id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2004:464
Red Hat Security Advisory: mc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:1881
Red Hat Security Advisory: kernel security and bug fix update
kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: tls: use-after-free with partial reads and async decrypt kernel: tls: handle backlogging of crypto requests kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: gro: fix ownership transfer
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.5
null
null
RHSA-2023:3424
Red Hat Security Advisory: cups-filters security update
cups-filters: remote code execution in cups-filters, beh CUPS backend
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
8.8
null
null
RHSA-2018:1703
Red Hat Security Advisory: librelp security update
librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
8.1
null
RHSA-2022:8856
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-django-horizon) security update
OpenStack: Horizon session cookies are not flagged HttpOnly
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
4.2
null
null
RHSA-2014:0573
Red Hat Security Advisory: Red Hat Enterprise Linux 6.3 Extended Update Support One-Month Notice
This is the One-Month notification for the retirement of Red Hat Enterprise Linux 6.3 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.3.
[ "cpe:/o:redhat:rhel_eus:6.3::server" ]
null
null
null
null
RHSA-2012:1359
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: null function pointer invocation in virNetServerProgramDispatchCall()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:10966
Red Hat Security Advisory: ruby:3.1 security update
rexml: REXML ReDoS vulnerability
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2005:761
Red Hat Security Advisory: pcre security update
pcre heap overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2002:184
Red Hat Security Advisory: openssl security update for Stronghold
security flaw
[ "cpe:/a:redhat:stronghold:3" ]
null
null
null
null
RHSA-2024:4746
Red Hat Security Advisory: fence-agents update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::highavailability", "cpe:/a:redhat:rhel_eus:8.8::resilientstorage" ]
null
4.4
null
null
RHSA-2021:2588
Red Hat Security Advisory: ruby:2.6 security, bug fix, and enhancement update
rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication ruby: HTTP response splitting in WEBrick ruby: Code injection via command argument of Shell#test / Shell#[] rubygem-json: Unsafe object creation vulnerability in JSON ruby: BasicSocket#read_nonblock method leads to information disclosure ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
7.5
null
RHSA-2025:3608
Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.0 release and security update
tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
[ "cpe:/a:redhat:jboss_enterprise_web_server:6.1::el8", "cpe:/a:redhat:jboss_enterprise_web_server:6.1::el9" ]
null
8.6
null
null
RHSA-2023:6707
Red Hat Security Advisory: avahi security update
avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames avahi: avahi-daemon can be crashed via DBus
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.2
null
null
RHSA-2022:6536
Red Hat Security Advisory: OpenShift Container Platform 4.11.5 bug fix and security update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
8.6
null
null
RHSA-2018:0592
Red Hat Security Advisory: slf4j security update
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
RHSA-2024:1449
Red Hat Security Advisory: OpenShift Container Platform 4.15.5 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
7.5
null
null
RHSA-2017:0531
Red Hat Security Advisory: rabbitmq-server security and bug fix update
rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
6.5
null
RHSA-2013:1269
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:17.0.9) (MFSA 2013-76) Mozilla: Use-after-free in Animation Manager during stylesheet cloning (MFSA 2013-79) Mozilla: Calling scope for new Javascript objects can lead to memory corruption (MFSA 2013-82) Mozilla: Compartment mismatch re-attaching XBL-backed nodes (MFSA 2013-88) Mozilla: Buffer overflow with multi-column, lists, and floats (MFSA 2013-89) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: User-defined properties on DOM proxies get the wrong "this" object (MFSA 2013-91)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:0092
Red Hat Security Advisory: Red Hat CloudForms 4.0 security update
An update is now available for Red Hat CloudForms 4.0. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:cloudforms_managementengine:5::el7" ]
null
null
null
null
RHSA-2021:1297
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2022:8679
Red Hat Security Advisory: usbguard security update
usbguard: Fix unauthorized access via D-Bus
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.8
null
null
RHSA-2019:3908
Red Hat Security Advisory: kernel-rt security update
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
8.8
null
RHSA-2024:4051
Red Hat Security Advisory: pki-core security update
ca: token authentication bypass vulnerability
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2022:0628
Red Hat Security Advisory: 389-ds-base security and bug fix update
389-ds-base: double free of the virtual attribute context in persistent search
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2023:7431
Red Hat Security Advisory: kernel-rt security update
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove()
[ "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/a:redhat:rhel_tus:8.2::realtime" ]
null
7.8
null
null
RHSA-2023:6061
Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.12.1 release and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_pipelines:1.12::el8" ]
null
7.5
null
null
RHSA-2024:7941
Red Hat Security Advisory: OpenShift Container Platform 4.13.z security update
containers/image: digest type does not guarantee valid type webob: WebOb's location header normalization during redirect leads to open redirect openstack-ironic: Specially crafted image may allow authenticated users to gain access to potentially sensitive data
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", "cpe:/a:redhat:openshift_ironic:4.13::el9" ]
null
6.8
null
null
RHBA-2018:3207
Red Hat Bug Fix Advisory: NetworkManager bug fix and enhancement update
NetworkManager: Information exposure in DNS resolver
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.8
null
RHSA-2022:6522
Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update
dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion.
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
7.5
null
null
RHSA-2017:0184
Red Hat Security Advisory: mysql security update
mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7
null
RHSA-2024:4677
Red Hat Security Advisory: OpenShift Container Platform 4.12.61 bug fix and security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2020:5020
Red Hat Security Advisory: tomcat security update
tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
4.3
null
null
RHSA-2024:0041
Red Hat Security Advisory: OpenShift Container Platform 4.16.0 bug fix and security update
helm: shows secrets with --dry-run option in clear text opentelemetry: DoS vulnerability in otelhttp golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients coredns: CD bit response is cached and served later quic-go: memory exhaustion attack against QUIC's connection ID mechanism golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON cloudevents/sdk-go: usage of WithRoundTripper to create a Client leaks credentials jose: resource exhaustion jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak webpack-dev-middleware: lack of URL validation may lead to file leak
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
7.4
null
null
RHSA-2021:0395
Red Hat Security Advisory: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker sudo: Heap buffer overflow in argument parsing
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
7.8
null
null
RHSA-2023:0638
Red Hat Security Advisory: samba security update
samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
8.1
null
null
RHSA-2019:2283
Red Hat Security Advisory: sox security update
sox: NULL pointer dereference in startread function in xa.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2003:224
Red Hat Security Advisory: openssh security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2022:0866
Red Hat Security Advisory: OpenShift Container Platform 4.6.56 packages and security update
cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
8.8
null
null
RHSA-2021:2716
Red Hat Security Advisory: kpatch-patch security update
kernel: race condition for removal of the HCI controller kernel: size_t-to-int conversion vulnerability in the filesystem layer
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2015:0166
Red Hat Security Advisory: subversion security update
subversion: credentials leak via MD5 collision subversion: NULL pointer dereference flaw in mod_dav_svn when handling REPORT requests subversion: NULL pointer dereference flaw in mod_dav_svn when handling URIs for virtual transaction names
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2007:0939
Red Hat Security Advisory: kernel security update
kernel: denial of service with wedged processes VFAT compat ioctls DoS on 64-bit Bound check ordering issue in random driver LTC36188-Don't allow the stack to grow into hugetlb reserved regions CIFS should honor umask CIFS signing sec= mount options don't work correctly Privilege escalation via PR_SET_PDEATHSIG kernel: Missing ioctl() permission checks in aacraid driver ALSA memory disclosure flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:6560
Red Hat Security Advisory: Openshift Logging Bug Fix Release and Security Update (5.3.12)
golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
7.5
null
null
RHSA-2024:4235
Red Hat Security Advisory: 389-ds security update
389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2022:7070
Red Hat Security Advisory: firefox security update
Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2009:0354
Red Hat Security Advisory: evolution-data-server security update
evolution-data-server: S/MIME signatures are considered to be valid even for modified messages (MITM) evolution-data-server: insufficient checking of NTLM authentication challenge packets evolution-data-server: integer overflow in base64 encoding functions
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:2877
Red Hat Security Advisory: OpenShift Container Platform 4.13.42 packages and security update
buildah: full container escape at build time jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
4.3
null
null
RHSA-2024:0399
Red Hat Security Advisory: gnutls security update
gnutls: timing side-channel in the RSA-PSK authentication
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
5.9
null
null
RHSA-2025:2359
Red Hat Security Advisory: firefox security update
firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2024:10987
Red Hat Security Advisory: pcs security update
sinatra: Open Redirect Vulnerability in Sinatra via X-Forwarded-Host Header
[ "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
5.4
null
null
RHSA-2023:0400
Red Hat Security Advisory: kernel-rt security and bug fix update
hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 kernel: memory corruption in AX88179_178A based USB ethernet device.
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
7.8
null
null
RHSA-2005:044
Red Hat Security Advisory: XFree86 security update
libxpm buffer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:0740
Red Hat Security Advisory: OpenShift Container Platform 4.13.33 security and extras update
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
8.1
null
null
RHSA-2009:0338
Red Hat Security Advisory: php security update
php: buffer overflow in the imageloadfont function in gd extension php: FastCGI module DoS via multiple dots preceding the extension php: libgd imagerotate() array index error memory disclosure php: Heap-based buffer overflow in the mbstring extension via crafted string containing a HTML entity (arb code execution) php: XSS via PHP error messages PHP mbstring.func_overload web server denial of service
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0645
Red Hat Security Advisory: OpenShift Container Platform 4.14.11 packages and security update
runc: file descriptor leak
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9", "cpe:/a:redhat:openshift_ironic:4.14::el9" ]
null
8.6
null
null
RHSA-2020:4251
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Arbitrary Code Execution vulnerability (APSB20-58)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2006:0257
Red Hat Security Advisory: RealPlayer security update
security flaw
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2018:0027
Red Hat Security Advisory: qemu-kvm security update
An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
null
null
RHSA-2021:2405
Red Hat Security Advisory: dhcp security update
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
8.8
null
null
RHSA-2020:1449
Red Hat Security Advisory: OpenShift Container Platform 4.1.41 security update
buildah: Crafted input tar file may lead to local file overwrite during image build process
[ "cpe:/a:redhat:openshift:4.1::el8" ]
null
8.8
null
null
RHSA-2009:0361
Red Hat Security Advisory: NetworkManager security update
NetworkManager: GetSecrets disclosure NetworkManager: local users can modify the connection settings
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:7769
Red Hat Security Advisory: container-tools:rhel8 security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2015:0377
Red Hat Security Advisory: libreoffice security, bug fix, and enhancement update
libreoffice: VBA macros executed unconditionally openoffice: Arbitrary file disclosure via crafted OLE objects libreoffice: Use-After-Free in socket manager of Impress Remote
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2021:4135
Red Hat Security Advisory: java-17-openjdk security update
OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.7
null
null
RHSA-2024:1456
Red Hat Security Advisory: OpenShift Container Platform 4.13.38 packages and security update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
4.3
null
null
RHSA-2020:2641
Red Hat Security Advisory: grafana security update
grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.2
null
null
RHSA-2017:3476
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update
httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: mod_mime buffer overread httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) apr: Out-of-bounds array deref in apr_time_exp*() functions
[ "cpe:/a:redhat:jboss_core_services:1::el7" ]
null
null
7.4
null
RHSA-2024:5082
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.3 security update
openstack-nova: Regression VMDK/qcow arbitrary file access
[ "cpe:/a:redhat:openstack:17.1::el8" ]
null
5.5
null
null
RHSA-2024:0300
Red Hat Security Advisory: python-urllib3 security update
python-urllib3: Cookie request header isn't stripped during cross-origin redirects urllib3: Request body not stripped after redirect from 303 status changes request method to GET
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
4.2
null
null
RHSA-2025:1888
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.15.1 security update
go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies argocd: Argo CD does not scrub secret values from patch errors
[ "cpe:/a:redhat:openshift_gitops:1.15::el8", "cpe:/a:redhat:openshift_gitops:1.15::el9" ]
null
6.8
null
null
RHSA-2017:1230
Red Hat Security Advisory: ghostscript security update
ghostscript: corruption of operand stack
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
RHSA-2014:1168
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
Qemu: qcow1: validate L2 table size to avoid integer overflows Qemu: qcow1: validate image size to avoid out-of-bounds memory access Kernel: netdevice.h: NULL pointer dereference over VxLAN
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHEA-2020:0283
Red Hat Enhancement Advisory: Red Hat OpenStack Platform 16.0 GA
openstack-mistral: information disclosure in mistral log openstack-keystone: Credentials API allows non-admin to list and retrieve all users credentials
[ "cpe:/a:redhat:openstack:16::el8" ]
null
null
8.1
null
RHSA-2024:6153
Red Hat Security Advisory: 389-ds-base security update
389-ds-base: Malformed userPassword hash may cause Denial of Service
[ "cpe:/o:redhat:rhel_els:7" ]
null
5.7
null
null
RHSA-2019:1790
Red Hat Security Advisory: perl security update
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
8.1
null
RHSA-2023:3943
Red Hat Security Advisory: ACS 4.1 enhancement and security update
golang: crash in a golang.org/x/crypto/ssh server golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters
[ "cpe:/a:redhat:advanced_cluster_security:4.1::el8" ]
null
9.8
null
null
RHSA-2018:2147
Red Hat Security Advisory: rh-git29-git security update
git: path sanity check in is_ntfs_dotgit() can read arbitrary memory git: arbitrary code execution when recursively cloning a malicious repository
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.8
null
RHSA-2024:8166
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
9.8
null
null
RHSA-2024:7925
Red Hat Security Advisory: OpenShift Container Platform 4.17.1 packages and security update
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library
[ "cpe:/a:redhat:openshift:4.17::el8", "cpe:/a:redhat:openshift:4.17::el9" ]
null
5.4
null
null
RHSA-2024:3560
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.17 Security update
datatables.net: contents of array not escaped by HTML escape entities function EAP: wildfly-elytron has a SSRF security issue cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
7.4
null
null
RHSA-2023:2951
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds kernel: mm/slub: actually fix freelist pointer vs redzoning kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering kernel: possible race condition in drivers/tty/tty_buffers.c kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: netfilter: nf_conntrack_irc message handling issue kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: media: em28xx: initialize refcount before kref_get kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: memory leak in ipv6_renew_options() kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: data races around sk->sk_prot kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: use-after-free after failed devlink reload in devlink_param_get kernel: USB-accessible buffer overflow in brcmfmac kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: Executable Space Protection Bypass kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: Report vmalloc UAF in dvb-core/dmxdev kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in bss_ref_get in net/wireless/scan.c kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c kernel: Denial of service in beacon protection for P2P-device kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: scsi: mpt3sas: Fix use-after-free warning kernel: regmap: spi: Reserve space for register address/padding kernel: net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent kernel: net/mlx5: Fix command stats access after free kernel: ASoC: soc-pcm: Add NULL check in BE reparenting kernel: hwmon: (coretemp) Check for null before removing sysfs attrs kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource() kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() kernel: rtw89: cfo: check mac_id to avoid out-of-bounds kernel: udp: Fix a data-race around sysctl_udp_l3mdev_accept. kernel: iavf: Fix handling of dummy receive descriptors kernel: vlan: fix memory leak in vlan_newlink() kernel: drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector() kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: net/ulp: use-after-free in listening ULP sockets kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: Soft lockup occurred during __page_mapcount Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.2
null
null
RHSA-2019:0365
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 for RHEL 7 security update
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7" ]
null
null
5.3
null
RHSA-2023:6434
Red Hat Security Advisory: frr security and bug fix update
frr: Reachable assertion in peek_for_as4_capability function frr: denial of service by crafting a BGP OPEN message with an option of type 0xff frr: denial of service by crafting a BGP OPEN message with an option of type in bgp_open_option_parse in the bgp_open.c 0xff frr: out-of-bounds read exists in the BGP daemon of FRRouting
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2013:1081
Red Hat Security Advisory: java-1.5.0-ibm security update
OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT) OpenJDK: XML parsing Denial of Service (JAXP, 8017298)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:0023
Red Hat Security Advisory: firefox security update
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
6.1
null
null
RHSA-2014:1007
Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 update
XStream: remote code execution due to insecure XML deserialization Xalan-Java: insufficient constraints in secure processing feature
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3" ]
null
null
null
null
RHSA-2021:5160
Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update
golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.8
null
null
RHSA-2013:0696
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:17.0.5) (MFSA 2013-30) Mozilla: Cross-site scripting (XSS) using timed history navigations (MFSA 2013-38) Mozilla: Bypass of SOW protections allows cloning of protected nodes (MFSA 2013-36) Mozilla: WebGL crash with Mesa graphics driver on Linux (MFSA 2013-35) Mozilla: Out-of-bounds write in Cairo library (MFSA 2013-31)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:4582
Red Hat Security Advisory: gzip security update
gzip: arbitrary-file-write vulnerability
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.8
null
null
RHSA-2024:4824
Red Hat Security Advisory: nodejs:18 security update
nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
5.3
null
null
RHSA-2017:1243
Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update
openstack-heat: /var/log/heat/ is world readable
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
5.9
null
RHSA-2024:2815
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.4 security update
webpack-dev-middleware: lack of URL validation may lead to file leak
[ "cpe:/a:redhat:openshift_gitops:1.11::el8" ]
null
7.4
null
null
RHSA-2024:3528
Red Hat Security Advisory: kernel security update
kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
7.8
null
null
RHSA-2008:0195
Red Hat Security Advisory: tomcat security update
tomcat handling of cookies tomcat handling of cookie values Apache Tomcat's default security policy is too open Absolute path traversal Apache Tomcat WEBDAV
[ "cpe:/a:redhat:rhel_developer_suite:3" ]
null
null
null
null
RHSA-2014:0230
Red Hat Security Advisory: mongodb security update
mongodb: memory over-read via incorrect BSON object length
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2020:1289
Red Hat Security Advisory: haproxy security update
haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
null
null
RHSA-2024:0845
Red Hat Security Advisory: OpenShift Container Platform 4.13.34 security update
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
8.1
null
null
RHSA-2015:1000
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: fdc: out-of-bounds fifo buffer memory access
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2020:2473
Red Hat Security Advisory: pcs security and bug fix update
rubygem-json: Unsafe object creation vulnerability in JSON
[ "cpe:/a:redhat:rhel_e4s:8.0::highavailability" ]
null
7.3
null
null
RHSA-2024:6576
Red Hat Security Advisory: redhat-ds:11 security and bug fix update
389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request 389-ds-base: Malformed userPassword hash may cause Denial of Service
[ "cpe:/a:redhat:directory_server:11.7::el8" ]
null
5.7
null
null