id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2014:0678
Red Hat Security Advisory: kernel security update
kernel: pty layer race condition leading to memory corruption
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:11161
Red Hat Security Advisory: tuned security update
tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime", "cpe:/a:redhat:enterprise_linux:8::sap", "cpe:/a:redhat:enterprise_linux:8::sap_hana", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2012:1022
Red Hat Security Advisory: jbossas security update
JNDI: unauthenticated remote write access is permitted by default
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
RHSA-2021:2040
Red Hat Security Advisory: rh-mariadb103-mariadb and rh-mariadb103-galera security update
mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.2
null
null
RHSA-2024:4329
Red Hat Security Advisory: OpenShift Container Platform 4.14.32 bug fix and security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openshift/telemeter: iss check during JWT authentication can be bypassed
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2014:1307
Red Hat Security Advisory: nss security update
nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2010:0936
Red Hat Security Advisory: kernel security and bug fix update
kernel: sctp: do not reset the packet during sctp_packet_config kernel: prevent heap corruption in snd_ctl_new()
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2008:0521
Red Hat Security Advisory: Red Hat Enterprise Linux 2.1 - 1-Year End Of Life Notice
This is the 1-year notification of the End Of Life plans for Red Hat Enterprise Linux 2.1.
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2019:0436
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.1
null
RHSA-2024:2077
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
podman: Symlink error leads to information disclosure golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags buildah: full container escape at build time
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.6
null
null
RHSA-2024:4520
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.16 security and bug fix update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping webpack-dev-middleware: lack of URL validation may lead to file leak envoy: HTTP/2 CPU exhaustion due to CONTINUATION frame flood
[ "cpe:/a:redhat:rhmt:1.7::el8" ]
null
5.3
null
null
RHSA-2020:4433
Red Hat Security Advisory: python3 security and bug fix update
python: XSS vulnerability in the documentation XML-RPC server in server_title field python: infinite loop in the tarfile module via crafted TAR archive python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS python: DoS via inefficiency in IPv{4,6}Interface classes
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2003:094
Red Hat Security Advisory: mysql security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2017:1217
Red Hat Security Advisory: Red Hat JBoss BRMS security update
business-central: Multiple stored XSS in task and process filters business-central: Reflected XSS in artifact upload error message
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:6.4" ]
null
null
6.1
null
RHSA-2023:3563
Red Hat Security Advisory: thunderbird security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2024:1270
Red Hat Security Advisory: docker security update
runc: file descriptor leak
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
8.6
null
null
RHSA-2021:4319
Red Hat Security Advisory: compat-exiv2-026 security update
exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.7
null
null
RHSA-2019:2503
Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins security update
jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424) jenkins: CSRF protection tokens did not expire (SECURITY-626) jenkins: Unauthorized view fragment access (SECURITY-534)
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
4.3
null
RHSA-2007:0905
Red Hat Security Advisory: kdebase security update
Spoofing of URI possible in Konqueror's address bar URL spoof in address bar kdm password-less login vulnerability
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:3618
Red Hat Security Advisory: kernel update
kernel: use after free in i2c kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() kernel: i2c: validate user data in compat ioctl kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send kernel: mtd: require write permissions for locking and badblock ioctls kernel: pid: take a reference when initializing `cad_pid` kernel: i2c: i801: Don't generate an interrupt on bus reset kernel: net: usb: fix memory leak in smsc75xx_bind kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc kernel: vt: fix memory overlapping when deleting chars in the buffer kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: uio: Fix use-after-free in uio_open kernel: pvrusb2: fix use after free on context disconnection kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors kernel: RDMA/siw: Fix connection failure handling kernel: platform/x86: think-lmi: Fix reference leak kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() kernel: wifi: rt2x00: restart beacon queue when hardware reset kernel: s390/ptrace: handle setting of fpc register correctly kernel: powerpc/lib: Validate size for vector operations kernel: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() kernel: Integer Overflow in raid5_cache_count kernel: untrusted VMM can trigger int80 syscall handling kernel: i2c: i801: Fix block process call transactions kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever kernel: wifi: iwlwifi: fix a memory corruption kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump kernel: netfilter: nf_tables: disallow anonymous set with timeout flag kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout kernel: xhci: handle isoc Babble and Buffer Overrun events properly kernel: hwmon: (coretemp) Fix out-of-bounds memory access kernel: wifi: iwlwifi: mvm: fix a crash when we run out of stations kernel: wifi: iwlwifi: fix double-free bug kernel: RDMA/qedr: Fix qedr_create_user_qp error flow kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter kernel: wifi: mac80211: fix race condition on enabling fast-xmit kernel: mptcp: fix double-free on socket dismantle kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq() kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak kernel: usb: ulpi: Fix debugfs directory leak kernel: USB: core: Fix deadlock in port "disable" sysfs attribute kernel: USB: core: Fix deadlock in usb_deauthorize_interface() kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma kernel: fat: fix uninitialized field in nostale filehandles kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() kernel: net/mlx5e: Prevent deadlock while disabling aRFS kernel: wifi: brcm80211: handle pmk_op allocation failure kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work kernel: wifi: iwlwifi: mvm: ensure offloading TID queue exists kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2017:3221
Red Hat Security Advisory: php security update
gd: DoS vulnerability in gdImageCreateFromGd2Ctx() gd: Integer overflow in gd_io.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.3
null
RHSA-2019:1486
Red Hat Security Advisory: kernel-rt security update
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.3
null
RHSA-2024:1522
Red Hat Security Advisory: dnsmasq security update
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2023:1706
Red Hat Security Advisory: kernel security update
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_aus:7.4::server" ]
null
7.8
null
null
RHSA-2019:3927
Red Hat Security Advisory: ansible security and bug fix update
Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs
[ "cpe:/a:redhat:ansible_engine:2.9::el7", "cpe:/a:redhat:ansible_engine:2.9::el8" ]
null
null
5.7
null
RHSA-2021:3802
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: SVM nested virtualization issue in KVM (AVIC support) kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
7
null
null
RHSA-2025:2518
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update
dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling
[ "cpe:/a:redhat:ansible_automation_platform:2.5::el8", "cpe:/a:redhat:ansible_automation_platform:2.5::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9" ]
null
4.5
null
null
RHSA-2012:1057
Red Hat Security Advisory: resteasy security update
RESTEasy: XML eXternal Entity (XXE) flaw RESTEasy: XML eXternal Entity (XXE) flaw
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.1" ]
null
null
null
null
RHSA-2024:9729
Red Hat Security Advisory: squid security update
squid: Denial of Service processing ESI response content
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2024:5927
Red Hat Security Advisory: postgresql:16 security update
postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:9624
Red Hat Security Advisory: squid:4 security update
squid: Denial of Service processing ESI response content
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.5
null
null
RHSA-2022:4854
Red Hat Security Advisory: postgresql:10 security update
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
null
null
RHSA-2017:2335
Red Hat Security Advisory: pki-core security update
pki-core: mock CMC authentication plugin with hardcoded secret enabled by default
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.9
null
RHSA-2024:0853
Red Hat Security Advisory: Network Observability 1.5.0 for OpenShift
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()
[ "cpe:/a:redhat:network_observ_optr:1.5.0::el9" ]
null
6.1
null
null
RHSA-2024:9625
Red Hat Security Advisory: squid security update
squid: Denial of Service processing ESI response content
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2015:1005
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: security bypass leading to information disclosure (APSB15-09) flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: information leaks leading to ASLR bypass (APSB15-09) flash-plugin: information leaks leading to ASLR bypass (APSB15-09) flash-plugin: multiple code execution issues fixed in APSB15-09
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:2071
Red Hat Security Advisory: libreswan security update
libreswan: DoS attack via malicious IKEv1 informational exchange message
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.5
null
null
RHSA-2012:1326
Red Hat Security Advisory: freeradius security update
freeradius: stack-based buffer overflow via long expiration date fields in client X509 certificates
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:3839
Red Hat Security Advisory: libssh security update
libssh: NULL pointer dereference during rekeying with algorithm guessing libssh: authorization bypass in pki_verify_data_signature
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.8
null
null
RHSA-2023:4799
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update
libvirt: Memory leak in virPCIVirtualFunctionList cleanup
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
6.3
null
null
RHSA-2023:5458
Red Hat Security Advisory: libeconf security update
libeconf: Stack overflow in function read_file at libeconf/lib/getfilecontents.c
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
8.8
null
null
RHSA-2023:5738
Red Hat Security Advisory: go-toolset and golang security and bug fix update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2019:2298
Red Hat Security Advisory: libarchive security update
libarchive: Out-of-bounds read in lha_read_data_none libarchive: Double free in RAR decoder resulting in a denial of service libarchive: Use after free in RAR decoder resulting in a denial of service libarchive: Out of bounds read in archive_read_support_format_7zip.c resulting in a denial of service libarchive: Infinite recursion in archive_read_support_format_iso9660.c resulting in denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2020:4032
Red Hat Security Advisory: dbus security update
dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7
null
RHSA-2004:075
Red Hat Security Advisory: : Updated kdelibs packages resolve cookie security issue
security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2003:133
Red Hat Security Advisory: : Updated man packages fix minor vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2024:6947
Red Hat Security Advisory: grafana security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:1769
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash kernel: Null pointer dereference in the sound/usb/line6/pcm.c kernel: Null pointer dereference in the sound/usb/line6/driver.c kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c kernel: buffer-overflow hardening in WiFi beacon validation code. kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: The flow_dissector feature allows device tracking kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) kernel: a memory leak in the ath9k management function in allows local DoS kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications kernel: some ipv6 protocols not encrypted over ipsec tunnel kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open kernel: net/sched: cbs NULL pointer dereference when offloading is enabled
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
4.6
null
RHBA-2019:0028
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.9 bug fix and enhancement update
haproxy: Out-of-bounds read in HPACK decoder
[ "cpe:/a:redhat:openshift:3.9::el7" ]
null
null
5.9
null
RHSA-2021:1849
Red Hat Security Advisory: freerdp security, bug fix, and enhancement update
freerdp: out of bounds read in TrioParse freerdp: out-of-bounds read in RLEDECOMPRESS freerdp: out of bound reads resulting in accessing memory location outside of static array PRIMARY_DRAWING_ORDER_FIELD_BYTES freerdp: out-of-bound read in update_read_cache_bitmap_v3_order freerdp: out of bounds read in PRIMARY_DRAWING_ORDER_FIELD_BYTES freerdp: out-of-bound read in glyph_cache_put freerdp: out of bounds read in license_read_new_or_upgrade_license_packet freerdp: integer overflow due to missing input sanitation in rdpegfx channel
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.5
null
null
RHSA-2022:6710
Red Hat Security Advisory: thunderbird security update
Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag Mozilla: An iframe element in an HTML email could trigger a network request Mozilla: Out of bounds read when decoding H264 Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
7.5
null
RHSA-2023:2022
Red Hat Security Advisory: edk2 security update
openssl: X.400 address type confusion in X.509 GeneralName
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.4
null
null
RHSA-2020:0962
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
7.6
7.4
null
RHSA-2023:5188
Red Hat Security Advisory: thunderbird security update
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
0
null
null
RHSA-2024:5882
Red Hat Security Advisory: orc:0.4.28 security update
orc: Stack-based buffer overflow vulnerability in ORC
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
6.7
null
null
RHSA-2018:1346
Red Hat Security Advisory: kernel security and bug fix update
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution permission faults handling Kernel: error in exception handling leads to DoS
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
6.5
null
RHSA-2005:529
Red Hat Security Advisory: kernel security update
security flaw Buffer overflow in moxa driver security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:5837
Red Hat Security Advisory: nghttp2 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2024:2728
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 director Operator container images security update
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:openstack:17.1::el9" ]
null
5.9
null
null
RHSA-2023:6085
Red Hat Security Advisory: Red Hat OpenShift distributed tracing security update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_distributed_tracing:2.9::el8" ]
null
7.5
null
null
RHSA-2024:10149
Red Hat Security Advisory: Red Hat build of MicroShift 4.16.24 security update
runc: file descriptor leak
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
8.6
null
null
RHSA-2019:3207
Red Hat Security Advisory: Ansible security and bug fix update
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
[ "cpe:/a:redhat:ansible_engine:2::el7", "cpe:/a:redhat:ansible_engine:2::el8" ]
null
5
6.4
null
RHSA-2017:1975
Red Hat Security Advisory: libreoffice security and bug fix update
libreoffice: Heap-buffer-overflow in tools::Polygon::Insert
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2025:3034
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: out-of-bounds write vulnerability
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.5
null
null
RHSA-2006:0669
Red Hat Security Advisory: php security update
security flaw security flaw security flaw gd: GIF handling buffer overflow security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:2007
Red Hat Security Advisory: chromium-browser security update
chromium-browser: use after free in v8 chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHBA-2019:2501
Red Hat Bug Fix Advisory: rsyslog bug fix update
rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.3
null
RHSA-2023:3566
Red Hat Security Advisory: thunderbird security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
9.8
null
null
RHSA-2018:1852
Red Hat Security Advisory: kernel security update
Kernel: FPU state information leakage via lazy FPU restore
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.6
null
RHSA-2022:1891
Red Hat Security Advisory: libpq security update
postgresql: libpq processes unencrypted bytes from man-in-the-middle
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
3.7
null
null
RHSA-2023:6231
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-barbican) security update
openstack-barbican: Insecure Barbican configuration file leaking credential
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
6.6
null
null
RHSA-2022:0668
Red Hat Security Advisory: cyrus-sasl security update
cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
8.8
null
null
RHSA-2013:1200
Red Hat Security Advisory: python-glanceclient security update
OpenStack: python-glanceclient failing SSL certificate check
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2024:2581
Red Hat Security Advisory: pcs security update
rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
[ "cpe:/a:redhat:rhel_eus:8.8::highavailability", "cpe:/a:redhat:rhel_eus:8.8::resilientstorage" ]
null
5.3
null
null
RHSA-2020:3977
Red Hat Security Advisory: evince and poppler security and bug fix update
poppler: divide-by-zero in function SplashOutputDev::tilingPatternFill in SplashOutputDev.cc
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2020:2583
Red Hat Security Advisory: OpenShift Container Platform 4.4.9 python-psutil security update
python-psutil: Double free because of refcount mishandling
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
null
7
null
RHSA-2023:4053
Red Hat Security Advisory: OpenShift Container Platform 4.11.45 bug fix and security update
github.com/Masterminds/vcs: Command Injection via argument injection
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
9.8
null
null
RHSA-2024:4247
Red Hat Security Advisory: libuv security update
libuv: Improper Domain Lookup that potentially leads to SSRF attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.3
null
null
RHSA-2024:0434
Red Hat Security Advisory: curl security update
curl: information disclosure by exploiting a mixed case flaw
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
5.3
null
null
RHSA-2021:0994
Red Hat Security Advisory: thunderbird security update
Mozilla: Angle graphics library out of date Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: Malicious extensions could have spoofed popup information Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2023:5435
Red Hat Security Advisory: thunderbird security update
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2024:9470
Red Hat Security Advisory: cups security update
cups: libppd: remote command injection via attacker controlled data in PPD file
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.7
null
null
RHSA-2023:6836
Red Hat Security Advisory: OpenShift Container Platform 4.14.2 security and extras update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2024:6139
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHBA-2013:0386
Red Hat Bug Fix Advisory: tuned bug fix update
tuned: insecure permissions of tuned.pid
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:7766
Red Hat Security Advisory: containernetworking-plugins security update
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2025:3683
Red Hat Security Advisory: tomcat security update
tomcat: RCE due to TOCTOU issue in JSP compilation tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.6
null
null
RHSA-2018:0654
Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update
hw: cpu: speculative execution bounds-check bypass kernel: Buffer overflow in mp_override_legacy_irq() kernel: memory leak when merging buffers in SCSI IO vectors kernel: NULL pointer dereference due to KEYCTL_READ on negative key kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: Incorrect updates of uninstantiated keys crash the kernel Kernel: KVM: oops when checking KVM_CAP_PPC_HTM on PPC platform Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: Arbitrary stack overwrite causing oops via crafted signal frame kernel: Stack information leak in the EFS element kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact kernel: Race condition in sound system can lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
4.7
null
RHSA-2016:2923
Red Hat Security Advisory: openstack-cinder and openstack-glance security update
openstack-nova/glance/cinder: Malicious image may exhaust resources
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
5.3
null
RHSA-2022:0271
Red Hat Security Advisory: polkit security update
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
7.8
null
null
RHSA-2024:0979
Red Hat Security Advisory: linux-firmware security update
hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
5.3
null
null
RHSA-2024:11217
Red Hat Security Advisory: skopeo security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:6474
Red Hat Security Advisory: podman security, bug fix, and enhancement update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang.org/x/net/html: Cross site scripting golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace containerd: Supplementary groups are not set up properly golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2025:1101
Red Hat Security Advisory: Red Hat Ansible Automation Platform Execution Environments Container Release Update
aiohttp: aiohttp vulnerable to request smuggling due to incorrect parsing of chunk extensions jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ]
null
6.3
null
null
RHSA-2014:1068
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
This is the 3-year notification of the target date to migrate systems from Red Hat Network Classic Hosted to Red Hat Subscription Management. All systems using Red Hat Network Classic Hosted must be migrated to Red Hat Subscription Management.
[]
null
null
null
null
RHSA-2023:5708
Red Hat Security Advisory: dotnet6.0 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2020:2549
Red Hat Security Advisory: libexif security update
libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.1
null
null
RHSA-2004:562
Red Hat Security Advisory: httpd security update
mod_ssl SSLCipherSuite bypass security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:5239
Red Hat Security Advisory: firefox security update
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
RHSA-2024:5388
Red Hat Security Advisory: kernel security update
kernel: net: kernel: UAF in network route management
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
7.8
null
null