id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2007:1068
Red Hat Security Advisory: pcre security update
pcre miscalculation of memory requirements for malformed Posix character class pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference pcre integer overflow pcre miscalculation of memory requirements if options are changed during pattern compilation pcre regular expression flaws
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:1630
Red Hat Security Advisory: Satellite 6.12.3 Async Security Update
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
[ "cpe:/a:redhat:satellite:6.12::el8", "cpe:/a:redhat:satellite_capsule:6.12::el8", "cpe:/a:redhat:satellite_maintenance:6.12::el8", "cpe:/a:redhat:satellite_utils:6.12::el8" ]
null
5.5
null
null
RHSA-2011:1402
Red Hat Security Advisory: freetype security update
freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:3663
Red Hat Security Advisory: jenkins and jenkins-2-plugins security update
http2-server: Invalid HTTP/2 requests cause DoS springframework: BCrypt skips salt rounds for work factor of 31 jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) jettison: Uncontrolled Recursion in JSONArray springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern log4j1-socketappender: DoS via hashmap logging Jenkins: XSS vulnerability in plugin manager Jenkins: Temporary plugin file created with insecure permissions Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents jenkins-2-plugin: workflow-job: Stored XSS vulnerability in Pipeline: Job Plugin jenkins-2-plugin: pipeline-utility-steps: Arbitrary file write vulnerability on agents in Pipeline Utility Steps Plugin
[ "cpe:/a:redhat:ocp_tools:4.11::el8" ]
null
6.3
null
null
RHSA-2003:150
Red Hat Security Advisory: LPRng security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:7580
Red Hat Security Advisory: postgresql:13 security update
postgresql: Extension scripts replace objects not belonging to the extension. postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2020:0197
Red Hat Security Advisory: python-reportlab security update
python-reportlab: code injection in colors.py allows attacker to execute code
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
RHSA-2003:155
Red Hat Security Advisory: : : : Updated Fetchmail packages fix security vulnerabilities
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2005:212
Red Hat Security Advisory: dhcp security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es" ]
null
null
null
null
RHSA-2011:0463
Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.3.0.CP04 and 5.1.0 security update
JBoss Seam privilege escalation caused by EL interpolation in FacesMessages
[ "cpe:/a:redhat:jboss_soa_platform:4.3", "cpe:/a:redhat:jboss_soa_platform:5.0" ]
null
null
null
null
RHSA-2024:11483
Red Hat Security Advisory: kernel-rt security update
kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
5.6
null
null
RHSA-2012:1150
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: huge pages: memory leak on mmap failure kernel: epoll: can leak file descriptors when returning -ELOOP
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2024:9500
Red Hat Security Advisory: kernel security update
kernel: scsi: mpt3sas: Fix use-after-free warning kernel: drm/amdgpu: use-after-free vulnerability kernel: mptcp: pm: Fix uaf in __timer_delete_sync
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7
null
null
RHSA-2021:2555
Red Hat Security Advisory: OpenShift Container Platform 4.7.19 packages and security update
polkit: local privilege escalation using polkit_system_bus_name_get_creds_sync() dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.8
null
null
RHSA-2015:1508
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu/kvm: i8254: out-of-bounds memory access in pit_ioport_read function qemu: ide: atapi: heap overflow during I/O buffer memory access
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2020:1379
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.6
null
null
RHSA-2024:11149
Red Hat Security Advisory: gstreamer1-plugins-good security update
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
6.5
null
null
RHSA-2007:1037
Red Hat Security Advisory: openldap security and enhancement update
openldap slapd DoS via objectClasses attribute
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:7506
Red Hat Security Advisory: cups-filters security update
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2022:0772
Red Hat Security Advisory: kpatch-patch security update
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7
null
null
RHSA-2020:4331
Red Hat Security Advisory: kpatch-patch security update
kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2020:1047
Red Hat Security Advisory: wireshark security and bug fix update
wireshark: SIGCOMP dissector crash in packet-sigcomp.c wireshark: Out-of-bounds read in packet-ldss.c wireshark: Multiple dissectors could crash (wnpa-sec-2018-36) wireshark: DICOM dissector infinite loop (wnpa-sec-2018-39) wireshark: Bazaar dissector infinite loop (wnpa-sec-2018-40) wireshark: Radiotap dissector crash wireshark: Infinite loop in the MMSE dissector
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2005:408
Red Hat Security Advisory: cyrus-imapd security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:8683
Red Hat Security Advisory: OpenShift Container Platform 4.16.20 bug fix and security update
dompurify: nesting-based mutation XSS vulnerability
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
8
null
null
RHSA-2015:1030
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: slab corruption from use after free on INIT collisions
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
null
null
RHSA-2023:4524
Red Hat Security Advisory: libcap security update
libcap: Memory Leak on pthread_create() Error libcap: Integer Overflow in _libcap_strdup()
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2016:1838
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 on RHEL 6
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
7.5
null
RHSA-2024:3831
Red Hat Security Advisory: containernetworking-plugins security and bug fix update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2023:1404
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
RHSA-2014:0383
Red Hat Security Advisory: samba4 security update
samba: pam_winbind fails open when non-existent group specified to require_membership_of samba: Password lockout not enforced for SAMR password changes samba: smbcacls will delete ACL lists in certain circumstances
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0460
Red Hat Security Advisory: thunderbird security update
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
null
null
RHSA-2022:8415
Red Hat Security Advisory: mingw-gcc security and bug fix update
gcc: uncontrolled recursion in libiberty/rust-demangle.c
[ "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
3.3
null
null
RHBA-2024:2034
Red Hat Bug Fix Advisory: Red Hat Advanced Cluster Management 2.10.2 bug fixes and container updates
follow-redirects: Possible credential leak
[ "cpe:/a:redhat:acm:2.10::el9" ]
null
6.5
null
null
RHSA-2018:0647
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
8.8
null
RHSA-2016:1395
Red Hat Security Advisory: kernel security and bug fix update
kernel: pty layer race condition on tty ldisc shutdown.
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
null
null
RHSA-2013:0217
Red Hat Security Advisory: mingw32-libxml2 security update
libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis libxml2: double-free in XPath processing code libxml2: Off-by-one error leading to heap-based buffer overflow in encoding libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets libxml2: double free caused by malformed XPath expression in XSLT libxml2: double-free caused by malformed XPath expression in XSLT libxml: An off-by-one out-of-bounds write by XPointer part evaluation libxml2 out of bounds read libxml2: Heap-based buffer overflow when decoding an entity reference with a long name libxml2: hash table collisions CPU usage DoS libxml2: Heap-buffer-underflow in xmlParseAttValueComplex
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHBA-2020:4346
Red Hat Bug Fix Advisory: Satellite 6.7.5 Async Bug Fix Update
Satellite: Local user impersonation by Single sign-on (SSO) user leads to account takeover
[ "cpe:/a:redhat:satellite:6.7::el7", "cpe:/a:redhat:satellite_capsule:6.7::el7" ]
null
7.5
null
null
RHSA-2024:0418
Red Hat Security Advisory: avahi security update
avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket avahi: Reachable assertion in avahi_dns_packet_append_record avahi: Reachable assertion in avahi_escape_label avahi: Reachable assertion in dbus_set_host_name avahi: Reachable assertion in avahi_rdata_parse avahi: Reachable assertion in avahi_alternative_host_name
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
6.2
null
null
RHSA-2023:1663
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.2 release and security update
tomcat: request smuggling tomcat: JsonErrorReportValve injection
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9" ]
null
7.5
null
null
RHSA-2024:10882
Red Hat Security Advisory: postgresql security update
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/o:redhat:rhel_els:7" ]
null
8.8
null
null
RHSA-2023:6882
Red Hat Security Advisory: squid34 security update
squid: Denial of Service in HTTP Digest Authentication
[ "cpe:/o:redhat:rhel_els:6" ]
null
8.6
null
null
RHSA-2023:1659
Red Hat Security Advisory: kpatch-patch security update
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation kpatch: mm/mremap.c: incomplete fix for CVE-2022-41222
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
null
null
RHSA-2004:441
Red Hat Security Advisory: ruby security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2011:0779
Red Hat Security Advisory: avahi security and bug fix update
avahi: daemon infinite loop triggered by an empty UDP packet (CVE-2010-2244 fix regression)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:2666
Red Hat Security Advisory: kernel security and bug fix update
kernel: security bypass in certs/blacklist.c and certs/system_keyring.c kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
[ "cpe:/a:redhat:rhel_eus:8.1::crb", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
RHSA-2017:3473
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
4.4
null
RHSA-2019:3335
Red Hat Security Advisory: python27:2.7 security and bug fix update
numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.5
null
RHSA-2018:1455
Red Hat Security Advisory: dhcp security update
dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
7.5
null
RHSA-2012:1483
Red Hat Security Advisory: thunderbird security update
Mozilla: evalInSanbox location context incorrectly applied (MFSA 2012-93) Mozilla: Buffer overflow while rendering GIF images (MFSA 2012-92) Mozilla: Improper character decoding in HZ-GB-2312 charset (MFSA 2012-101) Mozilla: Frames can shadow top.location (MFSA 2012-103) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Improper security filtering for cross-origin wrappers (MFSA 2012-100) Mozilla: Miscellaneous memory safety hazards (rv:10.0.11) (MFSA 2012-91)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:4335
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.8.9
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:logging:5.8::el9" ]
null
6.7
null
null
RHSA-2018:0412
Red Hat Security Advisory: kernel-rt security and bug fix update
Kernel: KVM: debug exception via syscall emulation Kernel: KVM: MMU potential stack buffer overrun during page walks kernel: improper keyrings creation
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
4.4
null
RHSA-2021:3425
Red Hat Security Advisory: Red Hat support for Spring Boot 2.3.10 security update
undertow: special character in query results in server errors undertow: buffer leak on incoming websocket PONG message may lead to DoS tomcat: Information disclosure when using NTFS file system tomcat: Request mix-up with h2c tomcat: Incomplete fix for CVE-2020-9484 (RCE via session persistence)
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7
null
null
RHSA-2024:1473
Red Hat Security Advisory: libreoffice security update
libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution libreoffice: Insufficient macro permission validation leading to macro execution
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
8.3
null
null
RHSA-2020:5333
Red Hat Security Advisory: go-toolset-1.14-golang security update
golang: math/big: panic during recursive division of very large numbers golang: malicious symbol names can lead to code execution at build time golang: improper validation of cgo flags can lead to code execution at build time
[ "cpe:/a:redhat:devtools:2020" ]
null
7.5
null
null
RHSA-2025:1829
Red Hat Security Advisory: RHODF-4.16-RHEL-9 security update
PostCSS: Improper input validation in PostCSS go-retryablehttp: url might write sensitive information to log file node-gettext: Prototype Pollution golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift_data_foundation:4.16::el9" ]
null
7.5
null
null
RHSA-2002:103
Red Hat Security Advisory: : : : Updated Apache packages fix chunked encoding issue
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2013:0848
Red Hat Security Advisory: Red Hat Network Satellite spacewalk-backend security update
Satellite: Inter-Satellite Sync (ISS) does not require authentication/authorization
[ "cpe:/a:redhat:network_satellite:5.3::el5", "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6", "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6" ]
null
null
null
null
RHSA-2022:4929
Red Hat Security Advisory: rh-postgresql13-postgresql security update
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.8
null
null
RHSA-2020:5118
Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
7.5
null
null
RHSA-2017:3193
Red Hat Security Advisory: httpd security update
httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: ap_find_token() buffer overread httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
5.9
null
RHSA-2024:9102
Red Hat Security Advisory: podman security update
podman: Symlink error leads to information disclosure containers/image: digest type does not guarantee valid type golang: archive/zip: Incorrect handling of certain ZIP files net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2024:1492
Red Hat Security Advisory: thunderbird security update
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2017:0014
Red Hat Security Advisory: ghostscript security update
ghostscript: getenv and filenameforall ignore -dSAFER ghostscript: .libfile does not honor -dSAFER ghostscript: Type confusion in .initialize_dsc_parser allows remote code execution ghostscript: check for sufficient params in .sethalftone5
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.8
null
RHSA-2024:2512
Red Hat Security Advisory: file security update
file: stack-based buffer over-read in file_copystr in funcs.c
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2018:3140
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read gdk-pixbuf2: Heap overflow in the gdk_pixbuf__jpeg_image_load_increment function poppler: Infinite recursion in fofi/FoFiType1C.cc:FoFiType1C::cvtGlyph() function allows denial of service webkitgtk: memory corruption processing maliciously crafted web content webkitgtk: memory corruption processing maliciously crafted web content webkitgtk: memory corruption processing maliciously crafted web content libgxps: heap based buffer over read in ft_font_face_hash function of gxps-fonts.c libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c poppler: NULL pointer dereference in Annot.h:AnnotPath::getCoordsLength() allows for denial of service via crafted PDF webkitgtk: Improper TLS certificate verification for WebSocket connections webkitgtk: WebSockets don't use system proxy settings libsoup: Crash in soup_cookie_jar.c:get_cookies() on empty hostnames poppler: out of bounds read in pdfunite accountsservice: insufficient path check in user_change_icon_file_authorized_cb() in user.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5
null
RHSA-2013:1448
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.1.2 update
commons-fileupload: Arbitrary file upload via deserialization Remoting: DoS by file descriptor exhaustion Server: Plaintext passwords in server logs Drift: Malicious drift file import due to insecure temporary file usage
[ "cpe:/a:redhat:jboss_operations_network:3.1.2" ]
null
null
null
null
RHSA-2019:1190
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: media: use-after-free in [tuner-xc2028] media driver kernel: Buffer overflow in firewire driver via crafted incoming packets kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message kernel: memory leak when merging buffers in SCSI IO vectors kernel: crypto: privilege escalation in skcipher_recvmsg function Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c Kernel: FPU state information leakage via lazy FPU restore hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) kernel: Use-after-free due to race condition in AF_PACKET implementation hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
3.8
null
RHSA-2022:6964
Red Hat Security Advisory: nodejs:16 security update
nodejs: weak randomness in WebCrypto keygen nodejs: HTTP Request Smuggling due to incorrect parsing of header fields
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2018:0262
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 58 and Firefox ESR 52.6 (MFSA 2018-03) Mozilla: Integer overflow in Skia library during edge builder allocation (MFSA 2018-03) Mozilla: Use-after-free while editing form elements (MFSA 2018-03) Mozilla: Use-after-free when source document is manipulated during XSLT (MFSA 2018-03) Mozilla: Use-after-free while manipulating form input elements (MFSA 2018-03) Mozilla: Use-after-free with widget listener (MFSA 2018-03) Mozilla: Use-after-free in HTML media elements (MFSA 2018-03) Mozilla: Use-after-free during mouse event handling (MFSA 2018-03) Mozilla: Use-after-free during font face manipulation (MFSA 2018-03) Mozilla: URL spoofing with right-to-left text aligned left-to-right (MFSA 2018-03)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.1
null
RHSA-2019:1811
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.7
null
RHSA-2022:0851
Red Hat Security Advisory: kpatch-patch security update
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7
null
null
RHSA-2020:5564
Red Hat Security Advisory: firefox security update
chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
6.1
null
RHSA-2019:4256
Red Hat Security Advisory: kernel security and bug fix update
Kernel: KVM: OOB memory access via mmio ring buffer
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7
null
RHSA-2009:0373
Red Hat Security Advisory: systemtap security update
systemtap: race condition leads to privilege escalation
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:1885
Red Hat Security Advisory: libxml2 security update
libxml2: denial of service via recursive entity expansion
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:0204
Red Hat Security Advisory: 389-ds-base security and bug fix update
389-ds-base: worker threads do not detect abnormally closed connections causing DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:1750
Red Hat Security Advisory: unbound security update
unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8
null
null
RHSA-2013:0640
Red Hat Security Advisory: tomcat5 security update
Web: Bypass of security constraints tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0670
Red Hat Security Advisory: runc security update
runc: file descriptor leak
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.6
null
null
RHSA-2023:6879
Red Hat Security Advisory: Red Hat AMQ Broker 7.11.4 release and security update
activemq-openwire: OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack
[ "cpe:/a:redhat:amq_broker:7.11" ]
null
9.8
null
null
RHSA-2004:165
Red Hat Security Advisory: ipsec-tools security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2019:4273
Red Hat Security Advisory: container-tools:1.0 security update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.5
null
RHSA-2025:0692
Red Hat Security Advisory: redis:7 security update
redis: Redis' Lua library commands may lead to remote code execution redis: Redis allows denial-of-service due to malformed ACL selectors
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
4.4
null
null
RHSA-2023:4412
Red Hat Security Advisory: openssh security update
openssh: Remote code execution in ssh-agent PKCS#11 support
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
9.8
null
null
RHSA-2020:0165
Red Hat Security Advisory: openvswitch security and bug fix update
dpdk: possible memory leak leads to denial of service
[ "cpe:/o:redhat:enterprise_linux:7::fastdatapath", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.5
null
RHSA-2014:0630
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
openssl: SSL/TLS MITM vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0" ]
null
null
null
null
RHSA-2015:0091
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.0 update
Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter PicketLink: XXE via insecure DocumentBuilderFactory usage
[ "cpe:/a:redhat:jboss_data_grid:6.4.0" ]
null
null
null
null
RHSA-2014:1068
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
This is the 3-year notification of the target date to migrate systems from Red Hat Network Classic Hosted to Red Hat Subscription Management. All systems using Red Hat Network Classic Hosted must be migrated to Red Hat Subscription Management.
[]
null
null
null
null
RHSA-2018:1636
Red Hat Security Advisory: kernel security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.6
null
RHSA-2010:0771
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: DoS on x86_64 kernel: net sched: fix some kernel memory leaks kernel: wireless: fix 64K kernel heap content leak via ioctl kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory kernel: drivers/net/eql.c: reading uninitialized stack memory
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2022:1363
Red Hat Security Advisory: OpenShift Container Platform 4.9.29 bug fix and security update
moby: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
4.8
null
null
RHSA-2018:0009
Red Hat Security Advisory: kernel security update
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
null
null
RHSA-2024:0016
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.6
null
null
RHSA-2015:0860
Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 4.0 - 60 Day Retirement Notice
This is the 60 day notification for the retirement of Red Hat Enterprise Linux OpenStack Platform 4.0.
[]
null
null
null
null
RHSA-2022:8555
Red Hat Security Advisory: thunderbird security update
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
RHSA-2015:2657
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:38.5) (MFSA 2015-134) Mozilla: Underflow through code inspection (MFSA 2015-145) Mozilla: Use-after-free in WebRTC when datachannel is used after being destroyed (MFSA 2015-138) Mozilla: Integer overflow allocating extremely large textures (MFSA 2015-139) Mozilla: Integer overflow in MP4 playback in 64-bit versions (MFSA 2015-146) Mozilla: Cross-site reading attack through data: and view-source: URIs (MFSA 2015-149) Mozilla: Integer underflow and buffer overflow processing MP4 metadata in libstagefright (MFSA 2015-147)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2008:0680
Red Hat Security Advisory: vsftpd security and bug fix update
older vsftpd authentication memory leak
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::es" ]
null
null
null
null
RHSA-2013:0508
Red Hat Security Advisory: sssd security, bug fix and enhancement update
sssd: TOCTOU race conditions by copying and removing directory trees sssd: Out-of-bounds read flaws in autofs and ssh services responders
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:0127
Red Hat Security Advisory: thunderbird security update
Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
RHSA-2024:5519
Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1 security update
kernel: net: kernel: UAF in network route management
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
7.8
null
null