id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2013:0847
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: xen: interrupt remap entries shared and old ones not cleared on AMD IOMMUs
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:1000
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (numpy) security update
|
numpy: buffer overflow in the PyArray_NewFromDescr_int() in ctors.c numpy: buffer overflow in the array_from_pyobj() in fortranobject.c
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.5 | null | null |
RHSA-2010:0652
|
Red Hat Security Advisory: ImageMagick security and bug fix update
|
GraphicsMagick: Integer overflow in the routine creating X11 images
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:5567
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:5821
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
|
QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow QEMU: virtio-net: map leaking on error during receive QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 2.5 | null | null |
RHSA-2020:1074
|
Red Hat Security Advisory: poppler and evince security update
|
poppler: integer overflow in Parser::makeStream in Parser.cc poppler: integer overflow in JPXStream::init function leading to memory consumption poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.6 | null |
RHSA-2013:0604
|
Red Hat Security Advisory: java-1.6.0-openjdk security update
|
OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2004:181
|
Red Hat Security Advisory: : Updated libpng packages fix crash
|
CAN-2004-0421 libpng can access out of bounds memory
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:0857
|
Red Hat Security Advisory: python-pillow security update
|
pillow: Arbitrary Code Execution via the environment parameter
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2022:7177
|
Red Hat Security Advisory: Red Hat Camel for Spring Boot 3.14.5 release and security update
|
google-oauth-client: Token signature not verified
|
[
"cpe:/a:redhat:camel_spring_boot:3.14.5"
] | null | 7.3 | null | null |
RHSA-2023:7368
|
Red Hat Security Advisory: c-ares security update
|
c-ares: buffer overflow in config_sortlist() due to missing string length check
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 8.6 | null | null |
RHSA-2020:0661
|
Red Hat Security Advisory: kernel security and enhancement update
|
kernel: use-after-free in fs/xfs/xfs_super.c kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8 | 6.3 | null |
RHSA-2009:0046
|
Red Hat Security Advisory: ntp security update
|
ntp incorrectly checks for malformed signatures
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:6279
|
Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.11.5
|
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:cert_manager:1.11::el9"
] | null | 7.5 | null | null |
RHSA-2016:2975
|
Red Hat Security Advisory: gstreamer-plugins-good security update
|
gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Invalid memory read in flx_decode_chunks gstreamer-plugins-good: Heap buffer overflow in FLIC decoder
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2013:0164
|
Red Hat Security Advisory: jbossweb security update
|
Web: Bypass of security constraints
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2021:3807
|
Red Hat Security Advisory: 389-ds-base security and bug fix update
|
389-ds-base: CRYPT password hash with asterisk allows any bind attempt to succeed
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2019:1175
|
Red Hat Security Advisory: virt:rhel security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) QEMU: device_tree: heap buffer overflow while loading device tree blob libssh2: Integer overflow in transport read resulting in out of bounds write libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 3.8 | null |
RHSA-2021:1446
|
Red Hat Security Advisory: OpenJDK 11.0.11 Security Update for Portable Linux Builds
|
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
|
[
"cpe:/a:redhat:openjdk:11.0.11"
] | null | 5.3 | null | null |
RHSA-2024:4702
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.23 packages and security update
|
gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2023:0902
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:0288
|
Red Hat Security Advisory: firefox security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:6461
|
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 8.1.3 product release & security update
|
kubelet: Incorrect permissions on Windows containers logs
|
[
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6.1 | null | null |
RHSA-2022:0064
|
Red Hat Security Advisory: openssl security update
|
openssl: Read buffer overruns processing ASN.1 strings
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.4 | null | null |
RHSA-2024:8616
|
Red Hat Security Advisory: kernel security update
|
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2021:5016
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.4 | 6.1 | null |
RHSA-2023:0195
|
Red Hat Security Advisory: java-11-openjdk security and bug fix update
|
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | null | null |
RHSA-2023:1466
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: tun: avoid double free in tun_free_netdev
|
[
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2020:2636
|
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.17.3 container images security update
|
jaegertracing/jaeger: credentials leaked to container logs
|
[
"cpe:/a:redhat:jaeger:1.17::el7"
] | null | 7.1 | null | null |
RHSA-2015:1206
|
Red Hat Security Advisory: openstack-cinder security and bug fix update
|
openstack-cinder: Host file disclosure through qcow2 backing file
|
[
"cpe:/a:redhat:openstack:5::el6",
"cpe:/a:redhat:openstack:5::el7",
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2023:5731
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2009:0011
|
Red Hat Security Advisory: lcms security update
|
lcms: insufficient input validation in ReadEmbeddedTextTag lcms: unsigned -> signed integer cast issue in cmsAllocGamma
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:2748
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Integer overflow in Linux's create_elf_tables function
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2024:0585
|
Red Hat Security Advisory: curl security and bug fix update
|
curl: more POST-after-PUT confusion curl: information disclosure by exploiting a mixed case flaw
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.3 | null | null |
RHSA-2019:3978
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
Kernel: KVM: OOB memory access via mmio ring buffer kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.4 | null |
RHSA-2021:0702
|
Red Hat Security Advisory: grub2 security update
|
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.5 | null | null |
RHBA-2024:1136
|
Red Hat Bug Fix Advisory: podman bug fix update
|
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2018:0878
|
Red Hat Security Advisory: golang security, bug fix, and enhancement update
|
golang: arbitrary code execution during "go get" or "go get -d" golang: smtp.PlainAuth susceptible to man-in-the-middle password harvesting golang: arbitrary code execution during "go get" via C compiler options
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 5.8 | null |
RHSA-2007:0126
|
Red Hat Security Advisory: xorg-x11 security update
|
xserver XC-MISC integer overflow Multiple font integer overflows (CVE-2007-1352) Multiple font integer overflows (CVE-2007-1352) XGetPixel() integer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:5927
|
Red Hat Security Advisory: php:8.0 security update
|
php: Password_verify() always return true with some hash php: 1-byte array overrun in common path resolve code php: DoS vulnerability when parsing multipart request body php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP php: XML loading external entity without being enabled php: phar Buffer mismanagement
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7 | null | null |
RHSA-2022:1070
|
Red Hat Security Advisory: expat security update
|
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames()
|
[
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 9.8 | null | null |
RHSA-2015:1840
|
Red Hat Security Advisory: openldap security update
|
openldap: ber_get_next denial of service vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:0041
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.0 bug fix and security update
|
helm: shows secrets with --dry-run option in clear text opentelemetry: DoS vulnerability in otelhttp golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients coredns: CD bit response is cached and served later quic-go: memory exhaustion attack against QUIC's connection ID mechanism golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON cloudevents/sdk-go: usage of WithRoundTripper to create a Client leaks credentials jose: resource exhaustion jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak webpack-dev-middleware: lack of URL validation may lead to file leak
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.4 | null | null |
RHSA-2023:1842
|
Red Hat Security Advisory: curl security update
|
curl: HTTP multi-header compression denial of service
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.5 | null | null |
RHSA-2024:4749
|
Red Hat Security Advisory: edk2 security update
|
EDK2: integer overflow in CreateHob() could lead to HOB OOB R/W edk2: Predictable TCP Initial Sequence Numbers edk2: Use of a Weak PseudoRandom Number Generator
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2008:0864
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Cross-Site-Scripting enabled by sendError call Tomcat host manager xss - name field tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability
|
[
"cpe:/a:redhat:rhel_developer_suite:3"
] | null | null | null | null |
RHSA-2020:2046
|
Red Hat Security Advisory: thunderbird security update
|
usrsctp: Buffer overflow in AUTH chunk input validation Mozilla: Use-after-free during worker shutdown Mozilla: Arbitrary local file access with 'Copy as cURL' Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 Mozilla: Sender Email Address Spoofing using encoded Unicode characters
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | 6.1 | null |
RHSA-2017:2128
|
Red Hat Security Advisory: gdm and gnome-session security, bug fix, and enhancement update
|
gdm: Crash when holding Escape in log screen
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2011:0910
|
Red Hat Security Advisory: ruby security update
|
ruby: memory corruption in BigDecimal on 64bit platforms Ruby: Symlink race condition by removing directory trees in fileutils module Ruby: Untrusted codes able to modify arbitrary strings
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:5536
|
Red Hat Security Advisory: libvpx security update
|
libvpx: Heap buffer overflow in vp8 encoding in libvpx libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3392
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: race condition for removal of the HCI controller
|
[
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7 | null | null |
RHSA-2024:2036
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2006:0267
|
Red Hat Security Advisory: ipsec-tools security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1308
|
Red Hat Security Advisory: .NET 7.0 security update
|
dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2023:0795
|
Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes
|
golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags
|
[
"cpe:/a:redhat:acm:2.6::el8"
] | null | 7.5 | null | null |
RHSA-2022:0871
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.35 security update
|
CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter workflow-cps: OS command execution through crafted SCM contents workflow-cps-global-lib: OS command execution through crafted SCM contents workflow-multibranch: OS command execution through crafted SCM contents workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps: Password parameters are included from the original build in replayed builds workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability pipeline-build-step: Password parameter default values exposed credentials: Stored XSS vulnerabilities in jenkins plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin
|
[
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 5.4 | null | null |
RHSA-2009:0012
|
Red Hat Security Advisory: netpbm security update
|
jasper: crash in jpc_qcx_getcompparms jasper: multiple integer overflows in jas_alloc calls
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1485
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: various fixes from internal audits chromium-browser: sandbox escape in ppapi chromium-browser: use-after-free in extensions chromium-browser: heap-buffer-overflow in sfntly chromium-browser: same-origin bypass in blink chromium-browser: same-origin bypass in blink chromium-browser: use-after-free in blink chromium-browser: same-origin bypass in v8 chromium-browser: memory corruption in v8 chromium-browser: url spoofing libxml2: Use after free triggered by XPointer paths beginning with range-to chromium-browser: limited same-origin bypass in service workers chromium-browser: origin confusion in proxy authentication chromium-browser: url leakage via pac script chromium-browser: content-security-policy bypass chromium-browser: use after free in extensions chromium-browser: history sniffing with hsts and csp
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2018:3522
|
Red Hat Security Advisory: spice-server security update
|
spice: Possible buffer overflow via invalid monitor configurations
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.1 | null |
RHSA-2015:2656
|
Red Hat Security Advisory: bind security update
|
bind: responses with a malformed class attribute can trigger an assertion failure in db.c
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:3460
|
Red Hat Security Advisory: curl security update
|
curl: HTTP compression denial of service curl: HTTP multi-header compression denial of service
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 6.5 | null | null |
RHSA-2014:0151
|
Red Hat Security Advisory: wget security and bug fix update
|
wget: multiple HTTP client download filename vulnerability [OCERT 2010-001]
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:2068
|
Red Hat Security Advisory: python-pip security update
|
python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHBA-2019:1965
|
Red Hat Bug Fix Advisory: vdsm bug fix update
|
vdsm: privilege escalation to root via systemd_run
|
[
"cpe:/a:redhat:storage:3.4:server:el7"
] | null | null | 6.4 | null |
RHSA-2020:3328
|
Red Hat Security Advisory: Red Hat Ansible Tower 3.7.2-1 - RHEL7 Container
|
Tower: SSRF: Server Side Request Forgery on Credential Tower: SSRF: Server Side Request Forgery on webhooks Tower: Sensitive Data Exposure on Label Tower: Named URLs allow for testing the presence or absence of objects
|
[
"cpe:/a:redhat:ansible_tower:3.7::el7"
] | null | 5.8 | null | null |
RHSA-2024:5439
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.28 bug fix and security update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses python-werkzeug: user may execute code on a developer's machine kernel: net: kernel: UAF in network route management
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.8 | null | null |
RHSA-2022:5235
|
Red Hat Security Advisory: python security update
|
python: CRLF injection via HTTP request method in httplib/http.client python-urllib3: CRLF injection via HTTP request method python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.9 | null | null |
RHSA-2025:2220
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 Openshift Jenkins security update
|
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream json-lib: Mishandling of an unbalanced comment string in json-lib jenkins-plugin/script-security: Jenkins Script Security Plugin File Disclosure Vulnerability jenkins-plugin/workflow-cps: Lack of Approval Check for Rebuilt Jenkins Pipelines jenkins-plugin/pipeline-model-definition: Jenkins Pipeline Declarative Plugin Allows Restart of Builds with Unapproved Jenkinsfile
|
[
"cpe:/a:redhat:ocp_tools:4.15::el8"
] | null | 8 | null | null |
RHSA-2024:3530
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
|
[
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2023:5103
|
Red Hat Security Advisory: OpenShift Virtualization 4.11.6 security and bug fix update
|
openshift: OCP & FIPS mode
|
[
"cpe:/a:redhat:container_native_virtualization:4.11::el8"
] | null | 6.5 | null | null |
RHSA-2011:1534
|
Red Hat Security Advisory: nfs-utils security, bug fix, and enhancement update
|
nfs-utils: mount.nfs fails to anticipate RLIMIT_FSIZE nfs-utils: Improper authentication of an incoming request when an IP based authentication used
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:2126
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents webkitgtk: User password may be read aloud by a text-to-speech accessibility feature webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to a denial of service webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: processing a malicious image may lead to a denial of service webkitgtk: processing malicious web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution webkitgtk: A malicious website may cause unexpected cross-origin behavior
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.6 | null | null |
RHSA-2023:6887
|
Red Hat Security Advisory: java-21-openjdk security and bug fix update
|
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2008:0264
|
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
|
zlib DoS zlib DoS openssl mitm downgrade attack python buffer overflow openssl ASN.1 DoS openssl public key DoS openssl get_shared_ciphers overflow openssl signature forgery openssl sslv2 client code python repr unicode buffer overflow python off-by-one locale.strxfrm() (possible memory disclosure) python imageop module heap corruption
|
[
"cpe:/a:redhat:network_satellite:5.0:el4"
] | null | null | null | null |
RHSA-2020:2757
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
|
[
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 6.5 | 6.5 | null |
RHSA-2023:0842
|
Red Hat Security Advisory: tar security update
|
tar: heap buffer overflow at from_header() in list.c via specially crafted checksum
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2024:4702
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.23 packages and security update
|
gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2023:3156
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 security update
|
openstack-cinder: silently access other user's volumes
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 9.1 | null | null |
RHSA-2019:4344
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: qxl: null pointer dereference while releasing spice resources QEMU: slirp: heap buffer overflow during packet reassembly
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 7 | null |
RHSA-2024:4252
|
Red Hat Security Advisory: nghttp2 security update
|
nghttp2: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2024:0463
|
Red Hat Security Advisory: rpm security update
|
rpm: TOCTOU race in checks for unsafe symlinks rpm: races with chown/chmod/capabilities calls during installation rpm: checks for unsafe symlinks are not performed for intermediary directories
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2016:1912
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Resource Timing API is storing resources sent by the previous page (MFSA 2016-84, MFSA 2016-86) Mozilla: Memory safety bugs fixed in Firefox ESR 45.4 (MFSA 2016-85, MFSA 2016-86) Mozilla: Integer overflow and memory corruption in WebSocketChannel (MFSA 2016-75, MFSA 2016-86) Mozilla: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString (MFSA 2016-85, MFSA 2016-86) Mozilla: Bad cast in nsImageGeometryMixin (MFSA 2016-85, MFSA 2016-86) Mozilla: use-after-free in nsFrameManager::CaptureFrameState (MFSA 2016-85, MFSA 2016-86) Mozilla: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList (MFSA 2016-85, MFSA 2016-86) Mozilla: Heap-use-after-free in nsRefreshDriver::Tick (MFSA 2016-85, MFSA 2016-86) Mozilla: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame (MFSA 2016-85, MFSA 2016-86) Mozilla: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap (MFSA 2016-85, MFSA 2016-86) Mozilla: use-after-free in DOMSVGLength (MFSA 2016-85, MFSA 2016-86) Mozilla: Add-on update site certificate pin expiration (MFSA 2016-85, MFSA 2016-86)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.4 | null |
RHSA-2023:0281
|
Red Hat Security Advisory: sudo security update
|
sudo: arbitrary file write with privileges of the RunAs user
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2023:1556
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: net/ulp: use-after-free in listening ULP sockets
|
[
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2005:571
|
Red Hat Security Advisory: cups security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:4599
|
Red Hat Security Advisory: curl security and bug fix update
|
curl: Incorrect argument check can allow remote servers to overwrite local files
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.4 | null | null |
RHSA-2019:0651
|
Red Hat Security Advisory: Red Hat Ansible Tower 3.4.3
|
Red Hat Ansible Tower 3.4.3
|
[
"cpe:/a:redhat:ansible_tower:3.4::el7"
] | null | null | null | null |
RHSA-2021:0317
|
Red Hat Security Advisory: Red Hat JBoss EAP XP 1.0.4.GA release and security update
|
wildfly: Potential Memory leak in Wildfly when using OpenTracing
|
[
"cpe:/a:redhat:jbosseapxp"
] | null | 5.9 | null | null |
RHSA-2024:3950
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0300
|
Red Hat Security Advisory: Red Hat Network Satellite Server security update
|
Spacewalk: Session fixation flaw Spacewalk: Prone to brute force password guessing attacks
|
[
"cpe:/a:redhat:network_satellite:5.4::el5"
] | null | null | null | null |
RHSA-2021:0154
|
Red Hat Security Advisory: dnsmasq security update
|
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 4 | null | null |
RHSA-2024:10705
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2020:0727
|
Red Hat Security Advisory: Red Hat Data Grid 7.3.3 security update
|
h2: Information Exposure due to insecure handling of permissions in the backup wildfly: Race condition on PID file allows for termination of arbitrary processes by local users undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: flood using empty frames results in excessive resource consumption xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods undertow: Information leak in requests for directories without trailing slashes undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: default typing mishandling leading to remote code execution
|
[
"cpe:/a:redhat:jboss_data_grid:7.3"
] | null | null | 9.8 | null |
RHSA-2018:2526
|
Red Hat Security Advisory: mutt security update
|
mutt: Remote code injection vulnerability to an IMAP mailbox mutt: Remote Code Execution via backquote characters mutt: POP body caching path traversal vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2017:0387
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: kvm: x86: NULL pointer dereference during instruction decode kernel: Race condition in packet_set_ring leads to use after free kernel: State machine confusion bug in vfio driver leading to memory corruption kernel: Integer overflow when using kzalloc in vfio driver
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.3 | null |
RHSA-2015:1565
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: netfilter connection tracking extensions denial of service kernel: execution in the early microcode loader kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements. kernel: ping sockets: use-after-free leading to local privilege escalation
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2024:4499
|
Red Hat Security Advisory: ruby security update
|
rubygem-uri: ReDoS vulnerability - upstream's incomplete fix for CVE-2023-28755 ruby: Buffer overread vulnerability in StringIO ruby: RCE vulnerability with .rdoc_options in RDoc ruby: Arbitrary memory address read vulnerability with Regex search REXML: DoS parsing an XML with many `<`s in an attribute value
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2004:222
|
Red Hat Security Advisory: kdelibs security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2011:1103
|
Red Hat Security Advisory: libpng security update
|
libpng: Invalid read when handling empty sCAL chunks
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:2595
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.36 ose-machine-config-operator-container security update
|
machine-config-operator-container: mmap stressor makes the cluster unresponsive
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.