id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:3578
Red Hat Security Advisory: firefox security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
9.8
null
null
RHSA-2009:1081
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: nfsd should drop CAP_MKNOD for non-root kernel: agp: zero pages before sending to userspace kernel: 'kill sig -1' must only apply to caller's pid namespace kernel: cifs: memory overwrite when saving nativeFileSystem field during mount kernel: random: add robust get_random_u32, remove weak get_random_int
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2003:001
Red Hat Security Advisory: : Updated PostgreSQL packages fix security issues and bugs
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2022:1166
Red Hat Security Advisory: OpenShift Container Platform 4.7.47 bug fix and security update
ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.2
null
null
RHSA-2025:0313
Red Hat Security Advisory: raptor2 security update
raptor: integer underflow when normalizing a URI with the turtle parser
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.3
null
null
RHSA-2023:1903
Red Hat Security Advisory: OpenJDK 8u372 Security Update for Portable Linux Builds
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
3.7
null
null
RHSA-2018:1112
Red Hat Security Advisory: sensu security update
sensu: Password exposure in warn level log when configured for multiple rabbitMQ connections
[ "cpe:/a:redhat:openstack-optools:11::el7" ]
null
null
5.5
null
RHSA-2023:2123
Red Hat Security Advisory: libreswan security update
libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2008:0665
Red Hat Security Advisory: Updated kernel packages for Red Hat Enterprise Linux 4.7
UDF truncating issue kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:2206
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2020:5423
Red Hat Security Advisory: pacemaker security update
pacemaker: ACL restrictions bypass
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/a:redhat:rhel_eus:8.2::highavailability", "cpe:/a:redhat:rhel_eus:8.2::resilientstorage" ]
null
7.2
null
null
RHSA-2024:3331
Red Hat Security Advisory: OpenShift Container Platform 4.14.27 bug fix and security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
7.5
null
RHSA-2012:1225
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: AWT hardening fixes (AWT, 7163201) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: beans MethodElementHandler insufficient permission checks (beans, 7194567) OpenJDK: beans insufficient permission checks, Java 7 0day (beans, 7162473)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:2203
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
5.9
null
null
RHSA-2021:4919
Red Hat Security Advisory: nss security update
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
9.8
null
null
RHSA-2020:4185
Red Hat Security Advisory: spice and spice-gtk security update
spice: multiple buffer overflow vulnerabilities in QUIC decoding code
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.1::crb" ]
null
6.6
null
null
RHSA-2007:0605
Red Hat Security Advisory: HelixPlayer security update
RealPlayer/HelixPlayer buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2009:1039
Red Hat Security Advisory: ntp security update
ntp: buffer overflow in ntpq ntp: remote arbitrary code execution vulnerability if autokeys is enabled
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:3067
Red Hat Security Advisory: jss security update
JSS: OCSP policy "Leaf and Chain" implicitly trusts the root certificate
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.8
null
RHSA-2023:2723
Red Hat Security Advisory: Red Hat Data Grid 8.4.2 security update
okhttp: information disclosure via improperly used cryptographic function
[ "cpe:/a:redhat:jboss_data_grid:8" ]
null
7.5
null
null
RHSA-2021:4408
Red Hat Security Advisory: libsolv security and bug fix update
libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
3.3
null
null
RHSA-2015:0983
Red Hat Security Advisory: tomcat security update
Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2021:5227
Red Hat Security Advisory: kernel security and bug fix update
kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename()
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2023:6168
Red Hat Security Advisory: libguestfs-winsupport security update
NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
3.3
null
null
RHSA-2022:4872
Red Hat Security Advisory: firefox security update
Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
6.1
null
RHSA-2025:0371
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update
hornetq-core-client: Arbitrarily overwrite files or access sensitive information
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8", "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9" ]
null
7.1
null
null
RHSA-2023:5750
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
5.3
null
null
RHSA-2021:0991
Red Hat Security Advisory: firefox security update
Mozilla: Angle graphics library out of date Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: Malicious extensions could have spoofed popup information Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
6.1
null
RHSA-2024:6428
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp automation-controller: Gain access to the k8s API server via job execution with Container Group grpc: client communicating with a HTTP/2 proxy can poison the HPACK table between the proxy and the backend python-social-auth: Improper Handling of Case Sensitivity in social-auth-app-django python-jose: algorithm confusion with OpenSSH ECDSA keys and other key formats python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() python-django: Memory exhaustion in django.utils.numberformat.floatformat() python-django: Potential denial-of-service vulnerability in django.utils.html.urlize() python-django: Potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget python-django: Potential SQL injection in QuerySet.values() and values_list()
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
7.3
null
null
RHSA-2008:1047
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Linux-specific code execution flaw via crafted SWF file
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2016:0591
Red Hat Security Advisory: nss, nss-util, and nspr security, bug fix, and enhancement update
nss: Use-after-free in NSS during SSL connections in low memory (MFSA 2016-15) nss: Use-after-free during processing of DER encoded keys in NSS (MFSA 2016-36)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2005:138
Red Hat Security Advisory: postgresql security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2019:0879
Red Hat Security Advisory: openstack-neutron security update
openstack-neutron: incorrect validation of port settings in iptables security group driver openstack-neutron: DOS via broken port range merging in security group
[ "cpe:/a:redhat:openstack:14::el7" ]
null
null
7.5
null
RHSA-2010:0987
Red Hat Security Advisory: java-1.6.0-ibm security and bug fix update
TLS: MITM attacks via session renegotiation krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) OpenJDK Swing unsafe reflection usage (6622002) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in 2D component OpenJDK Swing mutable static (6938813) JDK unspecified vulnerability in Java Web Start component JDK unspecified vulnerability in Networking component OpenJDK IndexColorModel double-free (6925710) OpenJDK: unspecified vulnerability in Deployment component OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2007:0076
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2017:2907
Red Hat Security Advisory: wpa_supplicant security update
wpa_supplicant: Reinstallation of the pairwise key in the 4-way handshake wpa_supplicant: Reinstallation of the group key in the 4-way handshake wpa_supplicant: Reinstallation of the group key in the group key handshake wpa_supplicant: Accepting a retransmitted FT Reassociation Request and reinstalling the pairwise key while processing it wpa_supplicant: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake wpa_supplicant: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame wpa_supplicant: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
RHSA-2023:0593
Red Hat Security Advisory: libksba security update
libksba: integer overflow to code execution
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
8.6
null
null
RHSA-2024:8124
Red Hat Security Advisory: java-17-openjdk security update
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
4.8
null
null
RHSA-2019:3878
Red Hat Security Advisory: kernel security update
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
8.8
null
RHEA-2021:3941
Red Hat Enhancement Advisory: OpenShift Sandboxed Containers 1.1.0 update
golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:openshift_sandboxed_containers:1.1.0::el8" ]
null
6.5
null
null
RHSA-2023:1769
Red Hat Security Advisory: openvswitch2.17 security update
openvswitch: ip proto 0 triggers incorrect handling
[ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ]
null
8.2
null
null
RHSA-2011:0197
Red Hat Security Advisory: postgresql security update
PostgreSQL: Stack-based buffer overflow by processing certain tokens from SQL query string when intarray module enabled
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:5840
Red Hat Security Advisory: rh-nodejs14 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2023:6193
Red Hat Security Advisory: thunderbird security update
An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:8842
Red Hat Security Advisory: python3.12-urllib3 security update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.4
null
null
RHSA-2020:4143
Red Hat Security Advisory: OCS 3.11.z async security, bug fix, and enhancement update
gluster-block: information disclosure through world-readable gluster-block log files heketi: gluster-block volume password details available in logs
[ "cpe:/a:redhat:storage:3.5:server:el7", "cpe:/a:redhat:storage:3:client:el7" ]
null
5.5
null
null
RHSA-2007:0044
Red Hat Security Advisory: bind security update
BIND dnssec denial of service
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:5469
Red Hat Security Advisory: firefox security update
Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
7.5
null
RHSA-2014:0364
Red Hat Security Advisory: ruby193-libyaml security update
libyaml: heap-based buffer overflow when parsing YAML tags libyaml: heap-based buffer overflow when parsing URLs
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2025:0115
Red Hat Security Advisory: OpenShift Container Platform 4.17.12 bug fix and security update
runc: file descriptor leak golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html GraphQL: Information Disclosure via GraphQL Introspection in OpenShift
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
5.3
null
null
RHSA-2024:6487
Red Hat Security Advisory: MTV 2.6.6 Images
Migration Toolkit for Virtualization: forklift-controller: Empty bearer token may perform authentication
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.6::el8", "cpe:/a:redhat:migration_toolkit_virtualization:2.6::el9" ]
null
7.5
null
null
RHSA-2015:0425
Red Hat Security Advisory: openssh security, bug fix and enhancement update
openssh: failure to check DNS SSHFP records in certain scenarios openssh: ~/.k5users unexpectedly grants remote login
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:4151
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.1
null
null
RHSA-2023:4875
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.1 security and bug fix updates
ACM: governance policy propagator privilege escalation openshift: OCP & FIPS mode vm2: Promise handler sanitization can be bypassed allowing attackers to escape the sandbox and run arbitrary code vm2: custom inspect function allows attackers to escape the sandbox and run arbitrary code
[ "cpe:/a:redhat:acm:2.8::el8" ]
null
9.8
null
null
RHSA-2019:4190
Red Hat Security Advisory: nss, nss-softokn, nss-util security update
nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
8.1
null
RHSA-2024:2010
Red Hat Security Advisory: Satellite 6.15.0 release
pygments: ReDoS in pygments satellite: arithmetic overflow in satellite Hub: insecure galaxy-importer tarfile extraction jetty: Improper addition of quotation marks to user inputs in CgiServlet python-aiohttp: HTTP request smuggling via llhttp HTTP request parser rubygem-activesupport: File Disclosure of Locally Encrypted Files jetty: Improper validation of HTTP/1 content-length python-django: Potential denial of service vulnerability in ``django.utils.encoding.uri_to_iri()`` python-django: Denial-of-service possibility in django.utils.text.Truncator python-aiohttp: numerous issues in HTTP parser with header parsing aiohttp: HTTP request modification aiohttp: CRLF injection if user controls the HTTP method using aiohttp client pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex rubygem-puma: HTTP request smuggling when parsing chunked Transfer-Encoding Bodies audited: race condition can lead to audit logs being incorrectly attributed to the wrong user jinja2: HTML attribute injection when passing user input as keys to xmlattr filter aiohttp: follow_symlinks directory traversal vulnerability python-aiohttp: http request smuggling
[ "cpe:/a:redhat:satellite:6.15::el8", "cpe:/a:redhat:satellite_capsule:6.15::el8", "cpe:/a:redhat:satellite_maintenance:6.15::el8", "cpe:/a:redhat:satellite_utils:6.15::el8" ]
null
6.5
null
null
RHSA-2013:0782
Red Hat Security Advisory: openssl security update
openssl: DoS due to improper handling of OCSP response verification SSL/TLS: CBC padding timing attack (lucky-13)
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
null
null
RHSA-2023:6832
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.0 security, enhancement & bug fix update
lapack: Out-of-bounds read in *larrv golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding hashicorp: html injection into web ui Hashicorp/vault: Vault’s LDAP Auth Method Allows for User Enumeration golang.org/x/net/html: Cross site scripting hashicorp/vault: Google Cloud Secrets Engine Removed Existing IAM Conditions When Creating / Updating Rolesets golang: net/http, net/textproto: denial of service from excessive memory allocation golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes goproxy: Denial of service (DoS) via unspecified vectors. golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_data_foundation:4.14::el9" ]
null
7.5
null
null
RHSA-2019:0796
Red Hat Security Advisory: CloudForms 4.7.3 security, bug fix and enhancement update
Tower: credentials leaked through environment variables rubygem-actionpack: render file directory traversal in Action View rubygem-actionpack: denial of service vulnerability in Action View
[ "cpe:/a:redhat:cloudforms_managementengine:5.10::el7" ]
null
null
5.9
null
RHSA-2021:5170
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update
undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
7.5
null
null
RHSA-2011:0357
Red Hat Security Advisory: java-1.6.0-ibm security update
JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Deployment component OpenJDK DNS cache poisoning by untrusted applets (6981922) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component OpenJDK Swing timer-based security manager bypass (6907662) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in JDBC component OpenJDK Java2D font-related system property leak (6985453) JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2025:3618
Red Hat Security Advisory: grafana security update
golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
RHSA-2022:1935
Red Hat Security Advisory: php:7.4 security update
php: Local privilege escalation via PHP-FPM php: SSRF bypass in FILTER_VALIDATE_URL
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2020:5010
Red Hat Security Advisory: python3 security update
python: infinite loop in the tarfile module via crafted TAR archive python: DoS via inefficiency in IPv{4,6}Interface classes
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.9
null
null
RHSA-2022:8845
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-paramiko) security update
python-paramiko: Race condition in the write_private_key_file function
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
5.1
null
null
RHSA-2021:0521
Red Hat Security Advisory: rh-nodejs10-nodejs security update
nodejs-yargs-parser: prototype pollution vulnerability nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS nodejs-y18n: prototype pollution vulnerability nodejs-ini: Prototype pollution via malicious INI file nodejs-dot-prop: prototype pollution libuv: buffer overflow in realpath nodejs: use-after-free in the TLS implementation nodejs: HTTP request smuggling via two copies of a header field in an http request npm: sensitive information exposure through logs nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.6
4.3
null
RHSA-2020:4379
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 3.9.4 security update
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.5
null
null
RHSA-2023:6746
Red Hat Security Advisory: nghttp2 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2017:1677
Red Hat Security Advisory: rh-postgresql95-postgresql security update
postgresql: Selectivity estimators bypass SELECT privilege checks postgresql: libpq ignores PGREQUIRESSL environment variable postgresql: pg_user_mappings view discloses foreign server passwords
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
6.3
null
RHSA-2024:2874
Red Hat Security Advisory: OpenShift Container Platform 4.13.42 security and extras update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
5.9
null
null
RHSA-2016:1182
Red Hat Security Advisory: Red Hat Ceph Storage 1.2 - Retirement Notice
This is the final notification for the retirement of Red Hat Ceph Storage 1.2.
[ "cpe:/a:redhat:ceph_storage:1.2::centos:6", "cpe:/a:redhat:ceph_storage:1.2::el7", "cpe:/a:redhat:ceph_storage:1.2::ubuntu:12.04" ]
null
null
null
null
RHSA-2013:1205
Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #6
2.0: appliance-base / redhat-storage-server /tmp file creation vuln
[ "cpe:/a:redhat:storage:2.0:server:el6" ]
null
null
null
null
RHSA-2008:0030
Red Hat Security Advisory: xorg-x11 security update
xfs integer overflow in the build_range function xfs heap overflow in the swap_char2b function xorg: invalid array indexing in XFree86-Misc extension Xorg / XFree86 file existence disclosure vulnerability xfree86: memory corruption via XInput extension xfree86: information disclosure via TOG-CUP extension xfree86: integer overflow in EVI extension Xorg / XFree86 PCF font parser buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2012:1541
Red Hat Security Advisory: kernel security and bug fix update
kernel: nfs4_getfacl decoding kernel oops kernel: unfiltered netdev rio_ioctl access by users
[ "cpe:/o:redhat:rhel_eus:6.2::server" ]
null
null
null
null
RHSA-2013:1122
Red Hat Security Advisory: rhev-guest-tools-iso security and bug fix update
rhev-m: rhev-apt service unquoted search path
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2019:1623
Red Hat Security Advisory: thunderbird security update
libical: Heap buffer over read in icalparser.c parser_get_next_char libical: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c libical: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c libical: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c Mozilla: Type confusion in Array.pop Mozilla: Sandbox escape using Prompt:Open
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
10
null
RHSA-2018:0522
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update
Core: Hash Collision Denial of Service
[ "cpe:/a:redhat:rhel_dotnet:1.0::el7", "cpe:/a:redhat:rhel_dotnet:1.1::el7", "cpe:/a:redhat:rhel_dotnet:2.0::el7" ]
null
null
3.7
null
RHSA-2018:2308
Red Hat Security Advisory: openslp security update
openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2016:2824
Red Hat Security Advisory: expat security update
expat: Out-of-bounds heap read on crafted input causing crash
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2004:134
Red Hat Security Advisory: : Updated squid package fixes security vulnerability
security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2014:1822
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.2 update
OpenJDK: XML parsing Denial of Service (JAXP, 8017298)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
null
null
RHSA-2011:0197
Red Hat Security Advisory: postgresql security update
PostgreSQL: Stack-based buffer overflow by processing certain tokens from SQL query string when intarray module enabled
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHBA-2015:2092
Red Hat Bug Fix Advisory: systemd bug fix and enhancement update
systemd: freeze when PID 1 receives a zero-length message over notify socket
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.8
null
RHSA-2020:1138
Red Hat Security Advisory: gettext security and bug fix update
gettext: double free in default_add_message in read-catalog.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4
null
RHSA-2018:2921
Red Hat Security Advisory: tomcat security update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2017:1230
Red Hat Security Advisory: ghostscript security update
ghostscript: corruption of operand stack
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
RHSA-2014:0016
Red Hat Security Advisory: gnupg security update
gnupg: RSA secret key recovery via acoustic cryptanalysis
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2009:1426
Red Hat Security Advisory: openoffice.org security update
OpenOffice.org Word document Integer Underflow OpenOffice.org Word document buffer overflow
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2023:2193
Red Hat Security Advisory: butane security, bug fix, and enhancement update
golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2017:1860
Red Hat Security Advisory: libtasn1 security, bug fix, and enhancement update
libtasn1: stack overflow in asn1_der_decoding libtasn1: heap overflow flaw in _asn1_extract_der_octet()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.9
null
RHSA-2002:307
Red Hat Security Advisory: xpdf security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2013:0622
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: block: default SCSI command filter does not accomodate commands overlap across device classes kernel: x86/msr: /dev/cpu/*/msr local privilege escalation kernel: net: infinite loop in __skb_recv_datagram() kernel: race condition with PTRACE_SETREGS kernel: sock_diag: out-of-bounds access to sock_diag_handlers[]
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2021:4703
Red Hat Security Advisory: RHV Engine and Host Common Packages security update [ovirt-4.4.9]
Ansible: ansible-connection module discloses sensitive info in traceback error message
[ "cpe:/a:redhat:rhev_manager:4.4:el8", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
5.5
null
null
RHBA-2015:0928
Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform Bug Fix and Enhancement Advisory
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2021:4364
Red Hat Security Advisory: binutils security update
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() binutils: Race window allows users to own arbitrary files binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.7
null
null
RHSA-2010:0122
Red Hat Security Advisory: sudo security update
sudo: sudoedit option can possibly allow for arbitrary code execution sudo: Fails to reset group permissions if runas_default set
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2077
Red Hat Security Advisory: ntp security, bug fix, and enhancement update
ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7
null
RHSA-2014:0245
Red Hat Security Advisory: activemq security update
HawtJNI: predictable temporary file name leading to local arbitrary code execution Framework: XML External Entity (XXE) injection flaw Camel: remote code execution via header field manipulation Camel: remote code execution via XSL
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2018:1452
Red Hat Security Advisory: ovirt-ansible-roles security update
ovirt-ansible-roles: passwords revealed in ansible log when provisioning new provider
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
5
null
RHSA-2011:0004
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: sctp: do not reset the packet during sctp_packet_config kernel: prevent heap corruption in snd_ctl_new() kernel: guest->host denial of service from invalid xenbus transitions kernel: setup_arg_pages: diagnose excessive argument size kernel: tipc: heap overflow in tipc_msg_build() kernel: iovec integer overflow in net/rds/rdma.c kernel: net/packet/af_packet.c: reading uninitialized stack memory kernel: logic error in INET_DIAG bytecode auditing kernel: ipc/sem.c: reading uninitialized stack memory kernel: gdth: integer overflow in ioc_general() kernel: rhel5 commit 6865201191 caused deadlock kernel: missing tty ops write function presence check in hci_uart_tty_open() xen: request-processing loop is unbounded in blkback kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null