id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2020:1336
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP2 security update
openssl: side-channel weak encryption vulnerability openssl: information disclosure in fork() openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey httpd: memory corruption on early pushes httpd: read-after-free in h2 connection shutdown httpd: limited cross-site scripting in mod_proxy error page httpd: null-pointer dereference in mod_remoteip httpd: mod_rewrite potential open redirect httpd: mod_rewrite configurations vulnerable to open redirect
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
6.1
3.7
null
RHSA-2013:0825
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14) flash-plugin: multiple code execution flaws (APSB13-14)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:9458
Red Hat Security Advisory: python3.11-urllib3 security update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
4.4
null
null
RHSA-2019:3083
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 security update
wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" ]
null
null
5.2
null
RHSA-2020:1287
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
8.8
5.9
null
RHSA-2015:2547
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.3 security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_operations_network:3.2.3" ]
null
null
null
null
RHSA-2024:6210
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.4 security update
axios: axios: Server-Side Request Forgery elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed
[ "cpe:/a:redhat:service_mesh:2.5::el8" ]
null
5.3
null
null
RHSA-2023:1158
Red Hat Security Advisory: OpenShift Container Platform 4.11.31 bug fix and security update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2021:0744
Red Hat Security Advisory: nodejs:14 security and bug fix update
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2016:2928
Red Hat Security Advisory: rh-mariadb101-mariadb security update
mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
4.3
null
RHSA-2020:2332
Red Hat Security Advisory: Red Hat Satellite 5 - End Of Life Notice
This is the notification of the End Of Life (EOL) for the following versions of Red Hat Satellite 5: * Red Hat Satellite 5.8 on Red Hat Enterprise Linux 6
[ "cpe:/a:redhat:network_satellite:5.8::el6" ]
null
null
null
null
RHSA-2013:0155
Red Hat Security Advisory: Ruby on Rails security update
rubygem-activerecord: find_by_* SQL Injection rubygem-activerecord: Unsafe Query Generation Risk in Ruby on Rails rubygem-activesupport: Multiple vulnerabilities in parameter parsing in ActionPack
[ "cpe:/a:cloudforms_cloudengine:1::el6", "cpe:/a:cloudforms_systemengine:1::el6" ]
null
null
null
null
RHEA-2025:2427
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
RHSA-2014:0164
Red Hat Security Advisory: mysql security and bug fix update
mysql: unspecified vulnerability related to Error Handling DoS (CPU Jan 2014) mysql: command-line tool buffer overflow via long server version string mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB affecting integrity (CPU Jan 2014) mysql: unspecified DoS vulnerability (CPU Jan 2014) mysql: unspecified vulnerability related to Locking DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:1681
Red Hat Security Advisory: kpatch-patch security update
kernel: FUSE filesystem low-privileged user privileges escalation
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7
null
null
RHSA-2024:1674
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update
undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing ssh: Prefix truncation attack on Binary Packet Protocol (BPP) undertow: directory traversal vulnerability undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
7.5
null
null
RHSA-2020:1326
Red Hat Security Advisory: openstack-manila security update
openstack-manila: User with share-network UUID is able to show, create and delete shares
[ "cpe:/a:redhat:openstack:15::el8" ]
null
8.3
null
null
RHSA-2025:3371
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (openstack-ansible-core) security update
jinja2: Jinja sandbox breakout through attr filter selecting format method
[ "cpe:/a:redhat:openstack:17.1::el9" ]
null
7.3
null
null
RHSA-2024:7005
Red Hat Security Advisory: kernel-rt security update
kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: ice: Fix improper extts handling
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
4.4
null
null
RHSA-2004:090
Red Hat Security Advisory: libxml2 security update
libxml2 long URL causes SEGV
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:1786
Red Hat Security Advisory: httpd:2.4/mod_http2 security update
httpd: CONTINUATION frames DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2011:0897
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
tomcat: information disclosure in authentication headers mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments apr-util: high memory consumption in apr_brigade_split_line() tomcat: file permission bypass flaw tomcat: cross-site-scripting vulnerability in the manager application tomcat: XSS vulnerability in HTML Manager interface apr: unconstrained recursion in apr_fnmatch httpd: mod_proxy_ajp worker moved to error state when timeout exceeded
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el4", "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
RHSA-2012:0522
Red Hat Security Advisory: openssl security update
openssl: asn1_d2i_read_bio integer errors leading to buffer overflow
[ "cpe:/o:redhat:rhel_els:3::as", "cpe:/o:redhat:rhel_els:3::es", "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es", "cpe:/o:redhat:rhel_eus:5.6", "cpe:/o:redhat:rhel_eus:6.0", "cpe:/o:redhat:rhel_eus:6.1", "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2006:0605
Red Hat Security Advisory: perl security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:0578
Red Hat Security Advisory: c-ares security update
c-ares: Heap buffer over read in ares_parse_soa_reply
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
5.9
null
null
RHSA-2021:0423
Red Hat Security Advisory: OpenShift Container Platform 4.6.17 security and packages update
ant: insecure temporary file vulnerability ant: insecure temporary file jenkins: Arbitrary file read vulnerability in workspace browsers jenkins: XSS vulnerability in notification bar jenkins: Improper handling of REST API XML deserialization errors jenkins: Path traversal vulnerability in agent names jenkins: Arbitrary file existence check in file fingerprints jenkins: Excessive memory allocation in graph URLs leads to denial of service jenkins: Stored XSS vulnerability in button labels jenkins: Missing permission check for paths with specific prefix jenkins: Reflected XSS vulnerability in markup formatter preview jenkins: Stored XSS vulnerability on new item page jenkins: Filesystem traversal by privileged users
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
5.3
null
null
RHSA-2024:2569
Red Hat Security Advisory: grafana-pcp security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2021:1173
Red Hat Security Advisory: kpatch-patch security update
kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
RHSA-2023:3665
Red Hat Security Advisory: c-ares security update
c-ares: 0-byte UDP payload Denial of Service
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.5
null
null
RHSA-2015:1697
Red Hat Security Advisory: Red Hat Storage 2.1 - 60 Day Retirement Notice
This is the 60-day notification for the retirement of Red Hat Storage 2.1.
[]
null
null
null
null
RHSA-2019:2336
Red Hat Security Advisory: unixODBC security update
unixODBC: Buffer overflow in unicode_to_ansi_copy() can lead to crash or other unspecified impact unixODBC: Insecure buffer copy in SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.8
null
RHSA-2017:1445
Red Hat Security Advisory: python-django security update
python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
6.1
null
RHSA-2018:0031
Red Hat Security Advisory: libvirt security update
An update for libvirt is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
null
null
RHSA-2023:6246
Red Hat Security Advisory: .NET 7.0 security update
dotnet: Denial of Service with Client Certificates using .NET Kestrel
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.5
null
null
RHSA-2018:0050
Red Hat Security Advisory: vdsm security update
An update for vdsm is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2023:4731
Red Hat Security Advisory: OpenShift Container Platform 4.13.10 security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2024:0807
Red Hat Security Advisory: dotnet6.0 security update
dotnet: Denial of Service in SignalR server dotnet: Denial of Service in X509Certificate2
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2019:1591
Red Hat Security Advisory: OpenShift Container Platform 4.1 image security update
openshift: OAuth access tokens written in plaintext to API server audit logs
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
2.3
null
RHSA-2021:2479
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update
NooBaa: noobaa-operator leaking RPC AuthToken into log files
[ "cpe:/a:redhat:openshift_container_storage:4.6::el8" ]
null
8.8
null
null
RHSA-2009:1670
Red Hat Security Advisory: kernel security and bug fix update
kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket kernel: nfsv4: kernel panic in nfs4_proc_lock()
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:0663
Red Hat Security Advisory: samba security update
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
9.9
null
null
RHSA-2017:0156
Red Hat Security Advisory: openstack-cinder security update
openstack-nova/glance/cinder: Malicious image may exhaust resources
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
5.3
null
RHSA-2017:0346
Red Hat Security Advisory: kernel security and bug fix update
kernel: dccp: crash while sending ipv6 reset packet kernel: use after free in dccp protocol
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
7.8
null
RHSA-2022:6963
Red Hat Security Advisory: nodejs security update
nodejs: weak randomness in WebCrypto keygen nodejs: HTTP Request Smuggling due to incorrect parsing of header fields
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2018:2818
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Function signature mismatch in WebAssembly chromium-browser: URL Spoofing in Omnibox
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
5.3
null
RHSA-2018:2309
Red Hat Security Advisory: kernel security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
5.6
null
RHSA-2020:4949
Red Hat Security Advisory: freetype security update
freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
8.6
null
null
RHSA-2019:0790
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2016:2115
Red Hat Security Advisory: openstack-manila-ui security update
openstack-manila-ui: persistent XSS in metadata field
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
4.1
null
RHSA-2022:7330
Red Hat Security Advisory: kpatch-patch security update
kernel: posix cpu timer use-after-free may lead to local privilege escalation
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2019:3278
Red Hat Security Advisory: sudo security update
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
7
null
RHSA-2022:7056
Red Hat Security Advisory: samba security, bug fix and enhancement update
samba: server memory information leak via SMB1
[ "cpe:/a:redhat:storage:3.5:samba:el8" ]
null
4.3
null
null
RHSA-2016:1547
Red Hat Security Advisory: libtiff security update
libtiff: out-of-bounds read with malformed TIFF image in multiple tools libtiff: out-of-bounds read/write with malformed TIFF image in tiff2pdf libtiff: divide by zero in the tiffdither tool libtiff: Out-of-bounds reads followed by a crash in bmp2tiff libtiff: use of uninitialized memory in putcontig8bitYCbCr21tile and NeXTDecode libtiff: use of uninitialized memory in NeXTDecode libtiff: Invalid-write in _TIFFVGetField() when parsing some extension tags libtiff: Out-of-bounds read in tif_getimage.c libtiff: OOB read in bmp2tiff libtiff: Out-of-bounds when reading CIE Lab image format files libtiff: invalid assertion libtiff: invalid assertion libtiff: invalid assertion libtiff: out-of-bound write in NeXTDecode() libtiff: out-of-bounds write in _TIFFVGetField function libtiff: out-of-bounds write in the tiff2rgba tool libtiff: out-of-bounds write in horizontalDifference8() libtiff: out-of-bounds write in loadImage() function libtiff: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.3
null
RHSA-2023:4961
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter Kernel: bluetooth: Unauthorized management command execution kernel: OOB access in the Linux kernel's XFS subsystem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/a:redhat:rhel_e4s:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
7.8
null
null
RHSA-2020:4628
Red Hat Security Advisory: libreoffice security, bug fix, and enhancement update
libreoffice: 'stealth mode' remote resource restrictions bypass libreoffice: forms allowed to be submitted to any URI could result in local file overwrite
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
RHSA-2021:1686
Red Hat Security Advisory: wpa_supplicant security, bug fix, and enhancement update
wpa_supplicant: P2P group information processing vulnerability
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2018:3519
Red Hat Security Advisory: Red Hat JBoss SOA Platform security update
RichFaces: Expression Language injection via UserResource allows for unauthenticated remote code execution
[ "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3" ]
null
null
9.8
null
RHSA-2024:1566
Red Hat Security Advisory: Red Hat build of MicroShift 4.14.19 security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2020:0720
Red Hat Security Advisory: python-waitress security update
waitress: HTTP request smuggling through LF vs CRLF handling waitress: HTTP request smuggling through invalid Transfer-Encoding waitress: HTTP Request Smuggling through Invalid whitespace characters in headers
[ "cpe:/a:redhat:openstack:15::el8" ]
null
8.2
null
null
RHSA-2021:1030
Red Hat Security Advisory: tomcat security update
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
4.3
null
null
RHSA-2023:4697
Red Hat Security Advisory: kernel security update
kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
7.8
null
null
RHSA-2018:1446
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Heap buffer overflow in PDFium chromium-browser: Privilege Escalation in extensions chromium-browser: Type confusion in V8
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2014:1938
Red Hat Security Advisory: openstack-neutron security and bug fix update
openstack-neutron: DoS via maliciously crafted dns_nameservers
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2023:0074
Red Hat Security Advisory: RHV 4.4 SP1 [ovirt-4.5.3-3] security update
isomorphic-git: Directory traversal via a crafted repository mina-sshd: Java unsafe deserialization vulnerability
[ "cpe:/a:redhat:rhev_manager:4.4:el8", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
9.8
null
null
RHSA-2024:0026
Red Hat Security Advisory: firefox security update
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.1
null
null
RHSA-2019:1167
Red Hat Security Advisory: kernel security and bug fix update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) kernel: use-after-free and OOPS in drivers/char/ipmi/ipmi_msghandler.c hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
3.8
null
RHSA-2006:0617
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHEA-2019:4262
Red Hat Enhancement Advisory: webkit2gtk3 enhancement update
webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2009:0362
Red Hat Security Advisory: NetworkManager security update
NetworkManager: GetSecrets disclosure
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:0302
Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.0 for RHEL 9:security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:kube_descheduler_operator:5.0::el9" ]
null
7.5
null
null
RHSA-2020:3133
Red Hat Security Advisory: Red Hat AMQ Broker 7.4.4 release and security update
springframework: DoS Attack via Range Requests apache-commons-configuration: uncontrolled class instantiation when loading YAML files broker: resetUsers operation stores password in plain text netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
[ "cpe:/a:redhat:amq_broker:7" ]
null
7.5
3.1
null
RHSA-2005:413
Red Hat Security Advisory: ImageMagick security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2012:1438
Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 End of Life Extension
This is the Red Hat Enterprise Virtualization 2 End Of Life Extension notification.
[]
null
null
null
null
RHBA-2006:0294
Red Hat Bug Fix Advisory: perl bug fix update
leaks file existance information
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:4182
Red Hat Security Advisory: kernel security and bug fix update
kernel: Count overflow in FUSE request leading to use-after-free issues.
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2015:0938
Red Hat Security Advisory: openstack-glance security and bug fix update
openstack-glance: potential resource exhaustion and denial of service using images manipulation API openstack-glance: potential resource exhaustion and denial of service using images manipulation API
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2005:864
Red Hat Security Advisory: udev security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2007:0890
Red Hat Security Advisory: php security update
gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG php chunk_split integer overflow php cross-site cookie insertion php multiple integer overflows in gd php floating point exception inside wordwrap php money_format format string issue php malformed cookie handling
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:2870
Red Hat Security Advisory: freeradius:3.0 security update
freeradius: Information leakage in EAP-PWD freeradius: Crash on unknown option in EAP-SIM freeradius: Crash on invalid abinary data
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2025:2864
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: out-of-bounds write vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2019:1171
Red Hat Security Advisory: kernel security and bug fix update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
3.8
null
RHSA-2021:2380
Red Hat Security Advisory: servicemesh-operator security update
servicemesh-operator: NetworkPolicy resources incorrectly specify ports for ingress resources
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
9.8
null
null
RHSA-2024:11232
Red Hat Security Advisory: unbound:1.16.2 security update
unbound: Unbounded name compression could lead to Denial of Service
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
RHSA-2023:3140
Red Hat Security Advisory: firefox security update
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
null
null
RHSA-2024:8798
Red Hat Security Advisory: xorg-x11-server and xorg-x11-server-Xwayland security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
RHSA-2022:7444
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: off-path attacker may inject data or terminate victim's TCP session kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference kernel: use-after-free vulnerability in function sco_sock_sendmsg() kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c kernel: veth: ensure skb entering GRO are not cloned. kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB kernel: smb2_ioctl_query_info NULL pointer dereference kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback kernel: swiotlb information leak with DMA_FROM_DEVICE kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: race condition in snd_pcm_hw_free leading to use-after-free kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS kernel: buffer overflow in nft_set_desc_concat_parse() kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() kernel: LoadPin bypass via dm-verity table reload kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: use-after-free when psi trigger is destroyed while being polled kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats() kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c kernel: possible to use the debugger to write zero into a location of choice kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions kernel: memory leak in drivers/hid/hid-elo.c kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c kernel: use after free in SUNRPC subsystem kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c kernel: iwlwifi: mvm: check debugfs_dir ptr before use
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.5
null
null
RHSA-2021:4100
Red Hat Security Advisory: Red Hat Integration - Service Registry release and security update [2.0.2.GA]
apache-httpclient: incorrect handling of malformed authority component in request URIs resteasy: Error message exposes endpoint class information RESTEasy: PathParam in RESTEasy can lead to a reflected XSS attack
[ "cpe:/a:redhat:integration:1" ]
null
5.4
null
null
RHSA-2011:1350
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: tpm infoleaks kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls kernel: agp: insufficient page_count parameter checking in agp_allocate_memory() kernel: ecryptfs: mount source TOCTOU race kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls kernel: taskstats: duplicate entries in listener mode can lead to DoS kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions kernel: perf, x86: fix Intel fixed counters base initialization kernel: gro: only reset frag0 when skb can be pulled kernel: af_packet: infoleak kernel: perf: Fix software event overflow
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2020:3100
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
5.3
null
null
RHSA-2009:1619
Red Hat Security Advisory: dstat security update
dstat insecure module search path
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:3042
Red Hat Security Advisory: rust-toolset-1.52 and rust-toolset-1.52-rust security and enhancement update
rust: optimization for joining strings can cause uninitialized bytes to be exposed rust: heap-based buffer overflow in read_to_end() because it does not validate the return value from Read in an unsafe context rust: panic safety issue in Zip implementation rust: memory safety violation in Zip implementation for nested iter::Zips rust: memory safety violation in Zip implementation when next_back() and next() are used together rust: integer overflow in the Zip implementation can lead to a buffer overflow rust: double free in Vec::from_iter function if freeing the element panics
[ "cpe:/a:redhat:devtools:2021" ]
null
9.8
null
null
RHSA-2023:3323
Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update
golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:devtools:2023::el7" ]
null
7.3
null
null
RHSA-2020:4049
Red Hat Security Advisory: virt:rhel security update
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.1::crb" ]
null
5
null
null
RHSA-2019:2949
Red Hat Security Advisory: httpd24-httpd and httpd24-nghttp2 security update
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: request for large response leads to denial of service
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.5
null
RHSA-2022:7344
Red Hat Security Advisory: kpatch-patch security update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
RHSA-2023:0432
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update
QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
6.5
null
null
RHSA-2007:0871
Red Hat Security Advisory: tomcat security update
tomcat handling of cookies tomcat handling of cookie values tomcat host manager xss
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2003:033
Red Hat Security Advisory: tcpdump security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2013:1853
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.0 update
Tomcat/JBoss Web - Bypass of CSRF prevention filter jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name Java: XML signature spoofing
[ "cpe:/a:redhat:jboss_operations_network:3.2.0" ]
null
null
3.7
null
RHSA-2024:8856
Red Hat Security Advisory: kernel security update
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: gso: do not skip outer ip header in case of ipip and net_failover kernel: dmaengine: fix NULL pointer in channel unregistration function kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range kernel: netfilter: nft_set_pipapo: do not free live element kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump kernel: nouveau: lock the client object tree. kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: dma-direct: Leak pages on dma_set_decrypted() failure kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: of: module: add buffer overflow check in of_modalias() kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. kernel: net/mlx5e: Fix netif state handling kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type kernel: drm/i915/dpt: Make DPT object unshrinkable kernel: ipv6: prevent possible NULL deref in fib6_nh_init() kernel: tipc: force a dst refcount before doing decryption kernel: ACPICA: Revert &#34;ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.&#34; kernel: bpf: Fix overrunning reservations in ringbuf kernel: netfilter: nf_tables: prefer nft_chain_validate kernel: ibmvnic: Add tx check to prevent skb leak kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers kernel: drm/amdgpu: avoid using null object of framebuffer kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush kernel: USB: serial: mos7840: fix crash on resume kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error kernel: kobject_uevent: Fix OOB access within zap_modalias_env() kernel: dev/parport: fix the array out-of-bounds risk kernel: block: initialize integrity buffer to zero before writing it to media kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() kernel: memcg: protect concurrent access to mem_cgroup_idr kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). kernel: bonding: fix xfrm real_dev null pointer dereference kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok kernel: netfilter: flowtable: initialise extack before use kernel: ethtool: check device is present when getting link settings kernel: ELF: fix kernel.randomize_va_space double read kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.7
null
null