id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:4692
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server argocd: Login screen allows message spoofing if SSO is enabled argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled
|
[
"cpe:/a:redhat:openshift_gitops:1.4::el8"
] | null | 10 | null | null |
RHSA-2021:5108
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.z security update
|
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 8.1 | null | null |
RHSA-2008:0210
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
java-1.5.0 Privilege escalation via unstrusted applet and application Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Java Plugin same-origin-policy bypass JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194) Java-API calls in untrusted Javascript allow network privilege escalation Buffer overflow security vulnerabilities in Java Web Start
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2022:6941
|
Red Hat Security Advisory: Red Hat build of Quarkus Platform 2.7.6.SP1 and security update
|
snakeyaml: Denial of Service due to missing nested depth limitation for collections
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2002:146
|
Red Hat Security Advisory: mod_ssl security update for Stronghold
|
security flaw
|
[
"cpe:/a:redhat:rhel_stronghold:4"
] | null | null | null | null |
RHSA-2018:1269
|
Red Hat Security Advisory: glusterfs security update
|
glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)
|
[
"cpe:/a:redhat:storage:3.3:server:el7",
"cpe:/a:redhat:storage:3:client:el7",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 8 | null |
RHSA-2024:1687
|
Red Hat Security Advisory: nodejs:20 security update
|
nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization nodejs: code injection and privilege escalation through Linux capabilities nodejs: path traversal by monkey-patching buffer internals nodejs: setuid() does not drop all privileges due to io_uring nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2010:0987
|
Red Hat Security Advisory: java-1.6.0-ibm security and bug fix update
|
TLS: MITM attacks via session renegotiation krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) OpenJDK Swing unsafe reflection usage (6622002) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in 2D component OpenJDK Swing mutable static (6938813) JDK unspecified vulnerability in Java Web Start component JDK unspecified vulnerability in Networking component OpenJDK IndexColorModel double-free (6925710) OpenJDK: unspecified vulnerability in Deployment component OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:3741
|
Red Hat Security Advisory: c-ares security update
|
c-ares: 0-byte UDP payload Denial of Service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2016:2586
|
Red Hat Security Advisory: python security, bug fix, and enhancement update
|
python: Heap overflow in zipimporter module
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.5 | null |
RHSA-2024:4829
|
Red Hat Security Advisory: freeradius:3.0 security update
|
freeradius: forgery attack
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 9 | null | null |
RHSA-2019:1423
|
Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.11 jenkins-2-plugins security update
|
jenkins-plugin-script-security: Sandbox bypass in Script Security Plugin and Pipeline: Groovy Plugin (SECURITY-1353) jenkins-plugin-workflow-cps: Sandbox bypass in Script Security Plugin and Pipeline: Groovy Plugin (SECURITY-1353) jenkins-plugin-lockable-resources: XSS vulnerability in Lockable Resources Plugin (SECURITY-1361)
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 6.1 | null |
RHSA-2020:1702
|
Red Hat Security Advisory: rsyslog security, bug fix, and enhancement update
|
rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2023:4165
|
Red Hat Security Advisory: java-11-openjdk security and bug fix update
|
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2016:2676
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution issues fixed in APSB16-37 flash-plugin: multiple code execution issues fixed in APSB16-37 flash-plugin: multiple code execution issues fixed in APSB16-37 flash-plugin: multiple code execution issues fixed in APSB16-37 flash-plugin: multiple code execution issues fixed in APSB16-37 flash-plugin: multiple code execution issues fixed in APSB16-37 flash-plugin: multiple code execution issues fixed in APSB16-37 flash-plugin: multiple code execution issues fixed in APSB16-37 flash-plugin: multiple code execution issues fixed in APSB16-37
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2025:1329
|
Red Hat Security Advisory: doxygen security update
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.1 | null | null |
RHSA-2013:0276
|
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
|
libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks
|
[
"cpe:/a:redhat:storage:3:server:el6",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:1256
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.15 update on RHEL 5
|
Resteasy: Yaml unmarshalling vulnerable to RCE
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 8.1 | null |
RHSA-2015:1193
|
Red Hat Security Advisory: xerces-c security update
|
xerces-c: crashes on malformed input
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2019:4192
|
Red Hat Security Advisory: rh-maven35-jackson-databind security update
|
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2019:3390
|
Red Hat Security Advisory: qt5-qtbase security and bug fix update
|
qt5-qtbase: Double free in QXmlStreamReader qt5-qtbase: QImage allocation failure in qgifhandler qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 3.3 | null |
RHSA-2007:0001
|
Red Hat Security Advisory: openoffice.org security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1781
|
Red Hat Security Advisory: bind9.16 security update
|
bind9: Parsing large DNS messages may cause excessive CPU load bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind9: Specific recursive query patterns may lead to an out-of-memory condition bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2021:3027
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 2.8 | 6.5 | null |
RHSA-2022:5052
|
Red Hat Security Advisory: xz security update
|
gzip: arbitrary-file-write vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2016:2872
|
Red Hat Security Advisory: sudo security update
|
sudo: noexec bypass via system() and popen() sudo: noexec bypass via wordexp()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.4 | null |
RHSA-2017:3002
|
Red Hat Security Advisory: rh-nodejs4-nodejs security and bug fix update
|
nodejs: Constant Hashtable Seeds vulnerability
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 7.5 | null |
RHSA-2024:3414
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: inactive elements in nft_pipapo_walk kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption
|
[
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 6.7 | null | null |
RHSA-2025:3385
|
Red Hat Security Advisory: freetype security update
|
freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 8.1 | null | null |
RHSA-2023:4909
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.4 release and security update
|
apr: integer overflow/wraparound in apr_encode FileUpload: FileUpload DoS with excessive parts tomcat: not including the secure attribute causes information disclosure tomcat: Fix for CVE-2023-24998 was incomplete
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9"
] | null | 7.5 | null | null |
RHEA-2023:7311
|
Red Hat Enhancement Advisory: go-toolset-container bug fix and enhancement update
|
golang: cmd/go: line directives allows arbitrary execution during build
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2018:3005
|
Red Hat Security Advisory: firefox security and bug fix update
|
Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 Mozilla: Crash with nested event loops Mozilla: Integer overflow during Unicode conversion while loading JavaScript Mozilla: WebExtension bypass of domain restrictions through header rewriting Mozilla: WebExtension content scripts can execute in disallowed contexts Mozilla: WebExtension local file permission check bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.1 | null |
RHSA-2025:0830
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.33 packages and security update
|
podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
|
[
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9",
"cpe:/a:redhat:openshift_ironic:4.16::el9"
] | null | 6.3 | null | null |
RHSA-2003:102
|
Red Hat Security Advisory: openssl security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHBA-2019:1570
|
Red Hat Bug Fix Advisory: ovirt-engine-api-explorer bug fix and enhancement update for RHV 4.3.4
|
bootstrap: XSS in the data-target attribute bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection
|
[
"cpe:/a:redhat:rhev_manager:4.3"
] | null | null | 5.6 | null |
RHSA-2022:7401
|
Red Hat Security Advisory: OpenShift Container Platform 4.12 security update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: crash in a golang.org/x/crypto/ssh server
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2023:5396
|
Red Hat Security Advisory: Red Hat Data Grid 8.4.4 security update
|
mina-sshd: Java unsafe deserialization vulnerability infispan: REST bulk ops don't check permissions infinispan: Non-admins should not be able to get cache config via REST API infinispan: circular reference on marshalling leads to DoS netty: SniHandler 16MB allocation leads to OOM jackson-databind: denial of service via cylic dependencies apache-mina-sshd: information exposure in SFTP server implementations
|
[
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 4.3 | null | null |
RHSA-2006:0676
|
Red Hat Security Advisory: seamonkey security update
|
security flaw security flaw security flaw security flaw security flaw security flaw seamonkey < 1.0.5 multiple vulnerabilities; to replace Mozilla
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:1650
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.1 security update
|
openssl: Bignum squaring may produce incorrect results openssl: only allow ephemeral RSA keys in export ciphersuites (FREAK) openssl: EVP_EncodeUpdate overflow openssl: EVP_EncryptUpdate overflow mod_cluster: remotely Segfault Apache http server HTTPD: sets environmental variable based on user supplied Proxy request header
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | 5 | null |
RHSA-2011:1536
|
Red Hat Security Advisory: sos security, bug fix, and enhancement update
|
sos: sosreport is gathering certificate-based RHN entitlement private keys
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:3389
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise security, bug fix, and enhancement update
|
3: authentication bypass for elasticsearch with external routes
|
[
"cpe:/a:redhat:openshift:3.4::el7",
"cpe:/a:redhat:openshift:3.5::el7",
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 6.5 | null |
RHSA-2020:4347
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2021:2168
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: userspace applications can misuse the KVM API to cause a write of 16 bytes at an offset up to 32 GB from vcpu->run kernel: nitro_enclaves stale file descriptors on failed usercopy
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2007:0710
|
Red Hat Security Advisory: wireshark security update
|
Wireshark crashes when inspecting HTTP traffic Wireshark crashes when inspecting iSeries traffic Wireshark loops infinitely when inspecting DCP ETSI traffic Wireshark crashes when inspecting MMS traffic Wireshark corrupts the stack when inspecting BOOTP traffic
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0564
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 update
|
JBossSX/PicketBox: World readable audit.log file
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2010:0062
|
Red Hat Security Advisory: bind security update
|
BIND DNSSEC NSEC/NSEC3 validation code could cause bogus NXDOMAIN responses BIND upstream fix for CVE-2009-4022 is incomplete bind: out-of-bailiwick data vulnerability due to regression while fixing CVE-2009-4022
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5691
|
Red Hat Security Advisory: bind security update
|
bind: stack exhaustion in control channel code may lead to DoS
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2022:6702
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2018:1204
|
Red Hat Security Advisory: java-1.8.0-oracle security update
|
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) JDK: unspecified vulnerability fixed in 8u171 and 10.0.1 (Install) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 5.3 | null |
RHSA-2009:1145
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP05 update
|
tomcat request dispatcher information disclosure vulnerability tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHBA-2021:0625
|
Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update
|
hw: Vector Register Leakage-Active
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 2.8 | null | null |
RHSA-2019:2343
|
Red Hat Security Advisory: httpd security and bug fix update
|
httpd: mod_auth_digest: access control bypass due to race condition httpd: URL normalization inconsistency
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2022:6541
|
Red Hat Security Advisory: php:7.4 security update
|
Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked Archive_Tar: improper filename sanitization leads to file overwrites Archive_Tar: directory traversal due to inadequate checking of symbolic links
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2020:1011
|
Red Hat Security Advisory: expat security update
|
expat: Integer overflow leading to buffer overflow in XML_GetBuffer()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:1410
|
Red Hat Security Advisory: 389-ds:1.4 security and bug fix update
|
389-ds-base: double free of the virtual attribute context in persistent search
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0603
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Revocation status of S/Mime signature certificates was not checked
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHBA-2008:0314
|
Red Hat Bug Fix Advisory: Updated kernel packages for Red Hat Enterprise Linux 5.2
|
kernel-xen 3.1.1 virtual guest system denial of service (hypervisor crash) possibility kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:6347
|
Red Hat Security Advisory: VolSync 0.5 security fixes and updates
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: crash in a golang.org/x/crypto/ssh server golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:acm:2.6::el8"
] | null | 6.5 | null | null |
RHSA-2008:0191
|
Red Hat Security Advisory: redhat-idm-console security update
|
server: insecure permissions on fedora/redhat-idm-console
|
[
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2024:4200
|
Red Hat Security Advisory: libreswan security update
|
libreswan: IKEv1 default AH/ESP responder can crash and restart
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.5 | null | null |
RHSA-2008:0982
|
Red Hat Security Advisory: gnutls security update
|
gnutls: certificate chain verification flaw
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:4278
|
Red Hat Security Advisory: kernel security update
|
kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 5.3 | null | null |
RHSA-2023:1297
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.32 security and extras update
|
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7 | null | null |
RHSA-2020:0813
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
|
undertow: AJP File Read/Inclusion Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 7.6 | null | null |
RHSA-2010:0113
|
Red Hat Security Advisory: seamonkey security update
|
Mozilla incorrectly frees used memory (MFSA 2010-03) Mozilla crashes with evidence of memory corruption (MFSA 2010-01) firefox/thunderbird/seamonkey: browser chrome defacement via cached XUL stylesheets (MFSA 2010-14) firefox/thunderbird/seamonkey: XSS using addEventListener and setTimeout on a wrapped object (MFSA 2010-12)
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0934
|
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
|
gin: Unsanitized input in the default logger in github.com/gin-gonic/gin glob-parent: Regular Expression Denial of Service express: "qs" prototype poisoning causes the hang of the node process loader-utils: prototype pollution in function parseQuery in parseQuery.js loader-utils: Regular expression denial of service golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing json5: Prototype Pollution in JSON5 via Parse Method
|
[
"cpe:/a:redhat:migration_toolkit_applications:6.0::el8"
] | null | 8.8 | null | null |
RHSA-2024:8788
|
Red Hat Security Advisory: krb5 security update
|
freeradius: forgery attack
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 9 | null | null |
RHSA-2015:0719
|
Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.7.0 security update
|
RichFaces: Remote Command Execution via insufficient EL parameter sanitization
|
[
"cpe:/a:redhat:jboss_enterprise_web_framework:2.7.0"
] | null | null | null | null |
RHSA-2021:0019
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free kernel: use-after-free in drivers/bluetooth/hci_ldisc.c kernel: out-of-bounds write via crafted keycode table
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 6.7 | null | null |
RHSA-2024:0778
|
Red Hat Security Advisory: Jenkins and Jenkins-2-plugins security update
|
google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization maven: Block repositories using http by default golang: go/parser: stack exhaustion in all Parse* functions snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE guava: insecure temporary directory creation springframework: Spring Expression DoS Vulnerability spring-security: Empty SecurityContext Is Not Properly Saved Upon Logout jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents Jenkins: Open redirect vulnerability in OpenShift Login Plugin jetty: Improper validation of HTTP/1 content-length jenkins-plugins: cloudbees-folder: CSRF vulnerability in Folders Plugin jenkins-plugins: cloudbees-folder: Information disclosure in Folders Plugin jenkins-plugins: config-file-provider: Improper masking of credentials in Config File Provider Plugin jenkins-plugins: blueocean: CSRF vulnerability in Blue Ocean Plugin allows capturing credentials jenkins: Arbitrary file read vulnerability through the CLI can lead to RCE jenkins: cross-site WebSocket hijacking
|
[
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 8.8 | null | null |
RHSA-2022:6756
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) JDK: exposure of sensitive information using a combination of flaws and configurations
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | 7.5 | null | null |
RHSA-2023:6494
|
Red Hat Security Advisory: python3.11 security update
|
python: tarfile module directory traversal python: file path truncation at \0 characters
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2021:1547
|
Red Hat Security Advisory: .NET Core 3.1 on Red Hat Enterprise Linux security and bugfix update
|
dotnet: .NET Core single-file application privilege escalation
|
[
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 7.3 | null | null |
RHSA-2022:7276
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.8 security fixes and container updates
|
search-api: SQL injection leads to remote denial of service terser: insecure use of regular expressions leads to ReDoS moment: inefficient parsing algorithm resulting in DoS nodejs: undici vulnerable to CRLF via content headers nodejs: undici.request vulnerable to SSRF
|
[
"cpe:/a:redhat:acm:2.4::el8"
] | null | 5.3 | null | null |
RHSA-2024:11003
|
Red Hat Security Advisory: unbound security update
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2015:0271
|
Red Hat Security Advisory: Red Hat Enterprise Linux 5.9 Extended Update Support One-Month Notice
|
This is the One-Month notification for the retirement of Red Hat Enterprise
Linux 5.9 Extended Update Support (EUS). This notification applies only to
those customers subscribed to the Extended Update Support (EUS) channel for
Red Hat Enterprise Linux 5.9.
|
[
"cpe:/o:redhat:rhel_eus:5.9"
] | null | null | null | null |
RHSA-2024:1408
|
Red Hat Security Advisory: emacs security update
|
emacs: command execution via shell metacharacters emacs: command injection vulnerability in htmlfontify.el
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHSA-2022:4829
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: security regression for CVE-2018-13405 kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies kernel: buffer overflow in IPsec ESP transformation code
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2022:5802
|
Red Hat Security Advisory: kernel security update
|
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2022:0989
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-qpid-apache) security update
|
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.3 | null | null |
RHSA-2021:3971
|
Red Hat Security Advisory: Red Hat OpenStack Platform 10.0 (redis) security update
|
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | 7.5 | null | null |
RHSA-2024:1108
|
Red Hat Security Advisory: gnutls security update
|
gnutls: incomplete fix for CVE-2023-5981
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2020:0799
|
Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-mediawiki-container security update
|
openshift/mediawiki: /etc/passwd is given incorrect privileges
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7 | null | null |
RHSA-2023:0337
|
Red Hat Security Advisory: expat security update
|
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2018:1833
|
Red Hat Security Advisory: Red Hat JBoss Data Grid 7.2.1 security update
|
infinispan: deserialization of data in XML and JSON transcoders
|
[
"cpe:/a:redhat:jboss_data_grid:7.2"
] | null | null | 7.5 | null |
RHSA-2018:3760
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: /invalidaccess bypass after failed restore (699654)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.3 | null |
RHSA-2017:0123
|
Red Hat Security Advisory: docker-latest security, bug fix, and enhancement update
|
docker: insecure opening of file-descriptor allows privilege escalation
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2019:2947
|
Red Hat Security Advisory: Red Hat Enterprise Linux 5.9 Advanced Mission Critical (AMC) Six-Month Notice
|
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 5.9 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 5.9.
|
[
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | null | null |
RHSA-2021:1739
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver kernel: possible out of bounds write in kbd_keycode of keyboard.c kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c kernel: DoS by corrupting mountpoint reference counter kernel: Integer overflow in Intel(R) Graphics Drivers kernel: Improper input validation in some Intel(R) Graphics Drivers kernel: Null pointer dereference in some Intel(R) Graphics Drivers kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c kernel: buffer uses out of index in ext3/4 filesystem kernel: Use After Free vulnerability in cgroup BPF component kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: incomplete permission checking for access to rbd devices kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow kernel: perf_event_parse_addr_filter memory kernel: use-after-free in kernel midi subsystem kernel: child process is able to access parent mm through hfi dev file handle kernel: slab-out-of-bounds read in fbcon kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent kernel: netfilter: use-after-free in the packet processing context kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds kernel: integer overflow in ext4_es_cache_extent kernel: remote DoS in TIPC kernel module
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.5 | null | null |
RHSA-2024:7346
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2023:2523
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: Using a Custom Cipher with NID_undef may lead to NULL encryption
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2010:0333
|
Red Hat Security Advisory: seamonkey security update
|
Mozilla crashes with evidence of memory corruption Mozilla remote code execution with use-after-free in nsTreeSelection Mozilla Dangling pointer vulnerability in nsTreeContentView Mozilla Dangling pointer vulnerability in nsPluginArray
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:4060
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free kernel: out of bounds write in i2c driver leads to local escalation of privilege kernel: use after free due to race condition in the video driver leads to local privilege escalation kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service kernel: null pointer dereference in drivers/media/usb/zr364xx/zr364xx.c driver kernel: Memory leak in drivers/scsi/libsas/sas_expander.c kernel: use-after-free in drivers/bluetooth/hci_ldisc.c kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c kernel: Memory leak in sit_init_net() in net/ipv6/sit.c kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free kernel: use-after-free caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver kernel: race condition caused by a malicious USB device in the USB character device driver layer kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c kernel: use-after-free in sound/core/timer.c kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c kernel: memory leak in mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c kernel: out-of-bounds write via crafted keycode table kernel: some ipv6 protocols not encrypted over ipsec tunnel Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c kernel: out-of-bounds read in set_fdc in drivers/block/floppy.c kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open kernel: uninitialized kernel data leak in userspace coredumps kernel: NFS client crash due to index buffer overflow during Direct IO write causing kernel panic kernel: SELinux netlink permission check bypass kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c kernel: sg_write function lacks an sg_remove_request call in a certain failure case kernel: possible to send arbitrary signals to a privileged (suidroot) parent process kernel: memory corruption in Voice over IP nf_conntrack_h323 module
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | 4.6 | null |
RHSA-2025:1140
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.8 | null | null |
RHSA-2023:0624
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow to code execution
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.6 | null | null |
RHSA-2020:3548
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Null pointer dereference in search_keyring kernel: heap-based buffer overflow in lbs_ibss_join_existing function in drivers/net/wireless/marvell/libertas/cfg.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2003:342
|
Red Hat Security Advisory: : Updated EPIC packages fix security vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:9559
|
Red Hat Security Advisory: libsoup security update
|
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names libsoup: infinite loop while reading websocket data
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2014:1647
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:31.2) (MFSA 2014-74) Mozilla: Web Audio memory corruption issues with custom waveforms (MFSA 2014-76) Mozilla: Out-of-bounds write with WebM video (MFSA 2014-77) Mozilla: Use-after-free interacting with text directionality (MFSA 2014-79)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:1455
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: fget: check that the fd still exists after getting a ref to it kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: heap out of bounds write in nf_dup_netdev.c
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.