id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2017:1491
Red Hat Security Advisory: kernel security and bug fix update
kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
2.9
null
RHSA-2020:3176
Red Hat Security Advisory: postgresql-jdbc security update
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.7
null
null
RHSA-2020:0688
Red Hat Security Advisory: OpenShift Container Platform 4.2.22 runc security update
runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation
[ "cpe:/a:redhat:openshift:4.2::el8" ]
null
7
null
null
RHSA-2004:157
Red Hat Security Advisory: cadaver security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHBA-2023:3300
Red Hat Bug Fix Advisory: Release of Bug Advisories for the Jenkins image and Jenkins agent base image
dev-java/snakeyaml: DoS via stack overflow
[ "cpe:/a:redhat:ocp_tools:4.12::el8" ]
null
6.5
null
null
RHSA-2020:3598
Red Hat Security Advisory: kernel security and bug fix update
kernel: kernel: DAX hugepages not considered during mremap
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7
null
null
RHBA-2021:1163
Red Hat Bug Fix Advisory: openvswitch2.11 bug fix and enhancement update
openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
7.5
null
null
RHSA-2022:2201
Red Hat Security Advisory: rsync security update
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.2
null
null
RHSA-2022:8940
Red Hat Security Advisory: kernel security and bug fix update
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
7.8
null
null
RHSA-2022:8340
Red Hat Security Advisory: freetype security update
FreeType: Buffer overflow in sfnt_init_face FreeType: Segmentation violation via FNT_Size_Request Freetype: Segmentation violation via FT_Request_Size
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.1
null
null
RHSA-2019:1669
Red Hat Security Advisory: openstack-ironic-inspector security update
openstack-ironic-inspector: SQL Injection vulnerability when receiving introspection data
[ "cpe:/a:redhat:openstack:14::el7" ]
null
null
8.3
null
RHSA-2017:1508
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
openstack-nova: Sensitive information included in legacy notification exception contexts
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
6.1
null
RHSA-2018:1241
Red Hat Security Advisory: OpenShift Container Platform 3.2 security update
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
[ "cpe:/a:redhat:openshift:3.2::el7" ]
null
null
9.9
null
RHSA-2021:0281
Red Hat Security Advisory: OpenShift Container Platform 4.4.33 bug fix and security update
kubernetes: compromised node could escalate to cluster level privileges kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 openshift: builder allows read and write of block devices
[ "cpe:/a:redhat:openshift:4.4::el7", "cpe:/a:redhat:openshift:4.4::el8" ]
null
8.8
null
null
RHSA-2017:3466
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
[ "cpe:/a:redhat:openstack:11::el7" ]
null
null
4.4
null
RHSA-2011:1694
Red Hat Security Advisory: libcap security and bug fix update
capsh: does not chdir after chroot
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0624
Red Hat Security Advisory: libksba security update
libksba: integer overflow to code execution
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
8.6
null
null
RHSA-2017:1105
Red Hat Security Advisory: bind security update
bind: Incorrect error handling causes assertion failure when using DNS64 with "break-dnssec yes;" bind: Processing a response containing CNAME or DNAME with unusual order can crash resolver
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2016:0305
Red Hat Security Advisory: openssl security update
OpenSSL: SSLv2 doesn't block disabled ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
[ "cpe:/o:redhat:rhel_eus:6.6::computenode", "cpe:/o:redhat:rhel_eus:6.6::server", "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
null
null
RHSA-2023:1747
Red Hat Security Advisory: pki-core:10.6 security update
pki-core: access to external entities when parsing XML can lead to XXE
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2024:5520
Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1 security update
kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.8
null
null
RHSA-2004:586
Red Hat Security Advisory: glibc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:0546
Red Hat Security Advisory: ruby:2.5 security update
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
null
null
RHSA-2014:0370
Red Hat Security Advisory: httpd security update
httpd: mod_dav denial of service via crafted DAV WRITE request httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:4021
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
7.1
null
null
RHSA-2016:1034
Red Hat Security Advisory: docker security, bug fix, and enhancement update
docker: privilege escalation via confusion of usernames and UIDs
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
RHSA-2018:2572
Red Hat Security Advisory: Red Hat Enterprise Linux 6.4 Advanced Mission Critical (AMC) Six-Month Notice
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 6.4 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.4.
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
null
null
RHSA-2005:639
Red Hat Security Advisory: kdenetwork security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:0701
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: buffer overflow vulnerability in the IBM JVM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment)
[ "cpe:/a:redhat:rhel_extras:6", "cpe:/a:redhat:rhel_extras:7" ]
null
null
null
null
RHSA-2020:2054
Red Hat Security Advisory: Open Liberty 20.0.0.5 Runtime security update
Open Liberty 20.0.0.5 Runtime is now available from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:openliberty:20" ]
null
null
null
null
RHSA-2017:0359
Red Hat Security Advisory: openstack-puppet-modules security update
puppet-swift: installs config file with world readable permissions
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
6.5
null
RHSA-2024:4846
Red Hat Security Advisory: OpenShift Container Platform 4.13.46 security update
dnspython: denial of service in stub resolver go-retryablehttp: url might write sensitive information to log file
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
6
null
null
RHSA-2024:10696
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-werkzeug) security update
python-werkzeug: user may execute code on a developer's machine
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2010:0924
Red Hat Security Advisory: wireshark security update
wireshark: stack overflow in BER dissector Wireshark: Heap-based buffer overflow in LDSS dissector
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:1793
Red Hat Security Advisory: vim security update
vim/neovim: ': source!' command allows arbitrary command execution via modelines
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
5.3
null
null
RHSA-2022:1728
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
RHSA-2024:11121
Red Hat Security Advisory: gstreamer1-plugins-good security update
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
6.5
null
null
RHSA-2017:2863
Red Hat Security Advisory: kernel security and bug fix update
kernel: Possible heap buffer overflow in brcmf_cfg80211_mgmt_tx()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.8
null
RHSA-2023:5142
Red Hat Security Advisory: .NET 6.0 security and bug fix update
dotnet: Denial of Service with Client Certificates using .NET Kestrel
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
6.5
null
null
RHBA-2021:1167
Red Hat Bug Fix Advisory: Openshift Logging Bug Fix Release (5.0.2)
golang: crypto/elliptic: incorrect operations on the P-224 curve
[ "cpe:/a:redhat:logging:5.0::el8" ]
null
6.5
null
null
RHSA-2018:1347
Red Hat Security Advisory: kernel security update
Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
7.8
null
RHSA-2024:4468
Red Hat Security Advisory: OpenShift Container Platform 4.16.3 security update
goproxy: Denial of service (DoS) via unspecified vectors.
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
7.5
null
null
RHSA-2017:2192
Red Hat Security Advisory: mariadb security and bug fix update
mysql: Incorrect input validation allowing code execution via mysqldump mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unsafe chmod/chown use in init script (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: prepared statement handle use-after-free after disconnect mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2020:4223
Red Hat Security Advisory: OpenShift Container Platform 3.11.306 jenkins security update
jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely'
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
5.4
null
null
RHSA-2008:0196
Red Hat Security Advisory: unzip security update
unzip: free() called for uninitialized or already freed pointer
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:6181
Red Hat Security Advisory: rsync security update
rsync: remote arbitrary files write inside the directories of connecting peers
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.4
null
null
RHSA-2023:0858
Red Hat Security Advisory: kpatch-patch security update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2016:0726
Red Hat Security Advisory: ImageMagick security update
ImageMagick: Insufficient shell characters filtering ImageMagick: File deletion ImageMagick: File moving ImageMagick: Local file read ImageMagick: SSRF vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.4
null
RHSA-2023:2029
Red Hat Security Advisory: OpenShift Security Profiles Operator bug fix update
go-getter: go-getter vulnerable to denial of service via malicious compressed archive containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:openshift_security_profiles_operator_stable:::el8" ]
null
7.3
null
null
RHSA-2020:4500
Red Hat Security Advisory: bind security, bug fix, and enhancement update
bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c bind: truncated TSIG response can lead to an assertion failure bind: remotely triggerable assertion failure in pk11.c bind: incorrect enforcement of update-policy rules of type "subdomain"
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.3
null
null
RHSA-2006:0276
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2017:1125
Red Hat Security Advisory: kernel security and bug fix update
kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
7.8
null
RHSA-2008:0134
Red Hat Security Advisory: tcltk security update
postgresql DoS via infinite loop in regex NFA optimization code Tk GIF processing buffer overflow tk: GIF handling buffer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2021:3144
Red Hat Security Advisory: .NET Core 2.1 on Red Hat Enterprise Linux security and bugfix update
dotnet: Dump file created world-readable
[ "cpe:/a:redhat:rhel_dotnet:2.1::el7" ]
null
5.5
null
null
RHSA-2023:6068
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: TLS handshake bypass
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
8.6
null
null
RHSA-2009:0002
Red Hat Security Advisory: thunderbird security update
Layout engine crashes - Firefox 2 and 3 Layout engine crash - Firefox 3 only JavaScript engine crash - Firefox 3 only Firefox 2 Information stealing via loadBindingDocument Firefox XMLHttpRequest 302 response disclosure Firefox Cross-domain data theft via script redirect error message Firefox errors parsing URLs with control characters Firefox XSS via XBL bindings to unloaded document Firefox JavaScript privilege escalation Firefox XSS vulnerabilities in SessionStore
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2025:0312
Red Hat Security Advisory: raptor2 security update
raptor: integer underflow when normalizing a URI with the turtle parser
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.3
null
null
RHSA-2024:9097
Red Hat Security Advisory: buildah security update
containers/image: digest type does not guarantee valid type net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2024:1239
Red Hat Security Advisory: opencryptoki security update
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.9
null
null
RHSA-2022:0444
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 on OpenJDK for OpenShift image security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
8.8
null
null
RHSA-2023:0468
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
ArgoCD: JWT audience claim is not verified
[ "cpe:/a:redhat:openshift_gitops:1.5::el8" ]
null
8.8
null
null
RHSA-2022:6061
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2021:1796
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference podman: Remote traffic to rootless containers is seen as orginating from localhost
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2020:4647
Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update
freerdp: Out of bound read in cliprdr_server_receive_capabilities freerdp: Out of bound read in update_recv could result in a crash freerdp: Integer overflow in VIDEO channel freerdp: Out of bound read/write in usb redirection channel freerdp: Out of bound access in clear_decompress_subcode_rlex freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu freerdp: out-of-bounds read in update_read_icon_info function freerdp: out of bound read in rfx_process_message_tileset freerdp: double free in update_read_cache_bitmap_v3_order function freerdp: out of bounds read in update_read_bitmap_data function freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function freerdp: out-of-bounds read could result in aborting the session freerdp: out-of-bound read of client memory that is then passed on to the protocol parser freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read freerdp: out-of-bounds read in cliprdr_read_format_list function freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage freerdp: out-of-bounds read in ntlm_read_NegotiateMessage freerdp: out-of-bounds read in irp functions freerdp: out-of-bounds read in gdi.c freerdp: out-of-bounds read in bitmap.c freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.1
null
null
RHSA-2007:0894
Red Hat Security Advisory: mysql security update
mysql DROP privilege not enforced when renaming tables mysql SECURITY INVOKER functions do not drop privileges mysql malformed password crasher New release of MySQL fixes security bugs New release of MySQL fixes security bugs
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2013:1763
Red Hat Security Advisory: ruby193-ruby security update
ruby: heap overflow in floating point parsing
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
RHSA-2018:1202
Red Hat Security Advisory: java-1.8.0-oracle security update
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) JDK: unspecified vulnerability fixed in 8u171 and 10.0.1 (Install) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
5.3
null
RHSA-2016:1978
Red Hat Security Advisory: python-twisted-web security update
Twisted: sets environmental variable based on user supplied Proxy request header
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5
null
RHSA-2023:0387
Red Hat Security Advisory: OpenJDK 8u362 Security Update for Portable Linux Builds
OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
3.7
null
null
RHSA-2023:3291
Red Hat Security Advisory: rh-ruby27-ruby security, bug fix, and enhancement update
ruby/cgi-gem: HTTP response splitting in CGI ruby: ReDoS vulnerability in URI ruby: ReDoS vulnerability in Time
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.3
null
null
RHSA-2019:1174
Red Hat Security Advisory: kernel-rt security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
null
3.8
null
RHSA-2016:1330
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
JGroups: Authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
9.8
null
RHSA-2008:1043
Red Hat Security Advisory: java-1.4.2-bea security update
java-1.4.2-bea as shipped in Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary, contains security flaws and should not be used. This update has been rated as having important security impact by the Red Hat Security Response Team.
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2022:1069
Red Hat Security Advisory: expat security update
expat: Large number of prefixed XML attributes on a single tag can crash libexpat expat: Integer overflow in doProlog in xmlparse.c expat: Integer overflow in addBinding in xmlparse.c expat: Integer overflow in build_model in xmlparse.c expat: Integer overflow in defineAttribute in xmlparse.c expat: Integer overflow in lookup in xmlparse.c expat: Integer overflow in nextScaffoldPart in xmlparse.c expat: Integer overflow in storeAtts in xmlparse.c expat: Integer overflow in function XML_GetBuffer expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2016:2039
Red Hat Security Advisory: python-django security update
python-django: CSRF protection bypass on a site with Google Analytics
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
6.1
null
RHBA-2024:5645
Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update
hw: amd: SMM Lock Bypass
[ "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.5
null
null
RHSA-2019:3725
Red Hat Security Advisory: rh-python36-python security, bug fix, and enhancement update
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib python: Missing salt initialization in _elementtree.c module python: Integer overflow in Modules/_pickle.c allows for memory exhaustion if serializing gigabytes of data python: Cookie domain check returns incorrect results python: NULL pointer dereference using a specially crafted X509 certificate python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms python: email.utils.parseaddr wrongly parses email addresses
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.3
null
RHSA-2024:4406
Red Hat Security Advisory: python3 security update
python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream", "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
6.2
null
null
RHSA-2016:2808
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.2 security update for Tomcat 7
tomcat: Session fixation tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext() tomcat: Usage of vulnerable FileUpload package can result in denial of service
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.1" ]
null
null
7.5
null
RHSA-2023:4889
Red Hat Security Advisory: DevWorkspace Operator 0.22 release
openssh: Remote code execution in ssh-agent PKCS#11 support
[ "cpe:/a:redhat:devworkspace:1.0::el8" ]
null
9.8
null
null
RHSA-2020:4667
Red Hat Security Advisory: mailman:2.1 security and bug fix update
mailman: XSS via file attachments in list archives
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
null
null
RHSA-2022:4651
Red Hat Security Advisory: container-tools:2.0 security update
psgo: Privilege escalation in 'podman top' podman: Default inheritable capabilities for linux container should be empty buildah: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
4.8
null
null
RHBA-2018:0337
Red Hat Bug Fix Advisory: Red Hat Satellite 6.3 Base Libraries
v8: multiple vulnerabilities fixed in Google Chrome version 33.0.1750.146 rubygem-rack: Potential Denial of Service Vulnerability in Rack normalize_params() qpid-proton: reactor sends messages in clear if ssl is requested but not available
[ "cpe:/a:redhat:satellite:6.3::el7", "cpe:/a:redhat:satellite_capsule:6.3::el7" ]
null
null
null
null
RHSA-2004:188
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 2
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2018:0521
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) OpenJDK: GTK library loading use-after-free (AWT, 8185325) JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
RHSA-2019:3134
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
4.7
null
RHSA-2014:0294
Red Hat Security Advisory: XStream security update
XStream: remote code execution due to insecure XML deserialization
[ "cpe:/a:redhat:jboss_data_virtualization:6.0" ]
null
null
null
null
RHSA-2025:0882
Red Hat Security Advisory: libsoup security update
libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
9
null
null
RHSA-2017:2840
Red Hat Security Advisory: dnsmasq security update
dnsmasq: heap overflow in the code responsible for building DNS replies
[ "cpe:/o:redhat:rhel_els:5" ]
null
null
9.8
null
RHSA-2014:1833
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
4.8
null
RHSA-2024:4390
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update
httpd: CONTINUATION frames DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8", "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9" ]
null
7.5
null
null
RHSA-2012:1592
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 update
httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled apache-cxf: Certain child policies of WS-SecurityPolicy 1.1 SupportingToken policy not applied on the client side apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token Mojarra: deployed web applications can read FacesContext from other applications under certain conditions httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled JBoss: Datasource connection manager returns valid connection for wrong credentials when using security-domains apache-cxf: SOAPAction spoofing on document literal web services AS: EJB authorization succeeds for any role when allowed roles list is empty JACC: Security constraints configured for EJBs are incorrectly interpreted and not applied
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2006:0486
Red Hat Security Advisory: mailman security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2009:1321
Red Hat Security Advisory: nfs-utils security and bug fix update
nfs-utils: incorrect use of tcp_wrappers, causing hostname-based rules to be ignored
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:1088
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update
tomcat: information disclosure via XXE when running untrusted web applications httpd: mod_deflate denial of service Tomcat/JBossWeb: XML parser hijack by malicious web application httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5" ]
null
null
null
null
RHSA-2018:0336
Red Hat Security Advisory: Satellite 6.3 security, bug fix, and enhancement update
rubygem-will_paginate: XSS vulnerabilities foreman: models with a 'belongs_to' association to an Organization do not verify association belongs to that Organization V8: integer overflow leading to buffer overflow in Zone::New foreman: inspect in a provisioning template exposes sensitive controller information pulp: Leakage of CA key in pulp-qpid-ssl-cfg pulp: Unsafe use of bash $RANDOM for NSS DB password and seed foreman: privilege escalation through Organization and Locations API foreman: Information disclosure in provisioning template previews foreman: inside discovery-debug, the root password is displayed in plaintext foreman: Persistent XSS in Foreman remote execution plugin foreman: Foreman information leak through unauthorized multiple_checkboxes helper foreman: Information leak through organizations and locations feature foreman: Stored XSS vulnerability in remote execution plugin foreman: Stored XSS in org/loc wizard foreman: Stored XSS via organization/location with HTML in name foreman-debug: missing obfuscation of sensitive information katello-debug: Possible symlink attacks due to use of predictable file names puppet: Unsafe YAML deserialization rubygem-hammer_cli: no verification of API server's SSL certificate foreman: Image password leak Interconnect: Denial of Service vulnerability in Red Hat JBoss AMQ Interconnect katello: SQL inject in errata-related REST API
[ "cpe:/a:redhat:satellite:6.3::el7", "cpe:/a:redhat:satellite_capsule:6.3::el7" ]
null
null
4.3
null
RHBA-2024:1228
Red Hat Bug Fix Advisory: openvswitch3.2 bug fix and enhancement update
openvswitch: openvswitch don't match packets on nd_target field
[ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ]
null
5.5
null
null
RHSA-2024:0413
Red Hat Security Advisory: libxml2 security update
libxml2: integer overflows with XML_PARSE_HUGE libxml2: dict corruption caused by entity reference cycles libxml2: NULL dereference in xmlSchemaFixupComplexType libxml2: Hashing of empty dict strings isn't deterministic libxml2: crafted xml can cause global buffer overflow
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
6.5
null
null
RHSA-2022:7700
Red Hat Security Advisory: gdisk security update
gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.8
null
null
RHSA-2017:1097
Red Hat Security Advisory: Red Hat JBoss Data Grid 7.1
netty: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl infinispan: auth bypass in REST api
[ "cpe:/a:redhat:jboss_data_grid:7.1" ]
null
null
6.5
null