id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:3578 | Red Hat Security Advisory: firefox security update | Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 9.8 | null | null |
RHSA-2009:1081 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: nfsd should drop CAP_MKNOD for non-root kernel: agp: zero pages before sending to userspace kernel: 'kill sig -1' must only apply to caller's pid namespace kernel: cifs: memory overwrite when saving nativeFileSystem field during mount kernel: random: add robust get_random_u32, remove weak get_random_int | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2003:001 | Red Hat Security Advisory: : Updated PostgreSQL packages fix security issues and bugs | security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2022:1166 | Red Hat Security Advisory: OpenShift Container Platform 4.7.47 bug fix and security update | ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.2 | null | null |
RHSA-2025:0313 | Red Hat Security Advisory: raptor2 security update | raptor: integer underflow when normalizing a URI with the turtle parser | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.3 | null | null |
RHSA-2023:1903 | Red Hat Security Advisory: OpenJDK 8u372 Security Update for Portable Linux Builds | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:openjdk:1.8"
] | null | 3.7 | null | null |
RHSA-2018:1112 | Red Hat Security Advisory: sensu security update | sensu: Password exposure in warn level log when configured for multiple rabbitMQ connections | [
"cpe:/a:redhat:openstack-optools:11::el7"
] | null | null | 5.5 | null |
RHSA-2023:2123 | Red Hat Security Advisory: libreswan security update | libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2008:0665 | Red Hat Security Advisory: Updated kernel packages for Red Hat Enterprise Linux 4.7 | UDF truncating issue kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:2206 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2020:5423 | Red Hat Security Advisory: pacemaker security update | pacemaker: ACL restrictions bypass | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.2::highavailability",
"cpe:/a:redhat:rhel_eus:8.2::resilientstorage"
] | null | 7.2 | null | null |
RHSA-2024:3331 | Red Hat Security Advisory: OpenShift Container Platform 4.14.27 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | 7.5 | null |
RHSA-2012:1225 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: AWT hardening fixes (AWT, 7163201) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: beans MethodElementHandler insufficient permission checks (beans, 7194567) OpenJDK: beans insufficient permission checks, Java 7 0day (beans, 7162473) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:2203 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.9 | null | null |
RHSA-2021:4919 | Red Hat Security Advisory: nss security update | nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS) | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 9.8 | null | null |
RHSA-2020:4185 | Red Hat Security Advisory: spice and spice-gtk security update | spice: multiple buffer overflow vulnerabilities in QUIC decoding code | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 6.6 | null | null |
RHSA-2007:0605 | Red Hat Security Advisory: HelixPlayer security update | RealPlayer/HelixPlayer buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:1039 | Red Hat Security Advisory: ntp security update | ntp: buffer overflow in ntpq ntp: remote arbitrary code execution vulnerability if autokeys is enabled | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:3067 | Red Hat Security Advisory: jss security update | JSS: OCSP policy "Leaf and Chain" implicitly trusts the root certificate | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null |
RHSA-2023:2723 | Red Hat Security Advisory: Red Hat Data Grid 8.4.2 security update | okhttp: information disclosure via improperly used cryptographic function | [
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 7.5 | null | null |
RHSA-2021:4408 | Red Hat Security Advisory: libsolv security and bug fix update | libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.3 | null | null |
RHSA-2015:0983 | Red Hat Security Advisory: tomcat security update | Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:5227 | Red Hat Security Advisory: kernel security and bug fix update | kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename() | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2023:6168 | Red Hat Security Advisory: libguestfs-winsupport security update | NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 3.3 | null | null |
RHSA-2022:4872 | Red Hat Security Advisory: firefox security update | Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2025:0371 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update | hornetq-core-client: Arbitrarily overwrite files or access sensitive information | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
] | null | 7.1 | null | null |
RHSA-2023:5750 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 5.3 | null | null |
RHSA-2021:0991 | Red Hat Security Advisory: firefox security update | Mozilla: Angle graphics library out of date Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: Malicious extensions could have spoofed popup information Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:6428 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp automation-controller: Gain access to the k8s API server via job execution with Container Group grpc: client communicating with a HTTP/2 proxy can poison the HPACK table between the proxy and the backend python-social-auth: Improper Handling of Case Sensitivity in social-auth-app-django python-jose: algorithm confusion with OpenSSH ECDSA keys and other key formats python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() python-django: Memory exhaustion in django.utils.numberformat.floatformat() python-django: Potential denial-of-service vulnerability in django.utils.html.urlize() python-django: Potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget python-django: Potential SQL injection in QuerySet.values() and values_list() | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 7.3 | null | null |
RHSA-2008:1047 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Linux-specific code execution flaw via crafted SWF file | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2016:0591 | Red Hat Security Advisory: nss, nss-util, and nspr security, bug fix, and enhancement update | nss: Use-after-free in NSS during SSL connections in low memory (MFSA 2016-15) nss: Use-after-free during processing of DER encoded keys in NSS (MFSA 2016-36) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2005:138 | Red Hat Security Advisory: postgresql security update | security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:0879 | Red Hat Security Advisory: openstack-neutron security update | openstack-neutron: incorrect validation of port settings in iptables security group driver openstack-neutron: DOS via broken port range merging in security group | [
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 7.5 | null |
RHSA-2010:0987 | Red Hat Security Advisory: java-1.6.0-ibm security and bug fix update | TLS: MITM attacks via session renegotiation krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) OpenJDK Swing unsafe reflection usage (6622002) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in 2D component OpenJDK Swing mutable static (6938813) JDK unspecified vulnerability in Java Web Start component JDK unspecified vulnerability in Networking component OpenJDK IndexColorModel double-free (6925710) OpenJDK: unspecified vulnerability in Deployment component OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2007:0076 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:2907 | Red Hat Security Advisory: wpa_supplicant security update | wpa_supplicant: Reinstallation of the pairwise key in the 4-way handshake wpa_supplicant: Reinstallation of the group key in the 4-way handshake wpa_supplicant: Reinstallation of the group key in the group key handshake wpa_supplicant: Accepting a retransmitted FT Reassociation Request and reinstalling the pairwise key while processing it wpa_supplicant: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake wpa_supplicant: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame wpa_supplicant: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2023:0593 | Red Hat Security Advisory: libksba security update | libksba: integer overflow to code execution | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.6 | null | null |
RHSA-2024:8124 | Red Hat Security Advisory: java-17-openjdk security update | giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 4.8 | null | null |
RHSA-2019:3878 | Red Hat Security Advisory: kernel security update | hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.8 | null |
RHEA-2021:3941 | Red Hat Enhancement Advisory: OpenShift Sandboxed Containers 1.1.0 update | golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openshift_sandboxed_containers:1.1.0::el8"
] | null | 6.5 | null | null |
RHSA-2023:1769 | Red Hat Security Advisory: openvswitch2.17 security update | openvswitch: ip proto 0 triggers incorrect handling | [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 8.2 | null | null |
RHSA-2011:0197 | Red Hat Security Advisory: postgresql security update | PostgreSQL: Stack-based buffer overflow by processing certain tokens from SQL query string when intarray module enabled | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5840 | Red Hat Security Advisory: rh-nodejs14 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2023:6193 | Red Hat Security Advisory: thunderbird security update | An update for thunderbird is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:8842 | Red Hat Security Advisory: python3.12-urllib3 security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.4 | null | null |
RHSA-2020:4143 | Red Hat Security Advisory: OCS 3.11.z async security, bug fix, and enhancement update | gluster-block: information disclosure through world-readable gluster-block log files heketi: gluster-block volume password details available in logs | [
"cpe:/a:redhat:storage:3.5:server:el7",
"cpe:/a:redhat:storage:3:client:el7"
] | null | 5.5 | null | null |
RHSA-2007:0044 | Red Hat Security Advisory: bind security update | BIND dnssec denial of service | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:5469 | Red Hat Security Advisory: firefox security update | Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2014:0364 | Red Hat Security Advisory: ruby193-libyaml security update | libyaml: heap-based buffer overflow when parsing YAML tags libyaml: heap-based buffer overflow when parsing URLs | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2025:0115 | Red Hat Security Advisory: OpenShift Container Platform 4.17.12 bug fix and security update | runc: file descriptor leak golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html GraphQL: Information Disclosure via GraphQL Introspection in OpenShift | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.3 | null | null |
RHSA-2024:6487 | Red Hat Security Advisory: MTV 2.6.6 Images | Migration Toolkit for Virtualization: forklift-controller: Empty bearer token may perform authentication | [
"cpe:/a:redhat:migration_toolkit_virtualization:2.6::el8",
"cpe:/a:redhat:migration_toolkit_virtualization:2.6::el9"
] | null | 7.5 | null | null |
RHSA-2015:0425 | Red Hat Security Advisory: openssh security, bug fix and enhancement update | openssh: failure to check DNS SSHFP records in certain scenarios openssh: ~/.k5users unexpectedly grants remote login | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:4151 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.1 | null | null |
RHSA-2023:4875 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.1 security and bug fix updates | ACM: governance policy propagator privilege escalation openshift: OCP & FIPS mode vm2: Promise handler sanitization can be bypassed allowing attackers to escape the sandbox and run arbitrary code vm2: custom inspect function allows attackers to escape the sandbox and run arbitrary code | [
"cpe:/a:redhat:acm:2.8::el8"
] | null | 9.8 | null | null |
RHSA-2019:4190 | Red Hat Security Advisory: nss, nss-softokn, nss-util security update | nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | 8.1 | null |
RHSA-2024:2010 | Red Hat Security Advisory: Satellite 6.15.0 release | pygments: ReDoS in pygments satellite: arithmetic overflow in satellite Hub: insecure galaxy-importer tarfile extraction jetty: Improper addition of quotation marks to user inputs in CgiServlet python-aiohttp: HTTP request smuggling via llhttp HTTP request parser rubygem-activesupport: File Disclosure of Locally Encrypted Files jetty: Improper validation of HTTP/1 content-length python-django: Potential denial of service vulnerability in ``django.utils.encoding.uri_to_iri()`` python-django: Denial-of-service possibility in django.utils.text.Truncator python-aiohttp: numerous issues in HTTP parser with header parsing aiohttp: HTTP request modification aiohttp: CRLF injection if user controls the HTTP method using aiohttp client pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex rubygem-puma: HTTP request smuggling when parsing chunked Transfer-Encoding Bodies audited: race condition can lead to audit logs being incorrectly attributed to the wrong user jinja2: HTML attribute injection when passing user input as keys to xmlattr filter aiohttp: follow_symlinks directory traversal vulnerability python-aiohttp: http request smuggling | [
"cpe:/a:redhat:satellite:6.15::el8",
"cpe:/a:redhat:satellite_capsule:6.15::el8",
"cpe:/a:redhat:satellite_maintenance:6.15::el8",
"cpe:/a:redhat:satellite_utils:6.15::el8"
] | null | 6.5 | null | null |
RHSA-2013:0782 | Red Hat Security Advisory: openssl security update | openssl: DoS due to improper handling of OCSP response verification SSL/TLS: CBC padding timing attack (lucky-13) | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null |
RHSA-2023:6832 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.0 security, enhancement & bug fix update | lapack: Out-of-bounds read in *larrv golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding hashicorp: html injection into web ui Hashicorp/vault: Vault’s LDAP Auth Method Allows for User Enumeration golang.org/x/net/html: Cross site scripting hashicorp/vault: Google Cloud Secrets Engine Removed Existing IAM Conditions When Creating / Updating Rolesets golang: net/http, net/textproto: denial of service from excessive memory allocation golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes goproxy: Denial of service (DoS) via unspecified vectors. golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_data_foundation:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2019:0796 | Red Hat Security Advisory: CloudForms 4.7.3 security, bug fix and enhancement update | Tower: credentials leaked through environment variables rubygem-actionpack: render file directory traversal in Action View rubygem-actionpack: denial of service vulnerability in Action View | [
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | null | 5.9 | null |
RHSA-2021:5170 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update | undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 7.5 | null | null |
RHSA-2011:0357 | Red Hat Security Advisory: java-1.6.0-ibm security update | JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Deployment component OpenJDK DNS cache poisoning by untrusted applets (6981922) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component OpenJDK Swing timer-based security manager bypass (6907662) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in JDBC component OpenJDK Java2D font-related system property leak (6985453) JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2025:3618 | Red Hat Security Advisory: grafana security update | golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2022:1935 | Red Hat Security Advisory: php:7.4 security update | php: Local privilege escalation via PHP-FPM php: SSRF bypass in FILTER_VALIDATE_URL | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2020:5010 | Red Hat Security Advisory: python3 security update | python: infinite loop in the tarfile module via crafted TAR archive python: DoS via inefficiency in IPv{4,6}Interface classes | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.9 | null | null |
RHSA-2022:8845 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-paramiko) security update | python-paramiko: Race condition in the write_private_key_file function | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.1 | null | null |
RHSA-2021:0521 | Red Hat Security Advisory: rh-nodejs10-nodejs security update | nodejs-yargs-parser: prototype pollution vulnerability nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS nodejs-y18n: prototype pollution vulnerability nodejs-ini: Prototype pollution via malicious INI file nodejs-dot-prop: prototype pollution libuv: buffer overflow in realpath nodejs: use-after-free in the TLS implementation nodejs: HTTP request smuggling via two copies of a header field in an http request npm: sensitive information exposure through logs nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.6 | 4.3 | null |
RHSA-2020:4379 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 3.9.4 security update | jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2023:6746 | Red Hat Security Advisory: nghttp2 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2017:1677 | Red Hat Security Advisory: rh-postgresql95-postgresql security update | postgresql: Selectivity estimators bypass SELECT privilege checks postgresql: libpq ignores PGREQUIRESSL environment variable postgresql: pg_user_mappings view discloses foreign server passwords | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 6.3 | null |
RHSA-2024:2874 | Red Hat Security Advisory: OpenShift Container Platform 4.13.42 security and extras update | golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 5.9 | null | null |
RHSA-2016:1182 | Red Hat Security Advisory: Red Hat Ceph Storage 1.2 - Retirement Notice | This is the final notification for the retirement of Red Hat Ceph Storage 1.2. | [
"cpe:/a:redhat:ceph_storage:1.2::centos:6",
"cpe:/a:redhat:ceph_storage:1.2::el7",
"cpe:/a:redhat:ceph_storage:1.2::ubuntu:12.04"
] | null | null | null | null |
RHSA-2013:1205 | Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #6 | 2.0: appliance-base / redhat-storage-server /tmp file creation vuln | [
"cpe:/a:redhat:storage:2.0:server:el6"
] | null | null | null | null |
RHSA-2008:0030 | Red Hat Security Advisory: xorg-x11 security update | xfs integer overflow in the build_range function xfs heap overflow in the swap_char2b function xorg: invalid array indexing in XFree86-Misc extension Xorg / XFree86 file existence disclosure vulnerability xfree86: memory corruption via XInput extension xfree86: information disclosure via TOG-CUP extension xfree86: integer overflow in EVI extension Xorg / XFree86 PCF font parser buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2012:1541 | Red Hat Security Advisory: kernel security and bug fix update | kernel: nfs4_getfacl decoding kernel oops kernel: unfiltered netdev rio_ioctl access by users | [
"cpe:/o:redhat:rhel_eus:6.2::server"
] | null | null | null | null |
RHSA-2013:1122 | Red Hat Security Advisory: rhev-guest-tools-iso security and bug fix update | rhev-m: rhev-apt service unquoted search path | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2019:1623 | Red Hat Security Advisory: thunderbird security update | libical: Heap buffer over read in icalparser.c parser_get_next_char libical: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c libical: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c libical: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c Mozilla: Type confusion in Array.pop Mozilla: Sandbox escape using Prompt:Open | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 10 | null |
RHSA-2018:0522 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update | Core: Hash Collision Denial of Service | [
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.0::el7"
] | null | null | 3.7 | null |
RHSA-2018:2308 | Red Hat Security Advisory: openslp security update | openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2016:2824 | Red Hat Security Advisory: expat security update | expat: Out-of-bounds heap read on crafted input causing crash | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2004:134 | Red Hat Security Advisory: : Updated squid package fixes security vulnerability | security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2014:1822 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.2 update | OpenJDK: XML parsing Denial of Service (JAXP, 8017298) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2011:0197 | Red Hat Security Advisory: postgresql security update | PostgreSQL: Stack-based buffer overflow by processing certain tokens from SQL query string when intarray module enabled | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2015:2092 | Red Hat Bug Fix Advisory: systemd bug fix and enhancement update | systemd: freeze when PID 1 receives a zero-length message over notify socket | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null |
RHSA-2020:1138 | Red Hat Security Advisory: gettext security and bug fix update | gettext: double free in default_add_message in read-catalog.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4 | null |
RHSA-2018:2921 | Red Hat Security Advisory: tomcat security update | tomcat: A bug in the UTF-8 decoder can lead to DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2017:1230 | Red Hat Security Advisory: ghostscript security update | ghostscript: corruption of operand stack | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2014:0016 | Red Hat Security Advisory: gnupg security update | gnupg: RSA secret key recovery via acoustic cryptanalysis | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2009:1426 | Red Hat Security Advisory: openoffice.org security update | OpenOffice.org Word document Integer Underflow OpenOffice.org Word document buffer overflow | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2023:2193 | Red Hat Security Advisory: butane security, bug fix, and enhancement update | golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2017:1860 | Red Hat Security Advisory: libtasn1 security, bug fix, and enhancement update | libtasn1: stack overflow in asn1_der_decoding libtasn1: heap overflow flaw in _asn1_extract_der_octet() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2002:307 | Red Hat Security Advisory: xpdf security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2013:0622 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: block: default SCSI command filter does not accomodate commands overlap across device classes kernel: x86/msr: /dev/cpu/*/msr local privilege escalation kernel: net: infinite loop in __skb_recv_datagram() kernel: race condition with PTRACE_SETREGS kernel: sock_diag: out-of-bounds access to sock_diag_handlers[] | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2021:4703 | Red Hat Security Advisory: RHV Engine and Host Common Packages security update [ovirt-4.4.9] | Ansible: ansible-connection module discloses sensitive info in traceback error message | [
"cpe:/a:redhat:rhev_manager:4.4:el8",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.5 | null | null |
RHBA-2015:0928 | Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform Bug Fix and Enhancement Advisory | mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015) | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2021:4364 | Red Hat Security Advisory: binutils security update | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() binutils: Race window allows users to own arbitrary files binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.7 | null | null |
RHSA-2010:0122 | Red Hat Security Advisory: sudo security update | sudo: sudoedit option can possibly allow for arbitrary code execution sudo: Fails to reset group permissions if runas_default set | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:2077 | Red Hat Security Advisory: ntp security, bug fix, and enhancement update | ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2014:0245 | Red Hat Security Advisory: activemq security update | HawtJNI: predictable temporary file name leading to local arbitrary code execution Framework: XML External Entity (XXE) injection flaw Camel: remote code execution via header field manipulation Camel: remote code execution via XSL | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2018:1452 | Red Hat Security Advisory: ovirt-ansible-roles security update | ovirt-ansible-roles: passwords revealed in ansible log when provisioning new provider | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 5 | null |
RHSA-2011:0004 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: sctp: do not reset the packet during sctp_packet_config kernel: prevent heap corruption in snd_ctl_new() kernel: guest->host denial of service from invalid xenbus transitions kernel: setup_arg_pages: diagnose excessive argument size kernel: tipc: heap overflow in tipc_msg_build() kernel: iovec integer overflow in net/rds/rdma.c kernel: net/packet/af_packet.c: reading uninitialized stack memory kernel: logic error in INET_DIAG bytecode auditing kernel: ipc/sem.c: reading uninitialized stack memory kernel: gdth: integer overflow in ioc_general() kernel: rhel5 commit 6865201191 caused deadlock kernel: missing tty ops write function presence check in hci_uart_tty_open() xen: request-processing loop is unbounded in blkback kernel: posix-cpu-timers: workaround to suppress the problems with mt exec | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.