Dataset Viewer
id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2014:1244 | Red Hat Security Advisory: bind97 security and bug fix update | bind: named crash when handling malformed NSEC3-signed zones | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:0134 | Red Hat Security Advisory: java-1.7.0-ibm security update | OpenJDK: incorrect class loader permission check in ClassLoader getParent() (Libraries, 8055314) ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) JDK: unspecified full Java sandbox bypass fixed in Feb 2015 update JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2016:1586 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: virtio: unbounded memory allocation on host via guest leading to DoS | [
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | 3.4 | null |
RHSA-2022:1469 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update | log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 5.9 | null | null |
RHSA-2012:0301 | Red Hat Security Advisory: ImageMagick security and bug fix update | ImageMagick: configuration files read from $CWD may allow arbitrary code execution | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:3490 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/ulp: use-after-free in listening ULP sockets kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2024:2504 | Red Hat Security Advisory: libssh security update | libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname libssh: Missing checks for return values for digests | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.7 | null | null |
RHSA-2016:0560 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support One-year Notice | This is the one-year notification for the retirement of Red Hat Enterprise
Linux 4 Extended Life Cycle Support (ELS). This notice applies only to
those customers subscribed to the Extended Life Cycle Support (ELS) channel
for Red Hat Enterprise Linux 4 in the Customer Portal. | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2011:1615 | Red Hat Security Advisory: virt-v2v security and bug fix update | virt-v2v: vnc password protection is missing after vm conversion | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:0438 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 flash-plugin: multiple code execution issues fixed in APSB16-08 | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2015:0864 | Red Hat Security Advisory: kernel security and bug fix update | policycoreutils: local privilege escalation via seunshare kernel: kvm: vmx: invalid host cr4 handling across vm entries kernel: insufficient syscall number validation in perf and ftrace subsystems kernel: insufficient syscall number validation in perf and ftrace subsystems kernel: memcg: OOM handling DoS kernel: usb: buffer overflow in ttusb-dec kernel: use-after-free during key garbage collection kernel: isofs: unchecked printing of ER records kernel: net: slab corruption from use after free on INIT collisions | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:1349 | Red Hat Security Advisory: krb5-appl security update | telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.8 | null | null |
RHSA-2024:4677 | Red Hat Security Advisory: OpenShift Container Platform 4.12.61 bug fix and security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2003:417 | Red Hat Security Advisory: : Updated kernel resolves security vulnerability | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:7374 | Red Hat Security Advisory: Security update for service-interconnect rhel9 container images | curl: HTTP/2 push headers memory-leak pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection glib2: Signal subscription vulnerabilities krb5: GSS message token handling krb5: GSS message token handling | [
"cpe:/a:redhat:service_interconnect:1::el9"
] | null | 6.5 | null | null |
RHSA-2024:6842 | Red Hat Security Advisory: pcp security update | pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 4.4 | null | null |
RHSA-2010:0338 | Red Hat Security Advisory: java-1.5.0-sun security update | TLS: MITM attacks via session renegotiation OpenJDK Loader-constraint table allows arrays instead of only the base-classes (6626217) OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) JDK unspecified vulnerability in JWS/Plugin component OpenJDK Inflater/Deflater clone issues (6745393) JDK unspecified vulnerability in JavaWS/Plugin component OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) OpenJDK System.arraycopy unable to reference elements beyond Integer.MAX_VALUE bytes (6892265) OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) OpenJDK JAR "unpack200" must verify input parameters (6902299) OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653) JDK multiple unspecified vulnerabilities OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities OpenJDK No ClassCastException for HashAttributeSet constructors if run with -Xcomp (6894807) JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:4.7.z",
"cpe:/a:redhat:rhel_extras:5",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:9136 | Red Hat Security Advisory: qemu-kvm security update | QEMU: virtio: DMA reentrancy issue leads to double free vulnerability QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure QEMU: SR-IOV: improper validation of NumVFs leads to buffer overflow | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | 7.5 | null |
RHSA-2023:2458 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: mlxsw: spectrum: Protect driver from buggy firmware kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering kernel: possible race condition in drivers/tty/tty_buffers.c kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: use-after-free in free_pipe_info() could lead to privilege escalation kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: netfilter: nf_conntrack_irc message handling issue kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: memory leak in ipv6_renew_options() kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: data races around sk->sk_prot kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: use-after-free after failed devlink reload in devlink_param_get kernel: USB-accessible buffer overflow in brcmfmac kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: lockdown bypass using IMA kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405) kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in bss_ref_get in net/wireless/scan.c kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c kernel: Denial of service in beacon protection for P2P-device kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: scsi: mpt3sas: Fix use-after-free warning kernel: regmap: spi: Reserve space for register address/padding kernel: net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent kernel: net/mlx5: Fix command stats access after free kernel: ice: Fix potential memory leak in ice_gnss_tty_write() kernel: thermal: core: Fix TZ_GET_TRIP NULL pointer dereference kernel: nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() kernel: bpf: Add schedule points in batch ops kernel: hwmon: Handle failure to register sensor with thermal zone correctly kernel: netfilter: conntrack: fix using __this_cpu_add in preemptible kernel: netfilter: flowtable_offload: fix using __this_cpu_add in preemptible kernel: ASoC: soc-pcm: Add NULL check in BE reparenting kernel: hwmon: (coretemp) Check for null before removing sysfs attrs kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: net/ulp: use-after-free in listening ULP sockets kernel: use-after-free due to race condition in qdisc_graft() kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: denial of service in tipc_conn_close Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: ext4: use-after-free in ext4_xattr_set_entry() kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU kernel: octeontx2-pf: Fix resource leakage in VF driver unbind | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2015:1083 | Red Hat Security Advisory: abrt security update | abrt: default event scripts follow symbolic links abrt: default abrt event scripts lead to information disclosure abrt: abrt-hook-ccpp writes core dumps to existing files owned by others abrt: does not validate contents of uploaded problem reports abrt: abrt-dbus does not guard against crafted problem directory path arguments abrt: directory traversals in several D-Bus methods implemented by abrt-dbus abrt: missing process environment sanitizaton in abrt-action-install-debuginfo-to-abrt-cache abrt: Various race-conditions and symlink issues found in abrt | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2016:1098 | Red Hat Security Advisory: jq security update | jq: heap-buffer-overflow in tokenadd() function | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2014:0439 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: ipc: ipc_rcu_putref refcount races Kernel: net: leakage of uninitialized memory to user-space via recv syscalls Kernel: net: leakage of uninitialized memory to user-space via recv syscalls kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: cifs: incorrect handling of bogus user pointers during uncached writes kernel: x86: exceptions are not cleared in AMD FXSAVE workaround Kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper Kernel: SELinux: local denial-of-service Kernel: net: IPv6: crash due to router advertisement flooding kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2023:6845 | Red Hat Security Advisory: OpenShift Container Platform 4.13.22 security and extras update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2008:0177 | Red Hat Security Advisory: evolution security update | Evolution format string flaw | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2024:0484 | Red Hat Security Advisory: OpenShift Container Platform 4.13.31 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2008:0618 | Red Hat Security Advisory: vim security update | vim: command execution via scripts not sanitizing inputs to execute and system vim: arbitrary code execution in commands: K, Control-], g] | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2013:0273 | Red Hat Security Advisory: java-1.6.0-openjdk security update | SSL/TLS: CBC padding timing attack (lucky-13) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0021 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2006:0635 | Red Hat Security Advisory: XFree86 security update | freetype: integer overflow vulnerability due to incomplete fix for CVE-2006-1861 | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2003:032 | Red Hat Security Advisory: : Updated tcpdump packages fix various vulnerabilities | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2020:0339 | Red Hat Security Advisory: kernel security and bug fix update | kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 kernel: heap overflow in marvell/mwifiex/tdls.c kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135) | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.5 | null |
RHSA-2022:7927 | Red Hat Security Advisory: libksba security update | libksba: integer overflow may lead to remote code execution | [
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.6 | null | null |
RHSA-2013:0896 | Red Hat Security Advisory: qemu-kvm security and bug fix update | qemu: guest agent creates files with insecure permissions in deamon mode | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:0476 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | gitops: Path traversal and dereference of symlinks when passing Helm value files | [
"cpe:/a:redhat:openshift_gitops:1.3::el8"
] | null | 7.7 | null | null |
RHSA-2016:2591 | Red Hat Security Advisory: krb5 security, bug fix, and enhancement update | krb5: null pointer dereference in kadmin krb5: S4U2Self KDC crash when anon is restricted | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2023:6712 | Red Hat Security Advisory: python-wheel security update | python-wheel: remote attackers can cause denial of service via attacker controlled input to wheel cli | [
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2024:8162 | Red Hat Security Advisory: kernel security update | kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: Local information disclosure on Intel(R) Atom(R) processors kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms kernel: mptcp: ensure snd_nxt is properly initialized on connect kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: net/mlx5: Add a timeout to acquire the command queue semaphore kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked kernel: ionic: fix use after netif_napi_del() kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush kernel: sched: act_ct: take care of padding in struct zones_ht_key kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.3 | null | null |
RHSA-2024:5528 | Red Hat Security Advisory: thunderbird security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 6.1 | null | null |
RHSA-2014:0422 | Red Hat Security Advisory: openshift-origin-broker security update | OpenShift: openshift-origin-broker plugin allows impersonation | [
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2024:9501 | Red Hat Security Advisory: libsoup security update | libsoup: HTTP request smuggling via stripping null bytes from the ends of header names | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2002:124 | Red Hat Security Advisory: xchat security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2020:1659 | Red Hat Security Advisory: grafana security, bug fix, and enhancement update | grafana: incorrect access control in snapshot HTTP API leads to denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 4.3 | null |
RHSA-2014:0982 | Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update | OpenJDK: null xmlns handling issue (Security, 8025026) OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) libjpeg: information leak (read of uninitialized memory) libpng: unhandled zero-length PLTE chunk or NULL palette OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insecure subject principals set handling (JAAS, 8024306) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767) OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) JDK: Vulnerability in the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) | [
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6",
"cpe:/a:redhat:network_satellite:5.5::el5",
"cpe:/a:redhat:network_satellite:5.5::el6",
"cpe:/a:redhat:network_satellite:5.6::el5",
"cpe:/a:redhat:network_satellite:5.6::el6"
] | null | null | null | null |
RHSA-2024:10827 | Red Hat Security Advisory: postgresql security update | postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2023:7765 | Red Hat Security Advisory: podman security update | golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2022:9111 | Red Hat Security Advisory: OpenShift Container Platform 4.9.54 bug fix and security update | go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3) | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.6 | null | null |
RHSA-2022:1898 | Red Hat Security Advisory: fapolicyd security, bug fix, and enhancement update | fapolicyd: fapolicyd wrongly prepares ld.so path | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.4 | null | null |
RHSA-2023:7858 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update | keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6.6"
] | null | 7.7 | null | null |
RHSA-2024:6882 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 for OpenShift image enhancement update | keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 6.1 | null | null |
RHSA-2022:8096 | Red Hat Security Advisory: redis security and bug fix update | redis: Code injection via Lua script execution environment redis: Malformed Lua script can crash Redis | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.3 | null | null |
RHSA-2016:0778 | Red Hat Security Advisory: icedtea-web security, bug fix, and enhancement update | icedtea-web: unexpected permanent authorization of unsigned applets icedtea-web: applet origin spoofing | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:3843 | Red Hat Security Advisory: kernel security and bug fix update | kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 5.5 | null |
RHSA-2021:0181 | Red Hat Security Advisory: kernel security update | Kernel: x86_32: BUG in syscall auditing | [
"cpe:/o:redhat:rhel_els:6"
] | null | 5.5 | null | null |
RHSA-2021:1350 | Red Hat Security Advisory: thunderbird security update | Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 2.5 | 6.1 | null |
RHSA-2023:6044 | Red Hat Security Advisory: Cost Management security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:cost_management:1::el8"
] | null | 7.5 | null | null |
RHBA-2019:2794 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.16 packages update | kubernetes: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 4.8 | null |
RHSA-2025:1374 | Red Hat Security Advisory: kpatch-patch-5_14_0-70_112_1, kpatch-patch-5_14_0-70_121_1, and kpatch-patch-5_14_0-70_85_1 security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 7.3 | null | null |
RHSA-2012:0100 | Red Hat Security Advisory: MRG Grid security, bug fix, and enhancement update | Condor: Multiple format string flaws | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2020:5201 | Red Hat Security Advisory: net-snmp security and bug fix update | net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream",
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 8.8 | null | null |
RHSA-2022:4957 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: URI parsing inconsistencies (JNDI, 8278972) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
RHSA-2014:0763 | Red Hat Security Advisory: rubygem-openshift-origin-node security update | Origin: Command execution as root via downloadable cartridge source-url | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2021:0028 | Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update | lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c | [
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 9.8 | null | null |
RHSA-2020:0481 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R15 security and bug fix update | jquery: Cross-site scripting via cross-domain ajax requests infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods | [
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 7.5 | null |
RHSA-2018:0315 | Red Hat Security Advisory: openstack-aodh security update | openstack-aodh: Aodh can be used to launder Keystone trusts | [
"cpe:/a:redhat:openstack:11::el7"
] | null | null | 4.9 | null |
RHSA-2022:9070 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2019:0980 | Red Hat Security Advisory: httpd:2.4 security update | httpd: privilege escalation from modules scripts httpd: mod_ssl: access control bypass when using per-location client certification authentication | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.8 | null |
RHSA-2019:0348 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Information Disclosure vulnerability (APSB19-06) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2024:2616 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2024:4928 | Red Hat Security Advisory: kernel security update | kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv kernel: net: amd-xgbe: Fix skb data length underflow kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: dm: call the resume method on internal suspend kernel: Squashfs: check the inode number is not the invalid value of zero kernel: octeontx2-af: race condition on interupts kernel: nfp: flower: handle acti_netdevs allocation failure kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() kernel: mlxbf_gige: stop interface during shutdown kernel: mlxbf_gige: call request_irq() after NAPI initialized kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up kernel: epoll: be better about file lifetimes | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.3 | null | null |
RHSA-2007:0562 | Red Hat Security Advisory: krb5 security update | krb5 RPC library unitialized pointer free krb5 RPC library stack overflow krb5 kadmind buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:6190 | Red Hat Security Advisory: firefox security update | libvpx: crash related to VP9 encoding in libvpx | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2021:4618 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4 images and security updates | openssl: SM2 Decryption Buffer Overflow openssl: Read buffer overruns processing ASN.1 strings nodejs-axios: Regular expression denial of service in trim function nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Out of bounds read in lua debugger protocol parser redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets helm: information disclosure vulnerability nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite nodejs-trim-newlines: ReDoS in .end() method redis: Integer overflow issue with strings | [
"cpe:/a:redhat:acm:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2020:5359 | Red Hat Security Advisory: OpenShift Container Platform 4.5.23 security and bug fix update | kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 5.3 | null | null |
RHSA-2016:0449 | Red Hat Security Advisory: samba4 security update | samba: Incorrect ACL get/set allowed on symlink path | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:3229 | Red Hat Security Advisory: zziplib security update | zziplib: out of bound read in mmapped.c:zzip_disk_fread() causes crash zziplib: Bus error in zip.c:__zzip_parse_root_directory() cause crash via crafted zip file zziplib: Memory leak in memdisk.c:zzip_mem_disk_new() can lead to denial of service via crafted zip | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2014:1020 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 update | httpd: mod_deflate denial of service netty: DoS via memory exhaustion during data aggregation httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service WS: Incomplete fix for CVE-2013-2133 Security: Invalid EJB caller role check implementation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2016:2043 | Red Hat Security Advisory: python-django security update | python-django: CSRF protection bypass on a site with Google Analytics | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 6.1 | null |
RHSA-2022:1975 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: avoid cyclic entity chains due to malformed USB descriptors kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c kernel: use-after-free in nouveau kernel module kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() kernel: possible use-after-free in bluetooth module kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks kernel: DoS in ccp_run_aes_gcm_cmd() function kernel: sctp: Invalid chunks may be used to remotely remove existing associations kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients kernel: stack information leak in infiniband RDMA kernel: possible leak or coruption of data residing on hugetlbfs kernel: security regression for CVE-2018-13405 kernel: fget: check that the fd still exists after getting a ref to it kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io kernel: Buffer overwrite in decode_nfs_fh function kernel: cgroup: Use open-time creds and namespace for migration perm checks kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write kernel: Heap buffer overflow in firedtv driver kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device kernel: use-after-free in the TEE subsystem kernel: information leak in the IPv6 implementation kernel: information leak in the IPv4 implementation kernel: dm: fix mempool NULL pointer race when completing IO kernel: tcp: fix page frag corruption on page fault kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce() kernel: mptcp: fix deadlock in __mptcp_push_pending() kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm hw: cpu: intel: Branch History Injection (BHI) hw: cpu: intel: Intra-Mode BTI kernel: Local denial of service in bond_ipsec_add_sa kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c kernel: information leak in copy_page_to_iter() in iov_iter.c kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize() kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats() kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() kernel: Copy_from_user on 64-bit versions may leak kernel information kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.9 | null | null |
RHSA-2006:0354 | Red Hat Security Advisory: elfutils security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:1711 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 7 security and bug fix update | openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | null | 6.5 | null |
RHSA-2023:3408 | Red Hat Security Advisory: openssl security update | openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2006:0178 | Red Hat Security Advisory: ImageMagick security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:1730 | Red Hat Security Advisory: thunderbird security update | Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | 7.5 | null |
RHSA-2007:1155 | Red Hat Security Advisory: mysql security update | mysql DoS in the InnoDB Engine mysql: possible system table information overwrite using symlinks | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3009 | Red Hat Security Advisory: OpenShift Container Platform 4.6.42 security update | golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 6.5 | null | null |
RHSA-2021:3176 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 2.8 | 6.5 | null |
RHSA-2023:6839 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2025:2195 | Red Hat Security Advisory: emacs security update | emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.8 | null | null |
RHSA-2013:0234 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1"
] | null | null | null | null |
RHSA-2024:3258 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2008:0244 | Red Hat Security Advisory: java-1.5.0-bea security update | Untrusted applet and application XSLT processing privilege escalation JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194) | [
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2017:0064 | Red Hat Security Advisory: bind97 security update | bind: assertion failure while handling a query response containing inconsistent DNSSEC information | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 7.5 | null |
RHSA-2023:4154 | Red Hat Security Advisory: bind security update | bind: named's configured cache size limit can be significantly exceeded | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2018:3833 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 firefox: Memory corruption in Angle Mozilla: Use-after-free with select element Mozilla: Buffer overflow in accelerated 2D canvas with Skia Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs Mozilla: Integer overflow when calculating buffer sizes for images | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2023:6129 | Red Hat Security Advisory: OpenShift Container Platform 4.13.19 security and extras update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2017:3379 | Red Hat Security Advisory: sssd security and bug fix update | sssd: unsanitized input when searching in local cache database | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2012:0018 | Red Hat Security Advisory: libxml2 security update | libxml2 out of bounds read libxml2: Heap-based buffer overflow when decoding an entity reference with a long name | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:2236 | Red Hat Security Advisory: subversion:1.10 security update | subversion: Subversion's mod_dav_svn is vulnerable to memory corruption | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2020:4390 | Red Hat Security Advisory: python-django security update | Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS Django: backtracking in a regular expression in django.utils.text.Truncator leads to DoS Django: the behavior of the underlying HTMLParser leading to DoS Django: SQL injection possibility in key and index lookups for JSONField/HStoreField Django: Potential memory exhaustion in django.utils.encoding.uri_to_iri() | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 5.3 | null |
RHSA-2023:4004 | Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update | python: urllib.parse url blocklisting bypass | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 75