id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2014:0108
Red Hat Security Advisory: kernel security and bug fix update
kernel: xen: Lock order reversal between page allocation and grant table locks
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2007:0937
Red Hat Security Advisory: kernel security update
x86_64 syscall vulnerability
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:0402
Red Hat Security Advisory: bind security update
bind: DNS forwarders - cache poisoning vulnerability bind: processing large delegations may severely degrade resolver performance
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2021:0740
Red Hat Security Advisory: nodejs:12 security update
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
null
null
RHSA-2024:1994
Red Hat Security Advisory: container-tools:rhel8 security update
golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2018:2714
Red Hat Security Advisory: openstack-nova security and bug fix update
openstack-nova: Swapping encrypted volumes can allow an attacker to corrupt the LUKS header causing a denial of service in the host
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
6.5
null
RHSA-2022:4729
Red Hat Security Advisory: firefox security update
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2021:2988
Red Hat Security Advisory: varnish:6 security update
varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.1
null
null
RHSA-2017:3227
Red Hat Security Advisory: openstack-aodh security update
openstack-aodh: Aodh can be used to launder Keystone trusts
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
4.9
null
RHSA-2002:123
Red Hat Security Advisory: ghostscript security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2002:255
Red Hat Security Advisory: webalizer security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2024:6998
Red Hat Security Advisory: kernel security update
kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory kernel: nvme-tcp: fix UAF when detecting digest errors kernel: net: fix possible store tearing in neigh_periodic_work() kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: mptcp: ensure snd_nxt is properly initialized on connect kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7.8
null
null
RHSA-2007:0720
Red Hat Security Advisory: cups security update
xpdf integer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:6703
Red Hat Security Advisory: firefox security update
Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
7.5
null
RHSA-2017:0031
Red Hat Security Advisory: kernel security and bug fix update
kernel: Use-after-free in the recvmmsg exit path
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
8.1
null
RHSA-2018:2945
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Spring Boot 1.5.16 update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
null
7.5
null
RHSA-2022:5620
Red Hat Security Advisory: 389-ds:1.4 security update
389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
5.7
null
null
RHSA-2012:1346
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:7432
Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1 and kpatch-patch-5_14_0-427_31_1 security update
kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2025:3543
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8.5 for Spring Boot security update.
json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) smallrye-fault-tolerance: SmallRye Fault Tolerance spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine camel-http: org.apache.camel: bypass of header filters via specially crafted response
[ "cpe:/a:redhat:apache_camel_spring_boot:4.8.5" ]
null
6.3
null
null
RHSA-2024:10236
Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.17.0 release
nodejs-ip: arbitrary code execution via the isPublic() function jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization node-ip: Incomplete fix for CVE-2023-42282 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion path-to-regexp: Backtracking regular expressions cause ReDoS find-my-way: ReDoS vulnerability in multiparametric routes dompurify: nesting-based mutation XSS vulnerability elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
[ "cpe:/a:redhat:openshift_devspaces:3::el8" ]
null
8.2
null
null
RHSA-2024:0248
Red Hat Security Advisory: java-21-openjdk security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.4
null
null
RHSA-2017:0340
Red Hat Security Advisory: Red Hat Enterprise Linux 5 One-Month Retirement Notice
This is the One-Month notification for the retirement of Red Hat Enterprise Linux 5. This notification applies only to those customers subscribed to the channel for Red Hat Enterprise Linux 5.
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2003:006
Red Hat Security Advisory: : : : Updated libpng packages fix buffer overflow
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2013:0848
Red Hat Security Advisory: Red Hat Network Satellite spacewalk-backend security update
Satellite: Inter-Satellite Sync (ISS) does not require authentication/authorization
[ "cpe:/a:redhat:network_satellite:5.3::el5", "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6", "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6" ]
null
null
null
null
RHSA-2006:0713
Red Hat Security Advisory: python security update
python repr unicode buffer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:6243
Red Hat Security Advisory: openshift-gitops-kam security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift_gitops:1.10::el8" ]
null
7.5
null
null
RHSA-2020:0570
Red Hat Security Advisory: openjpeg2 security update
openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.8
null
null
RHSA-2002:041
Red Hat Security Advisory: : Updated mod_ssl packages available
security flaw
[ "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2019:3701
Red Hat Security Advisory: curl security and bug fix update
curl: NTLM type-2 heap out-of-bounds buffer read wget: Information exposure in set_file_metadata function in xattr.c curl: NTLMv2 type-3 header stack buffer overflow curl: SMTP end-of-response out-of-bounds read
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
4.3
null
RHSA-2021:0338
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free in fs/block_dev.c kernel: Nfsd failure to clear umask after processing an open or create
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
4.4
null
null
RHSA-2011:0945
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.1 update
JBoss Seam EL interpolation in exception handling
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
null
null
RHSA-2025:3061
Red Hat Security Advisory: OpenShift Container Platform 4.17.22 packages and security update
go-jose: Go JOSE's Parsing Vulnerable to Denial of Service
[ "cpe:/a:redhat:openshift:4.17::el8", "cpe:/a:redhat:openshift:4.17::el9" ]
null
7.5
null
null
RHSA-2020:0897
Red Hat Security Advisory: icu security update
ICU: Integer overflow in UnicodeString::doAppend()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2008:0194
Red Hat Security Advisory: xen security and bug fix update
xen xenmon.py / xenbaked insecure temporary file accesss QEMU Buffer overflow via crafted "net socket listen" option Qemu insufficient block device address range checking PVFB backend fails to validate frontend's framebuffer description PVFB SDL backend chokes on bogus screen updates qemu/kvm/xen: qemu block format auto-detection vulnerability
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:4734
Red Hat Security Advisory: krb5 security update
krb5: GSS message token handling krb5: GSS message token handling
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
6.5
null
null
RHSA-2023:3645
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.7 security update
mongo-go-driver: specific cstrings input may not be properly validated async: Prototype Pollution in async express: "qs" prototype poisoning causes the hang of the node process terser: insecure use of regular expressions leads to ReDoS
[ "cpe:/a:redhat:service_mesh:2.2::el8" ]
null
7.5
null
null
RHSA-2022:5939
Red Hat Security Advisory: kernel-rt security and bug fix update
hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) hw: cpu: Intel: Stale Data Read from legacy xAPIC vulnerability
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
6
null
null
RHSA-2016:0459
Red Hat Security Advisory: bind security update
bind: malformed packet sent to rndc can trigger assertion failure bind: malformed signature records for DNAME records can trigger assertion failure
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHBA-2025:0305
Red Hat Bug Fix Advisory: .NET 9.0 bug fix and enhancement update
dotnet: .NET Remote Code Execution Vulnerability dotnet: .NET and Visual Studio Remote Code Execution Vulnerability dotnet: .NET Elevation of Privilege Vulnerability dotnet: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.8
null
null
RHSA-2024:0374
Red Hat Security Advisory: python-pip security update
python: tarfile module directory traversal
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.5
null
null
RHSA-2018:1199
Red Hat Security Advisory: patch security update
patch: Malicious patch files cause ed to execute arbitrary commands
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2008:0884
Red Hat Security Advisory: libxml2 security update
libxml2: long entity name heap buffer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:0835
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update
Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5", "cpe:/a:redhat:jboss_enterprise_web_server:2::el6" ]
null
null
null
null
RHSA-2016:1990
Red Hat Security Advisory: Red Hat Enterprise Linux 5 Six-Month Retirement Notice
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 5. This notification applies only to those customers subscribed to the channel for Red Hat Enterprise Linux 5.
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:2903
Red Hat Security Advisory: php:7.4 security update
php: phar: infinite loop when decompressing quine gzip file php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications php: OOB read due to insufficient input validation in imageloadfont() php: PDO:: quote() may return unquoted string due to an integer overflow XKCP: buffer overflow in the SHA-3 reference implementation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2012:1232
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 update
JDK: XML parsing Denial-Of-Service (6845701) CSRF on jmx-console allows invocation of operations on mbeans JNDI: unauthenticated remote write access is permitted by default jakarta: JVM destabilization due to memory exhaustion when processing CDF/CFBF files JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2" ]
null
null
null
null
RHSA-2017:1834
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.7 on RHEL 6
Artemis: Deserialization of untrusted input vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
8.1
null
RHSA-2019:1188
Red Hat Security Advisory: qemu-kvm security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
3.8
null
RHSA-2015:1153
Red Hat Security Advisory: mailman security and bug fix update
mailman: directory traversal in MTA transports that deliver programmatically
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2025:2525
Red Hat Security Advisory: kernel security update
kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: arm64/sve: Discard stale CPU state when handling SVE traps kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
5.8
null
null
RHSA-2019:4148
Red Hat Security Advisory: thunderbird security update
Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHEA-2018:3584
Red Hat Enhancement Advisory: new packages: rust-toolset-1.29
rust: rustdoc loads plugins from world writable directory allowing for arbitrary code execution
[ "cpe:/a:redhat:devtools:2018" ]
null
null
5.3
null
RHSA-2024:7869
Red Hat Security Advisory: .NET 8.0 security update
dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2015:2155
Red Hat Security Advisory: file security and bug fix update
file: cdf_read_short_sector insufficient boundary check file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop file: mconvert incorrect handling of truncated pascal string size file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check file: cdf_read_property_info insufficient boundary check file: unrestricted regular expression matching file: incomplete fix for CVE-2012-1571 in cdf_read_property_info file: out-of-bounds read in elf note headers file: multiple denial of service issues (resource consumption) file: denial of service issue (resource consumption) file: out of bounds read in mconvert() file: malformed elf file causes access to uninitialized memory
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2014:1009
Red Hat Security Advisory: samba4 security update
samba: Uninitialized memory exposure samba: nmbd denial of service samba: smbd unicode path names denial of service samba: remote code execution in nmbd
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:1062
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: unlimiting the stack disables ASLR kernel: media: use-after-free in [tuner-xc2028] media driver kernel: Buffer overflow in firewire driver via crafted incoming packets hw: cpu: speculative execution branch target injection hw: cpu: speculative execution permission faults handling kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register kernel: memory leak when merging buffers in SCSI IO vectors kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker kernel: Missing permission check in move_pages system call kernel: Null pointer dereference in rngapi_reset function kernel: vfs: BUG in truncate_inode_pages_range() and fuse client kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: dereferencing NULL payload with nonzero length kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service kernel: improper keyrings creation kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ Kernel: KVM: DoS via write flood to I/O port 0x80 kernel: Stack information leak in the EFS element kernel: Null pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() when empty TargetInfo is returned in NTLMSSP setup negotiation response allowing to crash client's kernel kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact kernel: Race condition in sound system can lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.7
null
RHSA-2014:0526
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update
tomcat: multiple content-length header poisoning flaws tomcat: incomplete fix for CVE-2012-3544 apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5", "cpe:/a:redhat:jboss_enterprise_web_server:2::el6" ]
null
null
null
null
RHSA-2022:0325
Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update
QEMU: block: fdc: null pointer dereference may lead to guest crash
[ "cpe:/a:redhat:advanced_virtualization:8.4::el8" ]
null
3.2
null
null
RHSA-2016:1384
Red Hat Security Advisory: ceph security update
crash: mon_command crashes ceph monitors on receiving empty prefix
[ "cpe:/a:redhat:ceph_storage:1.3::el7" ]
null
null
4.9
null
RHSA-2011:1441
Red Hat Security Advisory: icedtea-web security update
IcedTea-Web: second-level domain subdomains and suffix domain SOP bypass
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2008:0516
Red Hat Security Advisory: evolution security update
evolution: iCalendar buffer overflow via large timezone specification
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2008:0058
Red Hat Security Advisory: wireshark security update
wireshark mp3 and ncp flaws wireshark ppp flaws wireshark DNP3 flaws wireshark SSL and OS/400 trace flaws wireshark ANSI MAP flaws wireshark firebird/interbase flaws wireshark HTTP dissector flaws wireshark MEGACO dissector flaws wireshark DCP ETSI dissector flaws wireshark Bluetooth SDP dissector flaws wireshark RPC Portmap flaws wireshark SMB dissector crash wireshark IPv6 and USB dissector crash wireshark WiMAX dissector possible crash wireshark RPL dissector crash wireshark CIP dissector crash
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2025:1289
Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:trusted_artifact_signer:1.1::el9" ]
null
7.5
null
null
RHSA-2017:1267
Red Hat Security Advisory: rpcbind security update
libntirpc: Memory leak when failing to parse XDR strings or bytearrays
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2007:0672
Red Hat Security Advisory: kernel security update
security flaw minix_bmap denial of service Kernel: CAPI overflow Bluetooth setsockopt() information leaks IPv6 oops triggerable by any user
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2012:1569
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:2171
Red Hat Security Advisory: kernel-rt security and bug fix update
Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.9
null
null
RHSA-2024:9653
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Memory corruption issue when processing web content webkitgtk: arbitrary javascript code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution chromium-browser: Use after free in ANGLE webkitgtk: type confusion may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2025:0051
Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, and kpatch-patch-4_18_0-477_81_1 security update
kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
5.9
null
null
RHSA-2014:0342
Red Hat Security Advisory: wireshark security update
wireshark: IEEE 802.15.4 dissector crash (wnpa-sec-2013-61) wireshark: NBAP dissector crash (wnpa-sec-2013-62) wireshark: SIP dissector crash (wnpa-sec-2013-63) wireshark: ActiveMQ OpenWire dissector large loop (wnpa-sec-2013-64) wireshark: TCP dissector crash (wnpa-sec-2013-65) wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66) wireshark: NTLMSSP v2 dissector could crash (wnpa-sec-2013-68) wireshark: NFS dissector crash (wnpa-sec-2014-01) wireshark: RLC dissector crash (wnpa-sec-2014-03) wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:0167
Red Hat Security Advisory: postgresql:9.6 security update
postgresql: Selectivity estimators bypass row security policies postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.5
7.5
null
RHSA-2018:0052
Red Hat Security Advisory: rhevm-setup-plugins security, bug fix, and enhancement update
An update for rhevm-setup-plugins is now available for RHEV Manager version 3.6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2023:1049
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Adapter: Open redirect vulnerability in checkSSO Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens keycloak: reflected XSS attack Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6" ]
null
4.6
5.6
null
RHSA-2025:0654
Red Hat Security Advisory: OpenShift Container Platform 4.17.14 bug fix and security update
PostCSS: Improper input validation in PostCSS golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html dompurify: DOMPurify vulnerable to tampering by prototype pollution nanoid: nanoid mishandles non-integer values go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
7.5
null
null
RHSA-2001:115
Red Hat Security Advisory: : New Zope packages are available
security flaw
[ "cpe:/a:redhat:powertools:6.2", "cpe:/a:redhat:powertools:7.0", "cpe:/a:redhat:powertools:7.1" ]
null
null
null
null
RHSA-2021:2374
Red Hat Security Advisory: Openshift Logging Bug Fix Release (5.0.5)
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:logging:5.0::el8" ]
null
8.6
null
null
RHSA-2024:9485
Red Hat Security Advisory: Control plane Operators for RHOSO 18.0.3 (Feature Release 1) security update
golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang: net: malformed DNS message can cause infinite loop go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:openstack_podified:1.0::el9" ]
null
7.5
null
null
RHSA-2023:4500
Red Hat Security Advisory: thunderbird security update
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
9.8
null
null
RHSA-2024:0072
Red Hat Security Advisory: squid security update
squid: DoS against HTTP and HTTPS squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2009:1430
Red Hat Security Advisory: firefox security update
firefox: URL bar spoofing vulnerability Firefox 3.5 3.0.14 browser engine crashes Firefox 3.5.2 3.0.14 browser engine crashes Firefox 3.5.3 3.0.14 browser engine crashes Firefox 3.5 3.0.14 JavaScript engine crashes Firefox 3.5.2 3.0.14 JavaScript engine crashes Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability Firefox 3.5.3 3.0.14 Location bar spoofing via tall line-height Unicode characters Firefox 3.5.3 3.0.14 Chrome privilege escalation with FeedWriter
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2007:0076
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:1080
Red Hat Security Advisory: httpd:2.4 security update
httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.3
null
null
RHSA-2023:5421
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.2 security updates and bug fixes
x/net/http2/h2c: request smuggling golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace tough-cookie: prototype pollution in cookie memstore golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:multicluster_engine:2.3::el8" ]
null
7.3
null
null
RHSA-2003:083
Red Hat Security Advisory: apache security update for Stronghold
security flaw security flaw
[ "cpe:/a:redhat:rhel_stronghold:4" ]
null
null
null
null
RHSA-2020:3539
Red Hat Security Advisory: Red Hat build of Thorntail 2.7.1 security and bug fix update
EAP: field-name is not parsed in accordance to RFC7230 keycloak: security headers missing on REST endpoints Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
6.5
null
null
RHSA-2025:2482
Red Hat Security Advisory: libxml2 security update
libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.8
null
null
RHSA-2021:5038
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.10 security updates and bug fixes
semver-regex: inefficient regular expression complexity nodejs-set-value: type confusion allows bypass of CVE-2019-10747
[ "cpe:/a:redhat:acm:2.2::el7", "cpe:/a:redhat:acm:2.2::el8" ]
null
7.3
null
null
RHSA-2023:1551
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2025:0439
Red Hat Security Advisory: Red Hat OpenStack Platform 18.0.4 (openstack-ironic) security update
openstack-ironic: Lack of checksum validation on images
[ "cpe:/a:redhat:openstack:18.0::el9" ]
null
6.3
null
null
RHSA-2022:0485
Red Hat Security Advisory: OpenShift Container Platform 4.8.31 security update
log4j-core: remote code execution via JDBC Appender
[ "cpe:/a:redhat:openshift:4.8::el8" ]
null
6.6
null
null
RHSA-2019:2130
Red Hat Security Advisory: libreoffice security and bug fix update
libreoffice: Arbitrary python functions in arbitrary modules on the filesystem can be executed without warning
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.8
null
RHSA-2022:2129
Red Hat Security Advisory: lynx security update
lynx: Disclosure of HTTP authentication credentials via SNI data
[ "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2011:1065
Red Hat Security Advisory: Red Hat Enterprise Linux 5.7 kernel security and bug fix update
kernel: xen: svm: insufficiencies in handling emulated instructions during vm exits kernel: kernel: net_sched: fix qdisc_notify() kernel: gfs2: make sure fallocate bytes is a multiple of blksize
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:0204
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2023:3136
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
3.7
null
null
RHSA-2016:1967
Red Hat Security Advisory: org.ovirt.engine-root security, bug fix, and enhancement update
ovirt-engine: ovirt-engine-provisiondb logs contain DB username and password in plain text
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
5.9
null
RHSA-2012:1580
Red Hat Security Advisory: kernel security, bug fix and enhancement update
kernel: ext4: fix inconsistency in ext4_fill_flex_info() kernel: incomplete fix for CVE-2011-4131 kernel: net: acceptation of overlapping ipv6 fragments kernel: net: divide by zero in tcp algorithm illinois kernel: mm/hotplug: failure in propagating hot-added memory to other nodes
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2014:1939
Red Hat Security Advisory: openstack-trove security update
Trove: potential leak of passwords into log files Trove: potential leak of passwords into log files
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2022:7472
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
QEMU: fdc: heap buffer overflow in DMA read data transfers libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service libguestfs: Buffer overflow in get_keys leads to DoS swtpm: Unchecked header size indicator against expected size
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null