id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:1336
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP2 security update
|
openssl: side-channel weak encryption vulnerability openssl: information disclosure in fork() openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey httpd: memory corruption on early pushes httpd: read-after-free in h2 connection shutdown httpd: limited cross-site scripting in mod_proxy error page httpd: null-pointer dereference in mod_remoteip httpd: mod_rewrite potential open redirect httpd: mod_rewrite configurations vulnerable to open redirect
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | 6.1 | 3.7 | null |
RHSA-2013:0825
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:9458
|
Red Hat Security Advisory: python3.11-urllib3 security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.4 | null | null |
RHSA-2019:3083
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 security update
|
wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 5.2 | null |
RHSA-2020:1287
|
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
|
haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 8.8 | 5.9 | null |
RHSA-2015:2547
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.3 security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_operations_network:3.2.3"
] | null | null | null | null |
RHSA-2024:6210
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.4 security update
|
axios: axios: Server-Side Request Forgery elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed
|
[
"cpe:/a:redhat:service_mesh:2.5::el8"
] | null | 5.3 | null | null |
RHSA-2023:1158
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.31 bug fix and security update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2021:0744
|
Red Hat Security Advisory: nodejs:14 security and bug fix update
|
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2016:2928
|
Red Hat Security Advisory: rh-mariadb101-mariadb security update
|
mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 4.3 | null |
RHSA-2020:2332
|
Red Hat Security Advisory: Red Hat Satellite 5 - End Of Life Notice
|
This is the notification of the End Of Life (EOL) for the following versions of Red Hat Satellite 5:
* Red Hat Satellite 5.8 on Red Hat Enterprise Linux 6
|
[
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | null | null |
RHSA-2013:0155
|
Red Hat Security Advisory: Ruby on Rails security update
|
rubygem-activerecord: find_by_* SQL Injection rubygem-activerecord: Unsafe Query Generation Risk in Ruby on Rails rubygem-activesupport: Multiple vulnerabilities in parameter parsing in ActionPack
|
[
"cpe:/a:cloudforms_cloudengine:1::el6",
"cpe:/a:cloudforms_systemengine:1::el6"
] | null | null | null | null |
RHEA-2025:2427
|
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
|
microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2014:0164
|
Red Hat Security Advisory: mysql security and bug fix update
|
mysql: unspecified vulnerability related to Error Handling DoS (CPU Jan 2014) mysql: command-line tool buffer overflow via long server version string mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB affecting integrity (CPU Jan 2014) mysql: unspecified DoS vulnerability (CPU Jan 2014) mysql: unspecified vulnerability related to Locking DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:1681
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: FUSE filesystem low-privileged user privileges escalation
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2024:1674
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update
|
undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing ssh: Prefix truncation attack on Binary Packet Protocol (BPP) undertow: directory traversal vulnerability undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 7.5 | null | null |
RHSA-2020:1326
|
Red Hat Security Advisory: openstack-manila security update
|
openstack-manila: User with share-network UUID is able to show, create and delete shares
|
[
"cpe:/a:redhat:openstack:15::el8"
] | null | 8.3 | null | null |
RHSA-2025:3371
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (openstack-ansible-core) security update
|
jinja2: Jinja sandbox breakout through attr filter selecting format method
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 7.3 | null | null |
RHSA-2024:7005
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: ice: Fix improper extts handling
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 4.4 | null | null |
RHSA-2004:090
|
Red Hat Security Advisory: libxml2 security update
|
libxml2 long URL causes SEGV
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:1786
|
Red Hat Security Advisory: httpd:2.4/mod_http2 security update
|
httpd: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0897
|
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
|
tomcat: information disclosure in authentication headers mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments apr-util: high memory consumption in apr_brigade_split_line() tomcat: file permission bypass flaw tomcat: cross-site-scripting vulnerability in the manager application tomcat: XSS vulnerability in HTML Manager interface apr: unconstrained recursion in apr_fnmatch httpd: mod_proxy_ajp worker moved to error state when timeout exceeded
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2012:0522
|
Red Hat Security Advisory: openssl security update
|
openssl: asn1_d2i_read_bio integer errors leading to buffer overflow
|
[
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es",
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es",
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:6.0",
"cpe:/o:redhat:rhel_eus:6.1",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2006:0605
|
Red Hat Security Advisory: perl security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0578
|
Red Hat Security Advisory: c-ares security update
|
c-ares: Heap buffer over read in ares_parse_soa_reply
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.9 | null | null |
RHSA-2021:0423
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.17 security and packages update
|
ant: insecure temporary file vulnerability ant: insecure temporary file jenkins: Arbitrary file read vulnerability in workspace browsers jenkins: XSS vulnerability in notification bar jenkins: Improper handling of REST API XML deserialization errors jenkins: Path traversal vulnerability in agent names jenkins: Arbitrary file existence check in file fingerprints jenkins: Excessive memory allocation in graph URLs leads to denial of service jenkins: Stored XSS vulnerability in button labels jenkins: Missing permission check for paths with specific prefix jenkins: Reflected XSS vulnerability in markup formatter preview jenkins: Stored XSS vulnerability on new item page jenkins: Filesystem traversal by privileged users
|
[
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 5.3 | null | null |
RHSA-2024:2569
|
Red Hat Security Advisory: grafana-pcp security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1173
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2023:3665
|
Red Hat Security Advisory: c-ares security update
|
c-ares: 0-byte UDP payload Denial of Service
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2015:1697
|
Red Hat Security Advisory: Red Hat Storage 2.1 - 60 Day Retirement Notice
|
This is the 60-day notification for the retirement of Red Hat Storage 2.1.
|
[] | null | null | null | null |
RHSA-2019:2336
|
Red Hat Security Advisory: unixODBC security update
|
unixODBC: Buffer overflow in unicode_to_ansi_copy() can lead to crash or other unspecified impact unixODBC: Insecure buffer copy in SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null |
RHSA-2017:1445
|
Red Hat Security Advisory: python-django security update
|
python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 6.1 | null |
RHSA-2018:0031
|
Red Hat Security Advisory: libvirt security update
|
An update for libvirt is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | null | null |
RHSA-2023:6246
|
Red Hat Security Advisory: .NET 7.0 security update
|
dotnet: Denial of Service with Client Certificates using .NET Kestrel
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2018:0050
|
Red Hat Security Advisory: vdsm security update
|
An update for vdsm is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2023:4731
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.10 security update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2024:0807
|
Red Hat Security Advisory: dotnet6.0 security update
|
dotnet: Denial of Service in SignalR server dotnet: Denial of Service in X509Certificate2
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2019:1591
|
Red Hat Security Advisory: OpenShift Container Platform 4.1 image security update
|
openshift: OAuth access tokens written in plaintext to API server audit logs
|
[
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 2.3 | null |
RHSA-2021:2479
|
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update
|
NooBaa: noobaa-operator leaking RPC AuthToken into log files
|
[
"cpe:/a:redhat:openshift_container_storage:4.6::el8"
] | null | 8.8 | null | null |
RHSA-2009:1670
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket kernel: nfsv4: kernel panic in nfs4_proc_lock()
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0663
|
Red Hat Security Advisory: samba security update
|
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 9.9 | null | null |
RHSA-2017:0156
|
Red Hat Security Advisory: openstack-cinder security update
|
openstack-nova/glance/cinder: Malicious image may exhaust resources
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 5.3 | null |
RHSA-2017:0346
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: dccp: crash while sending ipv6 reset packet kernel: use after free in dccp protocol
|
[
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 7.8 | null |
RHSA-2022:6963
|
Red Hat Security Advisory: nodejs security update
|
nodejs: weak randomness in WebCrypto keygen nodejs: HTTP Request Smuggling due to incorrect parsing of header fields
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2018:2818
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Function signature mismatch in WebAssembly chromium-browser: URL Spoofing in Omnibox
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 5.3 | null |
RHSA-2018:2309
|
Red Hat Security Advisory: kernel security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
RHSA-2020:4949
|
Red Hat Security Advisory: freetype security update
|
freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png
|
[
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 8.6 | null | null |
RHSA-2019:0790
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2016:2115
|
Red Hat Security Advisory: openstack-manila-ui security update
|
openstack-manila-ui: persistent XSS in metadata field
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 4.1 | null |
RHSA-2022:7330
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: posix cpu timer use-after-free may lead to local privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2019:3278
|
Red Hat Security Advisory: sudo security update
|
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7 | null |
RHSA-2022:7056
|
Red Hat Security Advisory: samba security, bug fix and enhancement update
|
samba: server memory information leak via SMB1
|
[
"cpe:/a:redhat:storage:3.5:samba:el8"
] | null | 4.3 | null | null |
RHSA-2016:1547
|
Red Hat Security Advisory: libtiff security update
|
libtiff: out-of-bounds read with malformed TIFF image in multiple tools libtiff: out-of-bounds read/write with malformed TIFF image in tiff2pdf libtiff: divide by zero in the tiffdither tool libtiff: Out-of-bounds reads followed by a crash in bmp2tiff libtiff: use of uninitialized memory in putcontig8bitYCbCr21tile and NeXTDecode libtiff: use of uninitialized memory in NeXTDecode libtiff: Invalid-write in _TIFFVGetField() when parsing some extension tags libtiff: Out-of-bounds read in tif_getimage.c libtiff: OOB read in bmp2tiff libtiff: Out-of-bounds when reading CIE Lab image format files libtiff: invalid assertion libtiff: invalid assertion libtiff: invalid assertion libtiff: out-of-bound write in NeXTDecode() libtiff: out-of-bounds write in _TIFFVGetField function libtiff: out-of-bounds write in the tiff2rgba tool libtiff: out-of-bounds write in horizontalDifference8() libtiff: out-of-bounds write in loadImage() function libtiff: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.3 | null |
RHSA-2023:4961
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter Kernel: bluetooth: Unauthorized management command execution kernel: OOB access in the Linux kernel's XFS subsystem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/a:redhat:rhel_e4s:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2020:4628
|
Red Hat Security Advisory: libreoffice security, bug fix, and enhancement update
|
libreoffice: 'stealth mode' remote resource restrictions bypass libreoffice: forms allowed to be submitted to any URI could result in local file overwrite
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2021:1686
|
Red Hat Security Advisory: wpa_supplicant security, bug fix, and enhancement update
|
wpa_supplicant: P2P group information processing vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2018:3519
|
Red Hat Security Advisory: Red Hat JBoss SOA Platform security update
|
RichFaces: Expression Language injection via UserResource allows for unauthenticated remote code execution
|
[
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | 9.8 | null |
RHSA-2024:1566
|
Red Hat Security Advisory: Red Hat build of MicroShift 4.14.19 security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2020:0720
|
Red Hat Security Advisory: python-waitress security update
|
waitress: HTTP request smuggling through LF vs CRLF handling waitress: HTTP request smuggling through invalid Transfer-Encoding waitress: HTTP Request Smuggling through Invalid whitespace characters in headers
|
[
"cpe:/a:redhat:openstack:15::el8"
] | null | 8.2 | null | null |
RHSA-2021:1030
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 4.3 | null | null |
RHSA-2023:4697
|
Red Hat Security Advisory: kernel security update
|
kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2018:1446
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Heap buffer overflow in PDFium chromium-browser: Privilege Escalation in extensions chromium-browser: Type confusion in V8
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2014:1938
|
Red Hat Security Advisory: openstack-neutron security and bug fix update
|
openstack-neutron: DoS via maliciously crafted dns_nameservers
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2023:0074
|
Red Hat Security Advisory: RHV 4.4 SP1 [ovirt-4.5.3-3] security update
|
isomorphic-git: Directory traversal via a crafted repository mina-sshd: Java unsafe deserialization vulnerability
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 9.8 | null | null |
RHSA-2024:0026
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | null | null |
RHSA-2019:1167
|
Red Hat Security Advisory: kernel security and bug fix update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) kernel: use-after-free and OOPS in drivers/char/ipmi/ipmi_msghandler.c hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 3.8 | null |
RHSA-2006:0617
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHEA-2019:4262
|
Red Hat Enhancement Advisory: webkit2gtk3 enhancement update
|
webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2009:0362
|
Red Hat Security Advisory: NetworkManager security update
|
NetworkManager: GetSecrets disclosure
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0302
|
Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.0 for RHEL 9:security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:kube_descheduler_operator:5.0::el9"
] | null | 7.5 | null | null |
RHSA-2020:3133
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.4.4 release and security update
|
springframework: DoS Attack via Range Requests apache-commons-configuration: uncontrolled class instantiation when loading YAML files broker: resetUsers operation stores password in plain text netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 7.5 | 3.1 | null |
RHSA-2005:413
|
Red Hat Security Advisory: ImageMagick security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2012:1438
|
Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 End of Life Extension
|
This is the Red Hat Enterprise Virtualization 2 End Of Life Extension
notification.
|
[] | null | null | null | null |
RHBA-2006:0294
|
Red Hat Bug Fix Advisory: perl bug fix update
|
leaks file existance information
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:4182
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Count overflow in FUSE request leading to use-after-free issues.
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2015:0938
|
Red Hat Security Advisory: openstack-glance security and bug fix update
|
openstack-glance: potential resource exhaustion and denial of service using images manipulation API openstack-glance: potential resource exhaustion and denial of service using images manipulation API
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2005:864
|
Red Hat Security Advisory: udev security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2007:0890
|
Red Hat Security Advisory: php security update
|
gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG php chunk_split integer overflow php cross-site cookie insertion php multiple integer overflows in gd php floating point exception inside wordwrap php money_format format string issue php malformed cookie handling
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:2870
|
Red Hat Security Advisory: freeradius:3.0 security update
|
freeradius: Information leakage in EAP-PWD freeradius: Crash on unknown option in EAP-SIM freeradius: Crash on invalid abinary data
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2025:2864
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: out-of-bounds write vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2019:1171
|
Red Hat Security Advisory: kernel security and bug fix update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 3.8 | null |
RHSA-2021:2380
|
Red Hat Security Advisory: servicemesh-operator security update
|
servicemesh-operator: NetworkPolicy resources incorrectly specify ports for ingress resources
|
[
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 9.8 | null | null |
RHSA-2024:11232
|
Red Hat Security Advisory: unbound:1.16.2 security update
|
unbound: Unbounded name compression could lead to Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2023:3140
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2024:8798
|
Red Hat Security Advisory: xorg-x11-server and xorg-x11-server-Xwayland security update
|
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2022:7444
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: off-path attacker may inject data or terminate victim's TCP session kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference kernel: use-after-free vulnerability in function sco_sock_sendmsg() kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c kernel: veth: ensure skb entering GRO are not cloned. kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB kernel: smb2_ioctl_query_info NULL pointer dereference kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback kernel: swiotlb information leak with DMA_FROM_DEVICE kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: race condition in snd_pcm_hw_free leading to use-after-free kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS kernel: buffer overflow in nft_set_desc_concat_parse() kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() kernel: LoadPin bypass via dm-verity table reload kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: use-after-free when psi trigger is destroyed while being polled kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats() kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c kernel: possible to use the debugger to write zero into a location of choice kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions kernel: memory leak in drivers/hid/hid-elo.c kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c kernel: use after free in SUNRPC subsystem kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c kernel: iwlwifi: mvm: check debugfs_dir ptr before use
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.5 | null | null |
RHSA-2021:4100
|
Red Hat Security Advisory: Red Hat Integration - Service Registry release and security update [2.0.2.GA]
|
apache-httpclient: incorrect handling of malformed authority component in request URIs resteasy: Error message exposes endpoint class information RESTEasy: PathParam in RESTEasy can lead to a reflected XSS attack
|
[
"cpe:/a:redhat:integration:1"
] | null | 5.4 | null | null |
RHSA-2011:1350
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: tpm infoleaks kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls kernel: agp: insufficient page_count parameter checking in agp_allocate_memory() kernel: ecryptfs: mount source TOCTOU race kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls kernel: taskstats: duplicate entries in listener mode can lead to DoS kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions kernel: perf, x86: fix Intel fixed counters base initialization kernel: gro: only reset frag0 when skb can be pulled kernel: af_packet: infoleak kernel: perf: Fix software event overflow
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:3100
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 5.3 | null | null |
RHSA-2009:1619
|
Red Hat Security Advisory: dstat security update
|
dstat insecure module search path
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3042
|
Red Hat Security Advisory: rust-toolset-1.52 and rust-toolset-1.52-rust security and enhancement update
|
rust: optimization for joining strings can cause uninitialized bytes to be exposed rust: heap-based buffer overflow in read_to_end() because it does not validate the return value from Read in an unsafe context rust: panic safety issue in Zip implementation rust: memory safety violation in Zip implementation for nested iter::Zips rust: memory safety violation in Zip implementation when next_back() and next() are used together rust: integer overflow in the Zip implementation can lead to a buffer overflow rust: double free in Vec::from_iter function if freeing the element panics
|
[
"cpe:/a:redhat:devtools:2021"
] | null | 9.8 | null | null |
RHSA-2023:3323
|
Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update
|
golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
|
[
"cpe:/a:redhat:devtools:2023::el7"
] | null | 7.3 | null | null |
RHSA-2020:4049
|
Red Hat Security Advisory: virt:rhel security update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 5 | null | null |
RHSA-2019:2949
|
Red Hat Security Advisory: httpd24-httpd and httpd24-nghttp2 security update
|
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: request for large response leads to denial of service
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2022:7344
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2023:0432
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update
|
QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 6.5 | null | null |
RHSA-2007:0871
|
Red Hat Security Advisory: tomcat security update
|
tomcat handling of cookies tomcat handling of cookie values tomcat host manager xss
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2003:033
|
Red Hat Security Advisory: tcpdump security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2013:1853
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.0 update
|
Tomcat/JBoss Web - Bypass of CSRF prevention filter jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name Java: XML signature spoofing
|
[
"cpe:/a:redhat:jboss_operations_network:3.2.0"
] | null | null | 3.7 | null |
RHSA-2024:8856
|
Red Hat Security Advisory: kernel security update
|
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: gso: do not skip outer ip header in case of ipip and net_failover kernel: dmaengine: fix NULL pointer in channel unregistration function kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range kernel: netfilter: nft_set_pipapo: do not free live element kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump kernel: nouveau: lock the client object tree. kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: dma-direct: Leak pages on dma_set_decrypted() failure kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: of: module: add buffer overflow check in of_modalias() kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. kernel: net/mlx5e: Fix netif state handling kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type kernel: drm/i915/dpt: Make DPT object unshrinkable kernel: ipv6: prevent possible NULL deref in fib6_nh_init() kernel: tipc: force a dst refcount before doing decryption kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: bpf: Fix overrunning reservations in ringbuf kernel: netfilter: nf_tables: prefer nft_chain_validate kernel: ibmvnic: Add tx check to prevent skb leak kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers kernel: drm/amdgpu: avoid using null object of framebuffer kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush kernel: USB: serial: mos7840: fix crash on resume kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error kernel: kobject_uevent: Fix OOB access within zap_modalias_env() kernel: dev/parport: fix the array out-of-bounds risk kernel: block: initialize integrity buffer to zero before writing it to media kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() kernel: memcg: protect concurrent access to mem_cgroup_idr kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). kernel: bonding: fix xfrm real_dev null pointer dereference kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok kernel: netfilter: flowtable: initialise extack before use kernel: ethtool: check device is present when getting link settings kernel: ELF: fix kernel.randomize_va_space double read kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.