id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2021:1214
Red Hat Security Advisory: libldb security update
samba: Out of bounds read in AD DC LDAP server
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.1
null
null
RHSA-2021:4946
Red Hat Security Advisory: nss security update
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
[ "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
9.8
null
null
RHSA-2021:3336
Red Hat Security Advisory: sssd security and bug fix update
sssd: shell command injection in sssctl
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.7
null
null
RHSA-2020:2065
Red Hat Security Advisory: qemu-kvm-ma security update
QEMU: slirp: heap buffer overflow during packet reassembly
[ "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
7
null
RHSA-2012:0079
Red Hat Security Advisory: firefox security update
Mozilla: child nodes from nsDOMAttribute still accessible after removal of nodes (MFSA 2012-04) Mozilla: Same-origin bypass using IPv6-like hostname syntax (MFSA 2012-02) Mozilla: memory safety hazards in 10.0/1.9.2.26 (MFSA 2012-01) Firefox: Ogg Vorbis Decoding Memory Corruption (MFSA 2012-07) Mozilla: Crash when rendering SVG+XSLT (MFSA 2012-08)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:3191
Red Hat Security Advisory: kpatch-patch security update
kernel: net/ulp: use-after-free in listening ULP sockets kernel: remote DoS in TIPC kernel module
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.5
null
null
RHSA-2021:2116
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.6 (python-httplib2) security update
python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function python-httplib2: Regular expression denial of service via malicious header
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2024:4520
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.16 security and bug fix update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping webpack-dev-middleware: lack of URL validation may lead to file leak envoy: HTTP/2 CPU exhaustion due to CONTINUATION frame flood
[ "cpe:/a:redhat:rhmt:1.7::el8" ]
null
5.3
null
null
RHSA-2023:1170
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.1 security bug fix update
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
[ "cpe:/a:redhat:openshift_data_foundation:4.12::el8" ]
null
7
null
null
RHSA-2003:033
Red Hat Security Advisory: tcpdump security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2020:2026
Red Hat Security Advisory: OpenShift Container Platform 4.2.33 security update
openshift/cluster-image-registry-operator: secrets disclosed in logs
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
7
null
null
RHSA-2023:6811
Red Hat Security Advisory: insights-client security update
insights-client: unsafe handling of temporary files and directories
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.8
null
null
RHSA-2018:2242
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.7
null
RHSA-2020:3727
Red Hat Security Advisory: OpenShift Container Platform 3.11.286 security update
kibana: X-Frame-Option not set by default might lead to clickjacking golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
7.5
null
null
RHSA-2024:4212
Red Hat Security Advisory: golang security update
golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.7
null
null
RHSA-2022:5704
Red Hat Security Advisory: ACS 3.71 enhancement and security update
go-tuf: No protection against rollback attacks for roles other than root
[ "cpe:/a:redhat:advanced_cluster_security:3.71::el8" ]
null
8
null
null
RHSA-2024:0271
Red Hat Security Advisory: Logging Subsystem 5.8.2 - Red Hat OpenShift security update
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()
[ "cpe:/a:redhat:logging:5.8::el9" ]
null
6.1
null
null
RHSA-2014:1061
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
This is the 3-year notification of the target date to migrate systems from Red Hat Network Classic Hosted to Red Hat Subscription Management. All systems using Red Hat Network Classic Hosted must be migrated to Red Hat Subscription Management.
[]
null
null
null
null
RHSA-2024:0412
Red Hat Security Advisory: kernel security and bug fix update
kernel: swiotlb information leak with DMA_FROM_DEVICE kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: data races around sk->sk_prot kernel: USB-accessible buffer overflow in brcmfmac kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: Report vmalloc UAF in dvb-core/dmxdev kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: HID: check empty report_list in hid_validate_values() kernel: hid: Use After Free in asus_remove() kernel: use-after-free in smb2_is_status_io_timeout() kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: denial of service in tipc_conn_close kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() kernel: use-after-free bug in remove function xgene_hwmon_remove kernel: Spectre v2 SMT mitigations problem kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() kernel: ext4: use-after-free in ext4_xattr_set_entry() kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: out-of-bounds access in relay_file_read kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: slab-out-of-bounds read vulnerabilities in cbq_classify kernel: mpls: double free on sysctl allocation failure kernel: out-of-bounds write in qfq_change_class function kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
5.6
null
RHSA-2018:3107
Red Hat Security Advisory: wpa_supplicant security and bug fix update
wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.3
null
RHSA-2016:2605
Red Hat Security Advisory: util-linux security, bug fix, and enhancement update
util-linux: Extended partition loop in MBR partition table leads to DOS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.6
null
RHSA-2021:3454
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.2 security and bug fix update
nodejs-kind-of: ctorName in index.js allows external user input to overwrite certain internal attributes
[ "cpe:/a:redhat:acm:2.3::el7", "cpe:/a:redhat:acm:2.3::el8" ]
null
5.9
null
null
RHSA-2025:3025
Red Hat Security Advisory: kernel security update
kernel: can: bcm: Fix UAF in bcm_proc_show()
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.8
null
null
RHSA-2023:4146
Red Hat Security Advisory: kpatch-patch security update
kernel: net/ulp: use-after-free in listening ULP sockets kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: remote DoS in TIPC kernel module kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/o:redhat:rhel_e4s:8.2::baseos" ]
null
7.8
null
null
RHSA-2002:007
Red Hat Security Advisory: : Updated 2.4 kernel available
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2019:1143
Red Hat Security Advisory: flatpak security update
flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.8
null
RHSA-2018:0602
Red Hat Security Advisory: openstack-tripleo-common and openstack-tripleo-heat-templates update
openstack-tripleo-heat-templates: Ceph client keyring is world-readable when deployed by director
[ "cpe:/a:redhat:openstack:12::el7" ]
null
null
8.4
null
RHSA-2023:7827
Red Hat Security Advisory: OpenShift Container Platform 4.13.z security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2024:6156
Red Hat Security Advisory: kernel security update
kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.1
null
null
RHSA-2012:0359
Red Hat Security Advisory: flash-plugin security update
flash-plugin: code execution flaw (APSB12-05) flash-plugin: information disclosure flaw (APSB12-05)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:4922
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
7.5
null
null
RHSA-2007:0938
Red Hat Security Advisory: kernel security update
x86_64 syscall vulnerability
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2009:1148
Red Hat Security Advisory: httpd security update
httpd: mod_proxy reverse proxy DoS (infinite loop) httpd: possible temporary DoS (CPU consumption) in mod_deflate
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1509
Red Hat Security Advisory: java-1.5.0-ibm security update
OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) JDK: unspecified sandbox bypass (JVM) JDK: XML4J xml entity expansion excessive memory use (XML) JDK: unspecified sandbox bypass (XML) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient security checks (Beans, 8012071) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) JDK: unspecified vulnerability fixed in 7u45 (2D) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) JDK: unspecified vulnerability fixed in 7u45 (2D) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2022:0177
Red Hat Security Advisory: gegl04 security update
gegl: shell expansion via a crafted pathname
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
RHSA-2022:0672
Red Hat Security Advisory: ruby:2.5 security update
rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.4
null
null
RHSA-2020:2603
Red Hat Security Advisory: Red Hat build of Quarkus 1.3.4 security update
snakeyaml: Billion laughs attack via alias feature
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.6
null
null
RHSA-2020:1933
Red Hat Security Advisory: targetcli security update
targetcli: world writable /var/run/targetclid.sock allows unprivileged user to execute commands
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2010:0978
Red Hat Security Advisory: openssl security update
openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2009:1455
Red Hat Security Advisory: kernel security and bug fix update
kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2011:1360
Red Hat Security Advisory: xorg-x11 security update
X.org: multiple GLX input sanitization flaws X.org: ProcRenderAddGlyphs input sanitization flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:4545
Red Hat Security Advisory: git-lfs security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2012:1028
Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.0 update
Invoker servlets authentication bypass (HTTP verb tampering) JNDI: unauthenticated remote write access is permitted by default JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3" ]
null
null
null
null
RHSA-2009:1503
Red Hat Security Advisory: gpdf security update
xpdf: multiple integer overflows xpdf/poppler: SplashBitmap integer overflow xpdf/poppler: Splash:: drawImage integer overflow and missing allocation return value check xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016) xpdf/poppler: ImageStream:: ImageStream integer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:8889
Red Hat Security Advisory: Openshift Logging 5.3.14 bug fix release and security update
jackson-databind: denial of service via a large depth of nested objects jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
7.5
null
null
RHSA-2016:2591
Red Hat Security Advisory: krb5 security, bug fix, and enhancement update
krb5: null pointer dereference in kadmin krb5: S4U2Self KDC crash when anon is restricted
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2023:6919
Red Hat Security Advisory: edk2 security and bug fix update
edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler()
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
null
null
RHSA-2024:1502
Red Hat Security Advisory: grafana-pcp security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:5995
Red Hat Security Advisory: python3 security update
python: TLS handshake bypass
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream", "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
8.6
null
null
RHSA-2024:7851
Red Hat Security Advisory: .NET 6.0 security update
dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2017:1271
Red Hat Security Advisory: samba4 security update
samba: Loading shared modules from any path in the system leading to RCE (SambaCry)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2020:4072
Red Hat Security Advisory: libcroco security update
libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.1
null
null
RHSA-2024:10265
Red Hat Security Advisory: kernel security update
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: mptcp: pm: Fix uaf in __timer_delete_sync
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7
null
null
RHSA-2024:10501
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: data isolation bypass vulnerability
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
6.1
null
null
RHSA-2024:6488
Red Hat Security Advisory: python39:3.9 security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2024:2668
Red Hat Security Advisory: OpenShift Container Platform 4.14.24 bug fix and security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ironic-image: Unauthenticated local access to Ironic API
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
4.7
null
null
RHSA-2021:4257
Red Hat Security Advisory: httpd:2.4 security, bug fix, and enhancement update
httpd: mod_session: NULL pointer dereference when parsing Cookie header httpd: Unexpected URL matching with 'MergeSlashes OFF'
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2018:2020
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R8 security and bug fix update
spark: Absolute and relative pathnames allow for unintended static file disclosure
[ "cpe:/a:redhat:jboss_amq:6.3", "cpe:/a:redhat:jboss_fuse:6.3" ]
null
null
5.3
null
RHSA-2018:1136
Red Hat Security Advisory: glusterfs security update
glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled
[ "cpe:/a:redhat:storage:3.3:server:el7", "cpe:/a:redhat:storage:3:client:el7", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
8.3
null
RHSA-2023:0895
Red Hat Security Advisory: OpenShift Container Platform 4.11.29 security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2008:0585
Red Hat Security Advisory: kernel security and bug fix update
kernel: non-root can trigger cpu_idle soft lockup IPSec ESP kernel panics kernel: infinite loop in highres timers (kernel hang) kernel: ptrace: Unprivileged crash on x86_64 %cs corruption kernel: sit memory leak kernel: fix permission checking in sys_utimensat kernel: Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP kernel: [x86_64] The string instruction version didn't zero the output on exception. kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2021:0084
Red Hat Security Advisory: Red Hat build of Quarkus 1.7.6 release and security update
apache-httpclient: incorrect handling of malformed authority component in request URIs
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
5.3
null
null
RHSA-2018:1199
Red Hat Security Advisory: patch security update
patch: Malicious patch files cause ed to execute arbitrary commands
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2014:1943
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: xfs: directory hash ordering denial of service kernel: insufficient syscall number validation in perf and ftrace subsystems kernel: insufficient syscall number validation in perf and ftrace subsystems
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2007:0347
Red Hat Security Advisory: kernel security and bug fix update
Various NULL pointer dereferences in netfilter code IPv6 fragments bypass in nf_conntrack netfilter code IPv6 oops triggerable by any user infinite recursion in netlink fib_semantics.c out of bounds access vulnerability IPv6 routing headers issue
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:1570
Red Hat Security Advisory: ACS 4.4 enhancement and security update
helm: shows secrets with --dry-run option in clear text graphql: Insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries golang: net/http: insufficient sanitization of Host header go-git: Maliciously crafted Git server replies can cause DoS on go-git clients helm: Missing YAML Content Leads To Panic jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:advanced_cluster_security:4.4::el8" ]
null
4.3
null
null
RHSA-2022:7558
Red Hat Security Advisory: wavpack security update
wavpack: Heap out-of-bounds read in WavpackPackSamples()
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.5
null
null
RHSA-2002:254
Red Hat Security Advisory: : Updated Webalizer packages fix vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2019:3046
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.4 security update on RHEL 8
undertow: Information leak in requests for directories without trailing slashes jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
null
5
null
RHSA-2024:6909
Red Hat Security Advisory: python3.9 security update
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
6.8
null
null
RHSA-2019:1264
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2022:0475
Red Hat Security Advisory: RHV Manager (ovirt-engine) security update [ovirt-4.4.10-1]
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:rhev_manager:4.4:el8" ]
null
8.8
null
null
RHSA-2022:6969
Red Hat Security Advisory: Red Hat OpenStack Platform (tripleo-ansible) security update
tripleo-ansible: /var/lib/mistral/overcloud discoverable tripleo-ansible: /etc/openstack/clouds.yaml discoverable
[ "cpe:/a:redhat:openstack:16.1::el8", "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.3
null
null
RHSA-2024:0575
Red Hat Security Advisory: kernel security and bug fix update
kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: HID: check empty report_list in hid_validate_values() kernel: net/tls: tls_is_tx_ready() checked list_entry kernel: hid: Use After Free in asus_remove() kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() kernel: use-after-free bug in remove function xgene_hwmon_remove kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: Use after free bug in r592_remove kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: smsusb: use-after-free caused by do_submit_urb() kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion kernel: mpls: double free on sysctl allocation failure kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c kernel: out-of-bounds write in qfq_change_class function kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() kernel: r592: race condition leading to use-after-free in r592_remove() kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: SEV-ES local priv escalation
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7
null
null
RHSA-2020:5400
Red Hat Security Advisory: thunderbird security update
Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2023:4067
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
RHSA-2021:3700
Red Hat Security Advisory: Red Hat AMQ Broker 7.9.0 release and security update
apache-httpclient: incorrect handling of malformed authority component in request URIs jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS Broker: discloses JDBC username and password in the application log file 7: Incorrect privilege in Management Console resteasy: Error message exposes endpoint class information netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header jetty: Symlink directory exposes webapp directory contents jetty: Ambiguous paths can access WEB-INF jetty: Resource exhaustion when receiving an invalid large TLS frame jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 jetty: SessionListener can prevent a session from being invalidated breaking logout jetty: crafted URIs allow bypassing security constraints
[ "cpe:/a:redhat:amq_broker:7" ]
null
5.3
null
null
RHSA-2024:0304
Red Hat Security Advisory: RHACS 3.74 enhancement and security update
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:advanced_cluster_security:3.74::el8" ]
null
7.5
null
null
RHSA-2005:373
Red Hat Security Advisory: net-snmp security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2019:0464
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.1
null
RHSA-2023:7261
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.4
null
null
RHSA-2023:7854
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 7
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" ]
null
7.7
null
null
RHSA-2020:3233
Red Hat Security Advisory: firefox security update
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
8.8
8.8
null
RHSA-2022:2268
Red Hat Security Advisory: OpenShift Container Platform 4.7.51 security update
openshift/router: route hijacking attack via crafted HAProxy configuration file
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
6.3
null
null
RHSA-2019:2141
Red Hat Security Advisory: kde-workspace security and bug fix update
kde-workspace: Missing sanitization of notifications allows to leak client IP address via IMG element
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2019:1708
Red Hat Security Advisory: ansible security and bug fix update
ansible: unsafe template evaluation of returned module data can lead to information disclosure
[ "cpe:/a:redhat:ansible_engine:2.8::el7", "cpe:/a:redhat:ansible_engine:2.8::el8" ]
null
null
4.6
null
RHSA-2022:6443
Red Hat Security Advisory: mariadb:10.3 security and bug fix update
mariadb: Crash executing query with VIEW, aggregate and subquery mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) mysql: C API unspecified vulnerability (CPU Oct 2022) mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer mariadb: lack of validating the existence of an object prior to performing operations on the object mariadb: lack of proper validation of a user-supplied string before using it as a format specifier mariadb: CONNECT storage engine heap-based buffer overflow mariadb: assertion failure in Item_args::walk_arg mariadb: use-after-poison when complex conversion is involved in blob mariadb: server crash in create_tmp_table::finalize mariadb: server crash in component arg_comparator::compare_real_fixed mariadb: server crash at my_decimal::operator= mariadb: server crash at Field::set_default via specially crafted SQL statements mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c mariadb: crash via component Item_subselect::init_expr_cache_tracker mariadb: server crashes in query_arena::set_query_arena upon SELECT from view mariadb: assertion failures in decimal_bin_size mariadb: assertion failure in compare_order_elements mariadb: use-after-poison in Binary_string::free_buffer mariadb: crash in multi-update and implicit grouping mariadb: assertion failure in sql/item_func.cc mariadb: assertion failure in sql/item_cmpfunc.cc mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc mariadb: use-after-poison in Binary_string::free_buffer mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc mariadb: server crash at Item_subselect::init_expr_cache_tracker mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor mariadb: server crash in Item_args::walk_args mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2024:3483
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Security and Bug Fix Update
dnspython: denial of service in stub resolver
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_cloud_billing:2.4::el8" ]
null
5.9
null
null
RHSA-2016:1218
Red Hat Security Advisory: Red Hat JBoss BPM Suite security and bug fix update
Framework: denial-of-service attack with XML input
[ "cpe:/a:redhat:jboss_bpms:6.2" ]
null
null
5.3
null
RHSA-2024:7623
Red Hat Security Advisory: cups-filters security update
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.5
null
null
RHSA-2024:6964
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
QEMU: virtio: DMA reentrancy issue leads to double free vulnerability libnbd: NBD server improper certificate validation QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.4
7.5
null
RHSA-2022:0473
Red Hat Security Advisory: aide security update
aide: heap-based buffer overflow on outputs larger than B64_BUF
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2019:0857
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.7 security update on RHEL 6
keycloak: session hijack using the user access token
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
null
3.8
null
RHSA-2014:1786
Red Hat Security Advisory: openstack-neutron security, bug fix, and enhancement update
openstack-neutron: Admin-only network attributes may be reset to defaults by non-privileged users
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2021:0181
Red Hat Security Advisory: kernel security update
Kernel: x86_32: BUG in syscall auditing
[ "cpe:/o:redhat:rhel_els:6" ]
null
5.5
null
null
RHSA-2019:2294
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
libvirt: NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.8
null
RHSA-2010:0401
Red Hat Security Advisory: tetex security update
dvips -z buffer overflow with long href xpdf: multiple integer overflows xpdf/poppler: ImageStream:: ImageStream integer overflow texlive: Integer overflow by processing special commands texlive: Buffer overflow flaw by processing virtual font files texlive: Integer overflow by processing special commands
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:3544
Red Hat Security Advisory: nodejs:18 security update
nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
5.3
null
null
RHSA-2024:8356
Red Hat Security Advisory: NetworkManager-libreswan security update
NetworkManager-libreswan: Local privilege escalation via leftupdown
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.8
null
null
RHSA-2003:037
Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null