id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHBA-2023:0568
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.12.2 packages update
|
golang: net/url: JoinPath does not strip relative path components in all circumstances
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2022:5257
|
Red Hat Security Advisory: libinput security update
|
libinput: format string vulnerability may lead to privilege escalation
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2012:0062
|
Red Hat Security Advisory: t1lib security update
|
t1lib: Heap based buffer overflow in DVI file AFM font parser t1lib: Heap-based buffer overflow DVI file AFM font parser t1lib: Invalid pointer dereference via crafted Type 1 font t1lib: invalid read crash via crafted Type 1 font t1lib: Use-after-free via crafted Type 1 font t1lib: Off-by-one via crafted Type 1 font
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7215
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.2.12
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:service_mesh:2.2::el8"
] | null | 7.5 | null | null |
RHSA-2007:0019
|
Red Hat Security Advisory: gtk2 security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:2274
|
Red Hat Security Advisory: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update
|
ceph: cephx protocol is vulnerable to replay attack ceph: cephx uses weak signatures ceph: ceph-mon does not perform authorization on OSD pool ops
|
[
"cpe:/a:redhat:ceph_storage:2::ubuntu16.04"
] | null | null | 4.6 | null |
RHSA-2019:1207
|
Red Hat Security Advisory: redhat-virtualization-host security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.8 | null |
RHSA-2017:1483
|
Red Hat Security Advisory: kernel security update
|
kernel: heap/stack gap jumping via unbounded stack allocations
|
[
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 7.4 | null |
RHBA-2015:1167
|
Red Hat Bug Fix Advisory: docker bug fix update
|
docker: insecure opening of file-descriptor 1 leading to privilege escalation docker: symlink traversal on container respawn allows local privilege escalation docker: Read/write proc paths allow host modification & information disclosure docker: volume mounts allow LSM profile escalation
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2022:6392
|
Red Hat Security Advisory: RHV RHEL Host (ovirt-host) [ovirt-4.5.2] security update
|
moment: inefficient parsing algorithm resulting in DoS
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.5 | null | null |
RHSA-2020:4433
|
Red Hat Security Advisory: python3 security and bug fix update
|
python: XSS vulnerability in the documentation XML-RPC server in server_title field python: infinite loop in the tarfile module via crafted TAR archive python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS python: DoS via inefficiency in IPv{4,6}Interface classes
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2012:1283
|
Red Hat Security Advisory: openjpeg security update
|
openjpeg: heap-based buffer overflow when decoding jpeg2000 files
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2010:0787
|
Red Hat Security Advisory: glibc security update
|
glibc: ld.so insecure handling of $ORIGIN in LD_AUDIT for setuid/setgid programs
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:4773
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
|
[
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7.8 | null | null |
RHSA-2015:2248
|
Red Hat Security Advisory: netcf security, bug fix, and enhancement update
|
netcf: augeas path expression injection via interface name
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2970
|
Red Hat Security Advisory: java-11-openjdk security and enhancement update
|
OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2010:0653
|
Red Hat Security Advisory: ImageMagick security update
|
GraphicsMagick: Integer overflow in the routine creating X11 images
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:7706
|
Red Hat Security Advisory: Red Hat build of Cryostat security update
|
webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule dompurify: XSS vulnerability via prototype pollution
|
[
"cpe:/a:redhat:cryostat:3::el8"
] | null | 7 | null | null |
RHSA-2014:0224
|
Red Hat Security Advisory: redhat-support-plugin-rhev security update
|
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | 3.7 | null |
RHSA-2006:0179
|
Red Hat Security Advisory: auth_ldap security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:3320
|
Red Hat Security Advisory: kernel security update
|
kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c kernel: race condition for removal of the HCI controller
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7 | null | null |
RHSA-2024:8351
|
Red Hat Security Advisory: grafana:7.3.6 security update
|
elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.2 | null | null |
RHSA-2022:0539
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2023:1566
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: stack overflow in do_proc_dointvec and proc_skip_spaces ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2020:4039
|
Red Hat Security Advisory: OpenEXR security update
|
OpenEXR: out-of-bounds read during Huffman uncompression OpenEXR: std:: vector out-of-bounds read and write in ImfTileOffsets.cpp OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in ImfMisc.cpp
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.5 | null | null |
RHSA-2023:3139
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2009:0369
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer Overflow in GIF image processing (6766136)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2022:0447
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update on RHEL 7
|
undertow: client side invocation timeout raised when calling over HTTP2 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el7"
] | null | 8.8 | null | null |
RHSA-2024:10219
|
Red Hat Security Advisory: perl-App-cpanminus:1.7044 security update
|
perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2015:1002
|
Red Hat Security Advisory: xen security update
|
qemu: fdc: out-of-bounds fifo buffer memory access
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:4931
|
Red Hat Security Advisory: RHV Appliance (rhvm-appliance) security update [ovirt-4.5.0]
|
postgresql: memory disclosure in certain queries
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 6.5 | null | null |
RHSA-2008:0221
|
Red Hat Security Advisory: flash-plugin security update
|
Flash Player input validation error Flash plugin DNS rebinding Flash Player input validation error Flash Player cross-domain and cross-site scripting flaws Flash Player content injection flaw Flash Player cross domain HTTP header flaw Flash Player DNS rebind flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2019:0633
|
Red Hat Security Advisory: ghostscript security and bug fix update
|
ghostscript: superexec operator is available (700585) ghostscript: forceput in DefineResource is still accessible (700576)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2022:7089
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow may lead to remote code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.6 | null | null |
RHSA-2018:3534
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 6.5 | null |
RHSA-2025:0754
|
Red Hat Security Advisory: Red Hat OpenShift Builds 1.2
|
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html go-git: argument injection via the URL field
|
[
"cpe:/a:redhat:openshift_builds:1.2::el9"
] | null | 8.1 | null | null |
RHSA-2020:4316
|
Red Hat Security Advisory: java-11-openjdk security and bug fix update
|
OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 5.3 | null | null |
RHSA-2014:0134
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars OpenJDK: null xmlns handling issue (Security, 8025026) OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insecure subject principals set handling (JAAS, 8024306) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:4429
|
Red Hat Security Advisory: mod_auth_openidc:2.3 security update
|
cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0254
|
Red Hat Security Advisory: rpm security update
|
rpm: RPM does not require subkeys to have a valid binding signature
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 4.4 | null | null |
RHSA-2024:0106
|
Red Hat Security Advisory: nss security update
|
nss: timing attack against RSA decryption
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.5 | null | null |
RHSA-2023:6746
|
Red Hat Security Advisory: nghttp2 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2025:0400
|
Red Hat Security Advisory: redis security update
|
redis: Redis' Lua library commands may lead to remote code execution
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7 | null | null |
RHSA-2024:1941
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0597
|
Red Hat Security Advisory: squid security update
|
squid: denial of service when using SSL-Bump
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5554
|
Red Hat Security Advisory: CloudForms 5.0.10 security, bug fix and enhancement update
|
Cloudforms: Incomplete fix for CVE-2020-10783
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.11::el8"
] | null | 8.4 | null | null |
RHSA-2022:2255
|
Red Hat Security Advisory: pcs security update
|
sinatra: path traversal possible outside of public_dir when serving static files
|
[
"cpe:/a:redhat:rhel_e4s:8.1::highavailability"
] | null | 7.5 | null | null |
RHSA-2025:0850
|
Red Hat Security Advisory: python-jinja2 security update
|
jinja2: Jinja has a sandbox breakout through indirect reference to format method
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 6.3 | null | null |
RHSA-2024:1461
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.18 packages and security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2019:3843
|
Red Hat Security Advisory: kernel security update
|
hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA)
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 6.5 | null |
RHSA-2023:7740
|
Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancements, and bug fix update
|
grafana: missing access control allows test alerts by underprivileged user grafana: data source proxy race condition
|
[
"cpe:/a:redhat:ceph_storage:6.1::el9"
] | null | 7.5 | null | null |
RHSA-2023:7577
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2018:0481
|
Red Hat Security Advisory: jboss-ec2-eap package for EAP 7.1.1
|
resteasy: Vary header not added by CORS filter leading to cache poisoning artemis/hornetq: memory exhaustion via UDP and JGroups discovery undertow: Client can use bogus uri in Digest authentication infinispan: Unsafe deserialization of malicious object injected into data cache jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 8.1 | null |
RHSA-2024:9195
|
Red Hat Security Advisory: cyrus-imapd security update
|
cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2024:0894
|
Red Hat Security Advisory: mysql:8.0 security update
|
zstd: mysql: buffer overrun in util.c mysql: InnoDB unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: JSON unspecified vulnerability (CPU Apr 2023) mysql: Server: DML unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Client programs unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023) mysql: Client programs unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: DDL unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: UDF unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: DML unspecified vulnerability (CPU Oct 2023) mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Replication unspecified vulnerability (CPU Jan 2024) mysql: Server: Options unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DML unspecified vulnerability (CPU Jan 2024) mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024) mysql: Server: UDF unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024) mysql: Optimizer unspecified vulnerability (CPU Jul 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.9 | null | null |
RHSA-2015:1330
|
Red Hat Security Advisory: python security, bug fix, and enhancement update
|
python: multiple unbound readline() DoS flaws in python stdlib python: buffer overflow in socket.recvfrom_into() python: CGIHTTPServer module does not properly handle URL-encoded path separators in URLs python: buffer() integer overflow leading to out of bounds read
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7500
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:1081
|
Red Hat Security Advisory: Gatekeeper Operator v0.2 security updates and bug fixes
|
golang.org/x/crypto: empty plaintext packet causes panic golang: crypto/elliptic: IsOnCurve returns true for invalid field elements
|
[
"cpe:/a:redhat:acm:2.3::el8"
] | null | 7.1 | null | null |
RHSA-2024:1992
|
Red Hat Security Advisory: opencryptoki security update
|
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.9 | null | null |
RHSA-2020:3432
|
Red Hat Security Advisory: kernel security update
|
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.1 | null | null |
RHSA-2015:1459
|
Red Hat Security Advisory: ntp security, bug fix, and enhancement update
|
ntp: vallen in extension fields are not validated ntp: drop packets with source address ::1 ntp: vallen in extension fields are not validated ntp: drop packets with source address ::1 ntp: ntpd accepts unauthenticated packets with symmetric key crypto ntp: authentication doesn't protect symmetric associations against DoS attacks ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:2043
|
Red Hat Security Advisory: c-ares security update
|
c-ares: Missing input validation of host names may lead to domain hijacking
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null |
RHEA-2023:7493
|
Red Hat Enhancement Advisory: OpenShift sandboxed containers 1.5.0 update
|
containerd: Supplementary groups are not set up properly
|
[
"cpe:/a:redhat:openshift_sandboxed_containers:1.5.0::el9"
] | null | 7.3 | null | null |
RHSA-2019:4357
|
Red Hat Security Advisory: Red Hat Ceph Storage security update
|
ceph: denial of service in RGW daemon
|
[
"cpe:/a:redhat:ceph_storage:3::ubuntu16.04"
] | null | null | 6.5 | null |
RHBA-2020:0402
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix update
|
jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jenkins: Inbound TCP Agent Protocol/3 authentication bypass jenkins: UDP multicast/broadcast service amplification reflection attack jenkins: Non-constant time comparison of inbound TCP agent connection secret jenkins: Non-constant time HMAC comparison jenkins: Exposed session identifiers on user detail object in the whoAmI diagnostic page jenkins: Memory usage graphs accessible to anyone with Overall/Read jenkins: REST APIs vulnerable to clickjacking
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 3.1 | 5.6 | null |
RHSA-2016:2641
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.3 for RHEL 7
|
undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 6.5 | null |
RHSA-2011:1187
|
Red Hat Security Advisory: dovecot security update
|
dovecot: potential crash when parsing header names that contain NUL characters
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2010:0958
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: arbitrary kernel memory write via i915 GEM ioctl kernel: sctp: do not reset the packet during sctp_packet_config kernel: prevent heap corruption in snd_ctl_new() kernel: sctp memory corruption in HMAC handling kernel: setup_arg_pages: diagnose excessive argument size kernel: heap contents leak from ETHTOOL_GRXCLSRLALL kernel: CAN minor heap overflow kernel: net/packet/af_packet.c: reading uninitialized stack memory kernel: logic error in INET_DIAG bytecode auditing kernel: ipc/shm.c: reading uninitialized stack memory kernel: ipc/compat*.c: reading uninitialized stack memory kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory kernel: drivers/serial/serial_core.c: reading uninitialized stack memory kernel: drivers/char/nozomi.c: reading uninitialized stack memory kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory kernel: ipc/sem.c: reading uninitialized stack memory kernel: gdth: integer overflow in ioc_general() kernel: socket filters infoleak kernel: perf bug
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2020:0232
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780)
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 4.8 | null | null |
RHSA-2021:3851
|
Red Hat Security Advisory: Red Hat 3scale API Management 2.11.0 Release - Container Images
|
aws/aws-sdk-go: CBC padding oracle issue in AWS S3 Crypto SDK for golang aws-sdk-go: In-band key negotiation issue in AWS S3 Crypto SDK for golang RHOAM: XSS in 3scale at various places 3scale: missing validation of access token nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
|
[
"cpe:/a:redhat:3scale_amp:2.11::el7",
"cpe:/a:redhat:3scale_amp:2.11::el8"
] | null | 8.1 | null | null |
RHSA-2005:014
|
Red Hat Security Advisory: nfs-utils security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:4350
|
Red Hat Security Advisory: python-requests security update
|
python-requests: Unintended leak of Proxy-Authorization header
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.1 | null | null |
RHSA-2020:3119
|
Red Hat Security Advisory: samba security update
|
samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
|
[
"cpe:/a:redhat:storage:3.5:samba:el8"
] | null | 0 | null | null |
RHSA-2023:4696
|
Red Hat Security Advisory: kernel security update
|
hw: amd: Cross-Process Information Leak kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
|
[
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2023:3152
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2025:2415
|
Red Hat Security Advisory: Red Hat Insights for Runtimes security update
|
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:insights_runtimes_operator:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2022:4786
|
Red Hat Security Advisory: openvswitch2.13 security update
|
DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash dpdk: sending vhost-user-inflight type messages could lead to DoS
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2021:3441
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in route4_change() in net/sched/cls_route.c
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2019:0450
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 2 security and bug fix update
|
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.0"
] | null | null | 4.3 | null |
RHSA-2024:2098
|
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
|
buildah: full container escape at build time
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | null | null |
RHSA-2022:1489
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2020:4167
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: vnc: memory leakage upon disconnect QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 5 | null | null |
RHSA-2012:1047
|
Red Hat Security Advisory: php53 security update
|
php: Format string flaw in phar extension via phar_stream_flush() (MOPS-2010-024) php: zend_strndup() NULL pointer dereference may cause DoS php: XSLT file writing vulnerability php: strtotime timezone memory leak php: $_FILES array indexes corruption crypt(): DES encrypted password weakness php: incomplete CVE-2012-1823 fix - missing filtering of -T and -h php: Integer overflow leading to heap-buffer overflow in the Phar extension
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0558
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: performance counters race condition use-after-free kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2018:2533
|
Red Hat Security Advisory: openstack-keystone security update
|
openstack-keystone: Information Exposure through /v3/OS-FEDERATION/projects
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 5.3 | null |
RHSA-2020:0127
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 8.8 | null |
RHSA-2013:0941
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: code execution flaw (APSB13-16)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:2161
|
Red Hat Security Advisory: fence-agents security and bug fix update
|
python-oauthlib: DoS when attacker provides malicious IPV6 URI
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 6.5 | null | null |
RHSA-2024:0563
|
Red Hat Security Advisory: kernel-rt security update
|
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: use-after-free in smb2_is_status_io_timeout() kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use-after-free in sch_qfq network scheduler kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: IGB driver inadequate buffer size for frames larger than MTU
|
[
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 7.5 | null | null |
RHSA-2010:0749
|
Red Hat Security Advisory: poppler security update
|
xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse()
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2019:0802
|
Red Hat Bug Fix Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.2.8
|
ovirt-engine: Missing permissions check in web ui allows a user with basic privileges to delete disks
|
[
"cpe:/a:redhat:rhev_manager:4.2"
] | null | null | 6.5 | null |
RHSA-2008:0857
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel snd_seq_oss_synth_make_info leak Linux kernel local filesystem DoS Linux kernel dccp_setsockopt_change() integer overflow Linux kernel sctp_setsockopt_auth_key() integer overflow kernel: tmpfs: fix kernel BUG in shmem_delete_inode kernel: fix off-by-one error in iov_iter_advance() kernel: sctp: fix potential panics in the SCTP-AUTH API kernel: nfsd: fix buffer overrun decoding NFSv4 acl kernel: sctp_getsockopt_hmac_ident information disclosure kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2023:4952
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:7455
|
Red Hat Security Advisory: git-lfs security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2024:4431
|
Red Hat Security Advisory: libreswan security update
|
libreswan: IKEv1 default AH/ESP responder can crash and restart
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.5 | null | null |
RHSA-2003:030
|
Red Hat Security Advisory: lynx security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2022:6094
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.28 packages and security update
|
golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar
|
[
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2023:1047
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 for OpenShift image security and enhancement update
|
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens rhsso-container-image: unsecured management interface exposed to adjecent network Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 4.6 | 5.6 | null |
RHSA-2018:3598
|
Red Hat Security Advisory: OpenShift Container Platform 3.6 security update
|
kubernetes: authentication/authorization bypass in the handling of non-101 responses
|
[
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 9.8 | null |
RHSA-2016:0446
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 OpenSSL Security Update
|
openssl: assertion failure in SSLv2 servers OpenSSL: SSLv2 doesn't block disabled ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.0"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.