id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2018:3396
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
5.6
null
RHSA-2018:1239
Red Hat Security Advisory: OpenShift Container Platform 3.3 security update
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
[ "cpe:/a:redhat:openshift:3.3::el7" ]
null
null
9.9
null
RHSA-2019:2780
Red Hat Security Advisory: qpid-proton security update
qpid-proton: TLS Man in the Middle Vulnerability
[ "cpe:/a:redhat:rhel_satellite_tools:6.5::el5", "cpe:/a:redhat:rhel_satellite_tools:6.5::el6", "cpe:/a:redhat:rhel_satellite_tools:6.5::el7", "cpe:/a:redhat:rhel_satellite_tools:6.5::el8", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.4
null
RHSA-2013:1537
Red Hat Security Advisory: augeas security, bug fix, and enhancement update
augeas: susceptible to symlink attack augeas: susceptible to mountpoint attack
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor", "cpe:/a:redhat:storage:3:server:el6", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:2334
Red Hat Security Advisory: freerdp security update
freerdp: Out-of-bounds write in planar.c freerdp: Integer overflow in region.c freerdp: Out-of-bounds write in interleaved.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.6
null
null
RHSA-2024:8125
Red Hat Security Advisory: OpenJDK 17.0.13 Security Update for Portable Linux Builds
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:openjdk:17" ]
null
4.8
null
null
RHSA-2024:7187
Red Hat Security Advisory: OpenShift Container Platform 4.14.38 security update
containers/image: digest type does not guarantee valid type webob: WebOb's location header normalization during redirect leads to open redirect
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9", "cpe:/a:redhat:openshift_ironic:4.14::el9" ]
null
6.1
null
null
RHSA-2022:8793
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.8 security update
Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
4.2
null
null
RHSA-2023:1405
Red Hat Security Advisory: openssl security update
openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.4
null
null
RHSA-2023:3387
Red Hat Security Advisory: Satellite 6.13.1 Async Security Update
Foreman: Stored cross-site scripting in host tab
[ "cpe:/a:redhat:satellite:6.13::el8", "cpe:/a:redhat:satellite_capsule:6.13::el8", "cpe:/a:redhat:satellite_maintenance:6.13::el8", "cpe:/a:redhat:satellite_utils:6.13::el8" ]
null
5.4
null
null
RHSA-2014:1826
Red Hat Security Advisory: libvncserver security update
libvncserver: integer overflow flaw, leading to a heap-based buffer overflow in screen size handling libvncserver: NULL pointer dereference flaw in framebuffer setup libvncserver: server NULL pointer dereference flaw in ClientCutText message handling libvncserver: server divide-by-zero flaw in scaling factor handling libvncserver: server stacked-based buffer overflow flaws in file transfer handling
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:1899
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
3.7
null
null
RHSA-2021:1002
Red Hat Security Advisory: flatpak security update
flatpak: "file forwarding" feature can be used to gain unprivileged access to files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2024:9498
Red Hat Security Advisory: kernel-rt security update
kernel: net: fix possible store tearing in neigh_periodic_work() kernel: tcp: add sanity checks to rx zerocopy kernel: drm/amdgpu: use-after-free vulnerability kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline kernel: mptcp: ensure snd_una is properly initialized on connect kernel: firmware: cs_dsp: Fix overflow checking of wmfw header kernel: net/iucv: fix use after free in iucv_sock_close() kernel: mptcp: pm: Fix uaf in __timer_delete_sync
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
7
null
null
RHSA-2018:2276
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1 security update
apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
7.6
null
RHSA-2021:0818
Red Hat Security Advisory: wpa_supplicant security update
wpa_supplicant: Use-after-free in P2P provision discovery processing
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.5
null
null
RHSA-2014:0171
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 update
Java: Java XML Signature DoS Attack Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2020:0171
Red Hat Security Advisory: openvswitch2.11 security and bug fix update
dpdk: possible memory leak leads to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
null
7.5
null
RHSA-2024:2737
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-openstackclient) security update
openstack: deleting a non existing access rule deletes another existing access rule in it's scope
[ "cpe:/a:redhat:openstack:17.1::el9" ]
null
5.5
null
null
RHSA-2021:0664
Red Hat Security Advisory: Ansible security and bug fix update (2.9.18)
ansible: user data leak in snmp_facts module module: bitbucket_pipeline_variable exposes secured values ansible: multiple modules expose secured values ansible: basic.py no_log with fallback option
[ "cpe:/a:redhat:ansible_engine:2.9::el7", "cpe:/a:redhat:ansible_engine:2.9::el8" ]
null
5
null
null
RHSA-2017:1456
Red Hat Security Advisory: openstack-heat security and bug fix update
openstack-heat: Template source URL allows network port scan
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
3.5
null
RHSA-2024:0559
Red Hat Security Advisory: firefox security update
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2020:5527
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 security update on RHEL 7
keycloak: Account REST API can update user metadata attributes
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
4.2
null
null
RHSA-2021:5206
Red Hat Security Advisory: log4j security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation", "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_els:6", "cpe:/o:redhat:rhel_tus:7.6::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
7.5
null
null
RHSA-2024:3918
Red Hat Security Advisory: OpenShift Container Platform 4.14.30 packages and security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
5.9
null
null
RHSA-2014:0389
Red Hat Security Advisory: jasperreports-server-pro security update
XStream: remote code execution due to insecure XML deserialization
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2006:0571
Red Hat Security Advisory: gnupg security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:0185
Red Hat Security Advisory: kernel security and bug fix update
kernel: x86-64: IRET faults during NMIs processing kernel: Keyrings crash triggerable by unprivileged user
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:1227
Red Hat Security Advisory: podman security, bug fix, and enhancement update
podman: resolving symlink in host filesystem leads to unexpected results of copy operation containers/image: Container images read entire image manifest into memory
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
3.5
2.5
null
RHSA-2016:2105
Red Hat Security Advisory: kernel security update
kernel: mm: privilege escalation via MAP_PRIVATE COW breakage
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2024:9543
Red Hat Security Advisory: .NET 9.0 security update
dotnet: Type confusion vulnerability leads to AV in .NET Core NrbfDecoder component dotnet: .NET Core - DoS - (unbounded work factor) in NrbfDecoder component
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2011:1065
Red Hat Security Advisory: Red Hat Enterprise Linux 5.7 kernel security and bug fix update
kernel: xen: svm: insufficiencies in handling emulated instructions during vm exits kernel: kernel: net_sched: fix qdisc_notify() kernel: gfs2: make sure fallocate bytes is a multiple of blksize
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:7647
Red Hat Security Advisory: httpd:2.4 security update
httpd: mod_lua: Use of uninitialized value of in r:parsebody httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() httpd: mod_lua: DoS in r:parsebody httpd: mod_sed: DoS vulnerability httpd: mod_lua: Information disclosure with websockets httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.3
null
null
RHSA-2017:0191
Red Hat Security Advisory: Red Hat Satellite 5 - 60 day End Of Life Notice
This is the 60 day notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite 5: * Red Hat Satellite 5.6 on Red Hat Enterprise Linux 5
[ "cpe:/a:redhat:network_satellite:5.6::el5" ]
null
null
null
null
RHEA-2023:3850
Red Hat Enhancement Advisory: krb5 bug fix update
krb5: integer overflow vulnerabilities in PAC parsing
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.8
null
null
RHSA-2024:2047
Red Hat Security Advisory: OpenShift Container Platform 4.13.41 bug fix and security update
osin: manipulation of the argument secret leads to observable timing discrepancy go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients cluster-monitoring-operator: credentials leak kubevirt-csi: PersistentVolume allows access to HCP's root node
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
6.5
null
null
RHSA-2014:1184
Red Hat Security Advisory: spacewalk-java security update
Satellite: Spacewalk contains XSS in log file view
[ "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6", "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6", "cpe:/a:redhat:network_satellite:5.6::el5", "cpe:/a:redhat:network_satellite:5.6::el6" ]
null
null
null
null
RHSA-2020:5174
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" ]
null
7.4
null
null
RHSA-2013:0122
Red Hat Security Advisory: tcl security and bug fix update
postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2009:1438
Red Hat Security Advisory: kernel security and bug fix update
kernel: missing capability check in z90crypt kernel: personality: fix PER_CLEAR_ON_SETID kernel: information leak in sigaltstack kernel: execve: must clear current->clear_child_tid kernel: random: add robust get_random_u32, remove weak get_random_int
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:5100
Red Hat Security Advisory: firefox security update
Mozilla: Write side effects in MCallGetProperty opcode not accounted for
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.8
null
RHSA-2022:6921
Red Hat Security Advisory: expat security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/o:redhat:rhel_els:6" ]
null
8.1
null
null
RHSA-2024:0594
Red Hat Security Advisory: openssh security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
6.5
null
null
RHSA-2024:1424
Red Hat Security Advisory: nodejs security update
nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2019:2729
Red Hat Security Advisory: firefox security update
Mozilla: Sandbox escape through Firefox Sync firefox: stored passwords in 'Saved Logins' can be copied without master password entry Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, Firefox ESR 60.9, Thunderbird 68.1, and Thunderbird 60.9 Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images Mozilla: Cross-origin access to unload event attributes Mozilla: XSS by breaking out of title and textarea elements using innerHTML Mozilla: Use-after-free while manipulating video Mozilla: Use-after-free while extracting a key value in IndexedDB
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2016:1940
Red Hat Security Advisory: openssl security update
openssl: Possible integer overflow vulnerabilities in codebase openssl: Non-constant time codepath followed for certain operations in DSA implementation openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer OpenSSL: OOB read in TS_OBJ_print_bio() openssl: DTLS replay protection bypass allows DoS against DTLS connection openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() openssl: Insufficient TLS session ticket HMAC length checks openssl: OCSP Status Request extension unbounded memory growth openssl: certificate message OOB reads
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.9
null
RHSA-2013:1256
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB13-21) flash-plugin: multiple code execution flaws (APSB13-21) flash-plugin: multiple code execution flaws (APSB13-21) flash-plugin: multiple code execution flaws (APSB13-21)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:4612
Red Hat Security Advisory: Red Hat support for Spring Boot 2.7.13 security update
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode SnakeYaml: Constructor Deserialization Remote Code Execution reactor-netty-http: Log request headers in some cases of invalid HTTP requests tomcat: JsonErrorReportValve injection Undertow: Infinite loop in SslConduit during close springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
5.3
null
null
RHSA-2020:2333
Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 19 security update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods cxf: OpenId Connect token service does not properly validate the clientId cxf: OpenId Connect token service does not properly validate the clientId jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* cxf: reflected XSS in the services listing page jackson-databind: lacks certain net.sf.ehcache blocking netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Soteria: security identity corruption across concurrent threads undertow: AJP File Read/Inclusion Vulnerability netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
[ "cpe:/a:redhat:jboss_enterprise_application_platform_cd:19" ]
null
8.1
7.5
null
RHEA-2015:1075
Red Hat Enhancement Advisory: Red Hat JBoss Enterprise Application Platform 6.4.1 update on RHEL 6
EAP: LDAP bind password is being logged with TRACE log level
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHBA-2024:3593
Red Hat Bug Fix Advisory: Red Hat Advanced Cluster Management 2.9.4 bug fixes and container updates
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() braces: fails to limit the number of characters it can handle sanitize-html: Information Exposure when used on the backend jose: resource exhaustion
[ "cpe:/a:redhat:acm:2.9::el8" ]
null
5.3
null
null
RHSA-2024:2437
Red Hat Security Advisory: exfatprogs security update
exfatprogs: exfatprogs allows out-of-bounds memory access
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2022:6157
Red Hat Security Advisory: curl security update
curl: HTTP compression denial of service curl: Unpreserved file permissions curl: FTP-KRB bad message verification
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
RHSA-2014:0377
Red Hat Security Advisory: openssl security update
openssl: information disclosure in handling of TLS heartbeat extension packets
[ "cpe:/a:redhat:storage:2.1:server:el6" ]
null
null
null
null
RHSA-2015:1086
Red Hat Security Advisory: flash-plugin security update
flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333) flash-plugin: same-origin-policy bypass fixed in APSB15-11 flash-plugin: same-origin-policy bypass fixed in APSB15-11 flash-plugin: multiple code execution issues fixed in APSB15-11 flash-plugin: same-origin-policy bypass fixed in APSB15-11 flash-plugin: multiple code execution issues fixed in APSB15-11 flash-plugin: multiple code execution issues fixed in APSB15-11 flash-plugin: multiple code execution issues fixed in APSB15-11 flash-plugin: multiple code execution issues fixed in APSB15-11 flash-plugin: multiple code execution issues fixed in APSB15-11 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2017:0344
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: net: out of bounds read in net_checksum_calculate() Qemu: display: cirrus: oob access while doing bitblt copy backward mode
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
5.5
null
RHSA-2020:5398
Red Hat Security Advisory: thunderbird security update
Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2023:7344
Red Hat Security Advisory: openshift-gitops-kam security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_gitops:1.9::el9" ]
null
7.5
null
null
RHSA-2022:9068
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.1
null
null
RHSA-2020:3229
Red Hat Security Advisory: firefox security update
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
8.8
null
RHSA-2022:7648
Red Hat Security Advisory: grafana-pcp security update
golang: net/http: improper sanitization of Transfer-Encoding header golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2024:2278
Red Hat Security Advisory: httpd security update
httpd: mod_macro: out-of-bounds read vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:7428
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty xorg-x11-server: Use-after-free bug in DestroyWindow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
4.7
null
null
RHSA-2020:0329
Red Hat Security Advisory: go-toolset:rhel8 security update
golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling golang: invalid public key causes panic in dsa.Verify
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
6.5
null
RHSA-2013:0496
Red Hat Security Advisory: Red Hat Enterprise Linux 6 kernel update
kernel: ext4: AIO vs fallocate stale data exposure kernel: block: default SCSI command filter does not accomodate commands overlap across device classes kernel: stack corruption in xen_failsafe_callback() kernel: mm: thp: pmd_present and PROT_NONE local DoS kernel: net: CIPSO_V4_TAG_LOCAL tag NULL pointer dereference kernel: vhost: fix length for cross region descriptor
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:1237
Red Hat Security Advisory: ImageMagick security update
ImageMagick: Integer and buffer overflow in coders/icon.c ImageMagick: Integer truncation vulnerability in coders/pict.c ImageMagick: Crash due to out of bounds error in SpliceImage ImageMagick: Prevent NULL pointer access in magick/constitute.c ImageMagick: Remote code execution via filename ImageMagick,GraphicsMagick: Gnuplot delegate vulnerability allowing command injection ImageMagick: SVG converting issue resulting in DoS
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:5314
Red Hat Security Advisory: OpenShift Virtualization 4.13.10 Images security update
axios: exposure of confidential data stored in cookies
[ "cpe:/a:redhat:container_native_virtualization:4.13::el9" ]
null
6.5
null
null
RHSA-2004:549
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:10834
Red Hat Security Advisory: ruby:3.1 security update
rexml: REXML ReDoS vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2014:1320
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
4.8
null
RHSA-2024:2938
Red Hat Security Advisory: varnish:6 security update
varnish: HTTP/2 Broken Window Attack may result in denial of service
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2018:0629
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1 security update
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1" ]
null
null
8.1
null
RHSA-2024:0720
Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update
apache-ivy: XML External Entity vulnerability follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()
[ "cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8" ]
null
6.1
null
null
RHSA-2023:1533
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
glob-parent: Regular Expression Denial of Service minimist: prototype pollution nodejs-minimatch: ReDoS via the braceExpand function c-ares: buffer overflow in config_sortlist() due to missing string length check express: "qs" prototype poisoning causes the hang of the node process http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability nodejs: HTTP Request Smuggling due to incorrect parsing of header fields decode-uri-component: improper input validation resulting in DoS nodejs: DNS rebinding in inspect via invalid octal IP address Node.js: Permissions policies can be bypassed via process.mainModule Node.js: insecure loading of ICU data through ICU_DATA environment variable
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
4.2
null
null
RHSA-2022:0669
Red Hat Security Advisory: python-pillow security update
python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
9.8
null
null
RHSA-2025:3889
Red Hat Security Advisory: kernel-rt security update
kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
7.1
null
null
RHSA-2024:9885
Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0
path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser
[ "cpe:/a:redhat:trusted_profile_analyzer:1.2::el9" ]
null
7.5
null
null
RHSA-2022:1394
Red Hat Security Advisory: Red Hat Ceph Storage 3 Security and Bug Fix update
ceph: Unauthorized global_id reuse in cephx
[ "cpe:/a:redhat:ceph_storage:3::el7" ]
null
8
null
null
RHSA-2018:0560
Red Hat Security Advisory: collectd security, bug fix, and enhancement update
collectd: double free in csnmp_read_table function in snmp.c
[ "cpe:/a:redhat:rhev_manager:4", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.6
null
RHSA-2001:132
Red Hat Security Advisory: : New util-linux packages available to fix /bin/login pam problem
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2015:1052
Red Hat Security Advisory: thermostat1 security, bug fix, and enhancement update
thermostat: world-readable configuration file containing credentials
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2018:3581
Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 security update
RichFaces: Expression Language injection via UserResource allows for unauthenticated remote code execution
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3" ]
null
null
9.8
null
RHSA-2023:1445
Red Hat Security Advisory: firefox security update
nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2023:7576
Red Hat Security Advisory: squid security update
squid: Denial of Service in HTTP Digest Authentication
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
8.6
null
null
RHSA-2024:6206
Red Hat Security Advisory: kernel security update
kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: net: amd-xgbe: Fix skb data length underflow kernel: phylib: fix potential use-after-free kernel: net: fix information leakage in /proc/net/ptype kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling kernel: pstore/ram: Fix crash when setting number of cpus to an odd number kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number kernel: drm/amdgpu: Fix possible null pointer dereference kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again kernel: vfio/pci: Lock external INTx masking ops kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: igc: avoid returning frame twice in XDP_REDIRECT kernel: crypto: qat - resolve race condition during AER recovery kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation kernel: tls: fix missing memory barrier in tls_init kernel: net: fix out-of-bounds access in ops_init kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). kernel: wifi: nl80211: don't free NULL coalescing rule kernel: net: bridge: mst: fix vlan use-after-free kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: gfs2: Fix potential glock use-after-free on unmount kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg kernel: ionic: fix use after netif_napi_del() kernel: NFSv4: Fix memory leak in nfs4_set_security_label kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.1
null
null
RHSA-2022:6314
Red Hat Security Advisory: pcs security update
pcs: obtaining an authentication token for hacluster user could lead to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
8.4
null
null
RHSA-2023:4967
Red Hat Security Advisory: kpatch-patch security update
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
7.8
null
null
RHSA-2007:0395
Red Hat Security Advisory: mod_perl security update
mod_perl PerlRun denial of service
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2005:434
Red Hat Security Advisory: firefox security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:6184
Red Hat Security Advisory: Self Node Remediation Operator 0.4.1 security update
golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:workload_availability_self_node_remediation:0.4::el8" ]
null
7.5
null
null
RHSA-2024:4159
Red Hat Security Advisory: OpenShift Container Platform 4.16.1 packages and security update
containers/image: digest type does not guarantee valid type
[ "cpe:/a:redhat:openshift:4.16::el8", "cpe:/a:redhat:openshift:4.16::el9" ]
null
8.3
null
null
RHSA-2022:5479
Red Hat Security Advisory: firefox security update
Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
7.5
null
RHSA-2023:5464
Red Hat Security Advisory: frr security update
frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
null
null
RHSA-2022:7411
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update on RHEL 9
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console owasp-java-html-sanitizer: improper policies enforcement may lead to remote code execution netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console artemis-commons: Apache ActiveMQ Artemis DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
7.5
null
null
RHSA-2022:7874
Red Hat Security Advisory: OpenShift Container Platform 4.8.53 bug fix and security update
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.8::el8" ]
null
8.6
null
null
RHSA-2023:5094
Red Hat Security Advisory: qemu-kvm security and bug fix update
QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:4137
Red Hat Security Advisory: kernel security and bug fix update
kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c Kernel: bluetooth: Unauthorized management command execution kernel: OOB access in the Linux kernel's XFS subsystem kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.8
null
null
RHSA-2011:1189
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel signal spoofing issue kernel: net: Fix memory leak/corruption on VLAN GRO_DROP kernel: proc: signedness issue in next_pidmap() kernel: validate size of EFI GUID partition entries virt: VT-d (PCI passthrough) MSI trap injection kernel: ksm: race between ksmd and exiting task kernel: inet_diag: insufficient validation kernel: rpc task leak after flock()ing NFS share kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace kernel: /proc/PID/io infoleak kernel: bluetooth: buffer overflow in l2cap config request kernel: nl80211: missing check for valid SSID size in scan operations kernel: gfs2: make sure fallocate bytes is a multiple of blksize kernel: ext4: kernel panic when writing data to the last block of sparse file
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2021:2657
Red Hat Security Advisory: linuxptp security update
linuxptp: missing length check of forwarded messages
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
null
null
RHSA-2017:0860
Red Hat Security Advisory: chromium-browser security update
chromium-browser: bad cast in blink chromium-browser: out of bounds memory access in v8 chromium-browser: heap buffer overflow in v8 chromium-browser: use after free in printing chromium-browser: use after free in blink
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null