSA side-channel attack openssl dtls out of order vulnerabilitiy openssl: SSL_get_shared_ciphers() off-by-one
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:4918
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 7
|
jackson-databind: denial of service via a large depth of nested objects netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors h2: Loading of custom classes from remote servers through JNDI xerces-j2: infinite loop when handling specially crafted XML document payloads artemis-commons: Apache ActiveMQ Artemis DoS Moment.js: Path traversal in moment.locale
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 7.5 | null | null |
RHSA-2014:0788
|
Red Hat Security Advisory: mod_wsgi security update
|
mod_wsgi: possible privilege escalation in setuid() failure scenarios mod_wsgi: information leak
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2007:0010
|
Red Hat Security Advisory: koffice security update
|
koffice: update to 1.6.1
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:3138
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c kernel: use-after-free in read in vt_do_kdgkb_ioctl kernel: a race out-of-bound read in vt kernel: improper input validation may lead to privilege escalation kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges kernel: use-after-free in l1oip timer handlers kernel: local privileges escalation in kernel/bpf/verifier.c kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c kernel: Bluetooth: L2CAP: Fix u8 overflow kernel: VMCI: Use threaded irqs instead of tasklets kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: cxgb4: use-after-free in ch_flower_stats_cb() kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get kernel: local dos vulnerability in scatterwalk_copychunks kernel: null pointer dereference vulnerability in nft_dynset_init() kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c kernel: use-after-free in IPv4 IGMP kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: usb: out-of-bounds read in read_descriptors kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() kernel: netfilter: xtables out-of-bounds read in u32_match_it() kernel: netfilter: xtables sctp out-of-bounds read in match_flags() kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() kernel: rsvp: out-of-bounds read in rsvp_classify() kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: use-after-free in net/atm/ioctl.c kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: team: NULL pointer dereference when team device type is changed kernel: net/core: kernel crash in ETH_P_1588 flow dissector kernel: netfilter: nf_tables: memory leak when more than 255 elements expired kernel: KVM: s390: fix setting of fpc register kernel: netfilter: nf_tables: disallow timeout for anonymous sets kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters kernel: blk-mq: fix IO hang from sbitmap wakeup race kernel: i40e: Do not allow untrusted VF to remove administratively set MAC
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | 5.3 | null |
RHSA-2019:2889
|
Red Hat Security Advisory: redhat-virtualization-host security update
|
kernel: vhost-net: guest to host kernel escape during migration
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.2 | null |
RHSA-2012:1538
|
Red Hat Security Advisory: Red Hat Network Satellite server jabberd security update
|
jabberd: Prone to unsolicited XMPP Dialback attacks
|
[
"cpe:/a:redhat:network_satellite:5.5::el5",
"cpe:/a:redhat:network_satellite:5.5::el6"
] | null | null | null | null |
RHSA-2024:3411
|
Red Hat Security Advisory: glibc security update
|
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4 | null | null |
RHSA-2023:5701
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update
|
Ansible: malicious role archive can cause ansible-galaxy to overwrite arbitrary files python-django: Potential denial of service vulnerability in ``django.utils.encoding.uri_to_iri()``
|
[
"cpe:/a:redhat:ansible_automation_platform:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el9"
] | null | 7.5 | null | null |
RHSA-2023:4634
|
Red Hat Security Advisory: rust security update
|
rust-cargo: cargo does not respect the umask when extracting dependencies
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.7 | null | null |
RHSA-2022:4589
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | 7.5 | null |
RHSA-2017:2425
|
Red Hat Security Advisory: rh-postgresql95-postgresql security update
|
postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference postgresql: privilege escalation via crafted database and role names postgresql: Selectivity estimators bypass SELECT privilege checks postgresql: libpq ignores PGREQUIRESSL environment variable postgresql: pg_user_mappings view discloses foreign server passwords
|
[
"cpe:/a:redhat:network_satellite:5.7::el6",
"cpe:/a:redhat:network_satellite_managed_db:5.7::el6"
] | null | null | 6.3 | null |
RHSA-2016:0430
|
Red Hat Security Advisory: xerces-c security update
|
xerces-c: parser crashes on malformed input
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2938
|
Red Hat Security Advisory: .NET Core security and bugfix update
|
dotnet: XML source markup processing remote code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2020:0197
|
Red Hat Security Advisory: python-reportlab security update
|
python-reportlab: code injection in colors.py allows attacker to execute code
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8 | null |
RHSA-2021:3323
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 2.8 | 6.5 | null |
RHSA-2013:1449
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: handling of IPv6 temporary addresses kernel: dm: dm-snapshot data leak kernel: ansi_cprng: off by one error in non-block size request xen: information leak through outs instruction emulation (XSA-67)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:2610
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: Assertion failure when PID 1 receives a zero-length message over notify socket
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null |
RHSA-2021:3364
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors
|
[
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 2.8 | 6.5 | null |
RHSA-2006:0281
|
Red Hat Security Advisory: struts security update for Red Hat Application Server
|
struts bypass validation security flaw struts LookupDispatchAction XSS
|
[
"cpe:/a:redhat:rhel_application_server:1",
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
RHSA-2022:0418
|
Red Hat Security Advisory: varnish:6 security update
|
varnish: HTTP/1 request smuggling vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.1 | null | null |
RHSA-2023:5745
|
Red Hat Security Advisory: OpenJDK 17.0.9 Security Update for Portable Linux Builds
|
freetype: integer overflowin in tt_hvadvance_adjust() in src/truetype/ttgxvar.c OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:openjdk:17"
] | null | 5.3 | null | null |
RHSA-2019:3742
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: qxl: null pointer dereference while releasing spice resources QEMU: slirp: heap buffer overflow during packet reassembly
|
[
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 7 | null |
RHSA-2023:0077
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2024:7699
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0145
|
Red Hat Security Advisory: Red Hat OpenShift Serverless Client kn 1.12.0
|
golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS golang: math/big: panic during recursive division of very large numbers golang: malicious symbol names can lead to code execution at build time golang: improper validation of cgo flags can lead to code execution at build time
|
[
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2021:2355
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: Integer overflow in Intel(R) Graphics Drivers kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7.4 | 6.8 | null |
RHSA-2012:0304
|
Red Hat Security Advisory: vixie-cron security, bug fix, and enhancement update
|
cronie: Race condition by setting timestamp of user's crontab file, when editing the file
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:1668
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
|
[
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2019:0566
|
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
|
openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 4 | null |
RHSA-2012:1200
|
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
|
glibc: incorrect size calculation in formatted printing can lead to FORTIFY_SOURCE format string protection bypass glibc: incorrect use of extend_alloca() in formatted printing can lead to FORTIFY_SOURCE format string protection bypass glibc: printf() unbound alloca() usage in case of positional parameters + many format specs
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2020:4157
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2019:0204
|
Red Hat Security Advisory: systemd security update
|
systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7.5 | null |
RHSA-2013:0145
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free when displaying table with many columns and column groups (MFSA 2013-05) Mozilla: Compartment mismatch with quickstubs returned values (MFSA 2013-09) Mozilla: Address space layout leaked in XBL objects (MFSA 2013-11) Mozilla: Buffer overflow in Javascript string concatenation (MFSA 2013-12) Mozilla: Use-after-free in serializeToStream (MFSA 2013-16) Mozilla: Use-after-free in ListenerManager (MFSA 2013-17) Mozilla: Chrome Object Wrapper (COW) bypass through plugin objects (MFSA 2013-15) Mozilla: URL spoofing in addressbar during page loads (MFSA 2013-04) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Miscellaneous memory safety hazards (rv:10.0.12) (MFSA 2013-01)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:1660
|
Red Hat Security Advisory: mod_auth_mellon security and bug fix update
|
mod_auth_mellon: Open Redirect via the login?ReturnTo= substring which could facilitate information theft
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.1 | null |
RHSA-2017:2771
|
Red Hat Security Advisory: emacs security update
|
emacs: command injection flaw within "enriched mode" handling
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2024:5325
|
Red Hat Security Advisory: firefox security update
|
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.1 | null | null |
RHSA-2024:2580
|
Red Hat Security Advisory: yajl security update
|
yajl: Memory leak in yajl_tree_parse function
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 6.5 | null | null |
RHSA-2019:2977
|
Red Hat Security Advisory: bind security update
|
bind: Limiting simultaneous TCP clients is ineffective
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.6 | null |
RHSA-2019:0342
|
Red Hat Security Advisory: redhat-virtualization-host security update
|
systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.5 | null |
RHSA-2019:2662
|
Red Hat Security Advisory: Red Hat OpenShift Container Platform 4.1 jenkins-2-plugins security update
|
jenkins-plugin-script-security: Sandbox bypass through type casts in Script Security Plugin jenkins-plugin-script-security: Sandbox bypass through method pointer expressions in Script Security Plugin jenkins-plugin-workflow-cps-global-lib: Missing permission check in Pipeline: Shared Groovy Libraries Plugin
|
[
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 4.3 | null |
RHSA-2024:0332
|
Red Hat Security Advisory: ACS 4.1 enhancement update
|
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
|
[
"cpe:/a:redhat:advanced_cluster_security:4.1::el8"
] | null | 7.5 | null | null |
RHSA-2004:597
|
Red Hat Security Advisory: mysql security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:1445
|
Red Hat Security Advisory: OpenJDK 8u292 Windows Builds release and security update
|
OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568) OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
|
[
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 5.3 | null | null |
RHSA-2006:0144
|
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:6849
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ Fuse 6.3 R20 HF1 security and bug fix update
|
activemq-openwire: OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack
|
[
"cpe:/a:redhat:jboss_amq:6.3"
] | null | 9.8 | null | null |
RHSA-2004:600
|
Red Hat Security Advisory: apache, mod_ssl security update
|
httpd mod_digest nonce not verified mod_ssl SSLCipherSuite bypass httpd mod_include SSI overflow
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2012:0899
|
Red Hat Security Advisory: openldap security and bug fix update
|
(slapd): Assertion failure by processing search queries requesting only attributes for particular entry
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:4818
|
Red Hat Security Advisory: mariadb:10.3 security and bug fix update
|
mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref mariadb: save_window_function_values triggers an abort during IN subquery mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause mariadb: Integer overflow in sql_lex.cc integer leading to crash mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join mariadb: improper locking due to unreleased lock in the ds_xbstream.cc mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 5.5 | null | null |
RHSA-2025:0662
|
Red Hat Security Advisory: grafana security update
|
go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHEA-2018:1547
|
Red Hat Enhancement Advisory: openvswitch bug fix and enhancement update
|
dpdk: Information exposure in unchecked guest physical to host virtual address translations
|
[
"cpe:/a:redhat:rhev_manager:4.2"
] | null | null | 6.1 | null |
RHSA-2012:0150
|
Red Hat Security Advisory: Red Hat Enterprise Linux 5.8 kernel update
|
kernel: excessive in kernel CPU consumption when creating large nested epoll structures
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:1202
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 12 security update
|
openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | 7.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.