id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2015:0046
Red Hat Security Advisory: firefox security and bug fix update
Mozilla: Miscellaneous memory safety hazards (rv:31.4) (MFSA 2015-01) Mozilla: sendBeacon requests lack an Origin header (MFSA 2015-03) Mozilla: Cookie injection through Proxy Authenticate responses (MFSA 2015-04) Mozilla: Read-after-free in WebRTC (MFSA 2015-06)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:7329
Red Hat Security Advisory: lua security update
lua: heap buffer overflow in luaG_errormsg() in ldebug.c due to uncontrolled recursion in error handling
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
RHSA-2014:1098
Red Hat Security Advisory: devtoolset-2-httpcomponents-client security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix
[ "cpe:/a:redhat:developer_toolset:2.1::el6" ]
null
null
null
null
RHSA-2024:4457
Red Hat Security Advisory: openssh security update
openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7
null
null
RHSA-2010:0862
Red Hat Security Advisory: nss security update
firefox/nss: doesn't handle IP-based wildcards in X509 certificates safely
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:4325
Red Hat Security Advisory: lasso security and enhancement update
lasso: XML signature wrapping vulnerability when parsing SAML responses
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.8
null
null
RHSA-2023:4038
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2017:1488
Red Hat Security Advisory: kernel security and bug fix update
kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
2.9
null
RHSA-2021:2731
Red Hat Security Advisory: kpatch-patch security update
kernel: Use after free via PI futex state kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
[ "cpe:/o:redhat:rhel_e4s:7.6::server" ]
null
7.8
null
null
RHSA-2021:4677
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.2 security update on RHEL 8
undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
7.5
null
null
RHSA-2020:4055
Red Hat Security Advisory: qemu-kvm security update
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
5
null
null
RHSA-2012:1221
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: AWT hardening fixes (AWT, 7163201) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:2835
Red Hat Security Advisory: php security update
php: underflow in env_path_info in fpm_main.c
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
8.1
null
RHSA-2024:10133
Red Hat Security Advisory: rhc-worker-script security update
golang-fips: Golang FIPS zeroed buffer net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/o:redhat:rhel_els:7" ]
null
5.9
null
null
RHSA-2023:5259
Red Hat Security Advisory: mariadb:10.3 security, bug fix, and enhancement update
mariadb: segmentation fault via the component sub_select mariadb: server crash in JOIN_CACHE::free or in copy_fields mariadb: compress_write() fails to release mutex on failure mariadb: NULL pointer dereference in spider_db_mbase::print_warnings()
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2024:9573
Red Hat Security Advisory: libsoup security update
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names libsoup: infinite loop while reading websocket data
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2019:3759
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use-after-free in media chromium-browser: Buffer overrun in Blink chromium-browser: URL spoof in navigation chromium-browser: Privilege elevation in Installer chromium-browser: URL bar spoofing chromium-browser: CSP bypass chromium-browser: Extension permission bypass chromium-browser: Out-of-bounds read in PDFium chromium-browser: File storage disclosure chromium-browser: HTTP authentication spoof chromium-browser: File download protection bypass chromium-browser: File download protection bypass chromium-browser: Cross-context information leak chromium-browser: Cross-origin data leak chromium-browser: CSS injection chromium-browser: Address bar spoofing chromium-browser: Service worker state error chromium-browser: Notification obscured chromium-browser: IDN spoof chromium-browser: Notification obscured
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
RHSA-2024:1332
Red Hat Security Advisory: kernel-rt security update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: use-after-free in sch_qfq network scheduler kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
4.7
null
null
RHSA-2024:5394
Red Hat Security Advisory: thunderbird security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
6.1
null
null
RHSA-2024:10090
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
RHSA-2024:4439
Red Hat Security Advisory: dotnet6.0 security update
dotnet: DoS when parsing X.509 Content and ObjectIdentifiers
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
RHSA-2012:0350
Red Hat Security Advisory: kernel security and bug fix update
kernel: xfs: potential buffer overflow in xfs_readlink() kernel: crypto: ghash: null pointer deref if no key is set kernel: jbd/jbd2: invalid value of first log block leads to oops kernel: kvm: device assignment DoS kernel: send(m)msg: user pointer dereferences kernel: perf, powerpc: Handle events that raise an exception without overflowing kernel: kvm: pit timer with no irqchip crashes the system kernel: xfs heap overflow kernel: kvm: syscall instruction induced guest panic kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:3823
Red Hat Security Advisory: rpm-ostree security update
rpm-ostree: world-readable /etc/shadow file
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.2
null
null
RHSA-2018:1640
Red Hat Security Advisory: kernel security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
5.6
null
RHSA-2014:1653
Red Hat Security Advisory: openssl security update
Updated openssl packages that contain a backported patch to mitigate the CVE-2014-3566 issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security impact.
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:2286
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.7
null
RHSA-2020:0790
Red Hat Security Advisory: kernel security and bug fix update
kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
8
4
null
RHSA-2022:1728
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
RHSA-2022:8866
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-XStatic-Angular) security update
AngularJS: Prototype pollution in merge function could result in code injection
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2022:9075
Red Hat Security Advisory: thunderbird security update
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.1
null
null
RHSA-2023:7666
Red Hat Security Advisory: postgresql:12 security update
postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2025:0203
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2010:0046
Red Hat Security Advisory: kernel security and bug fix update
kernel: use flag in do_coredump() kernel: x86_64 32 bit process register leak kernel: gdth: Prevent negative offsets in ioctl kernel: qla2xxx NPIV vport management pseudofiles are world writable kernel: megaraid_sas permissions in sysfs kernel: megaraid_sas permissions in sysfs kernel: hfs buffer overflow kernel: fuse: prevent fuse_put_request on invalid pointer kernel: firewire: ohci: handle receive packets with a data length of zero kernel: create_elf_tables can leave urandom in a bad state kernel: emergency route cache flushing leads to node deadlock
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:2658
Red Hat Security Advisory: linuxptp security update
linuxptp: missing length check of forwarded messages
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2021:1846
Red Hat Security Advisory: idm:DL1 and idm:client security, bug fix, and enhancement update
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
null
null
RHSA-2024:4425
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 security update
OpenStack: malicious qcow2/vmdk images
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
8.8
null
null
RHBA-2020:4139
Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:service_mesh:1.0::el8" ]
null
7.5
null
null
RHSA-2022:1819
Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update
golang: Command-line arguments may overwrite global data golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) golang: debug/macho: invalid dynamic symbol table command can cause panic golang: archive/zip: Reader.Open panics on empty string golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.1
null
null
RHSA-2024:10844
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.8
null
null
RHBA-2019:2922
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2 Image Release Advisory
atomic-openshift: CSRF tokens not refreshing while user is logged in and are exposed in the URL
[ "cpe:/a:redhat:openshift:4.2::el7", "cpe:/a:redhat:openshift:4.2::el8" ]
null
null
4.2
null
RHSA-2012:0811
Red Hat Security Advisory: php-pecl-apc security, bug fix, and enhancement update
php-pecl-apc: potential XSS in apc.php
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:0945
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update on RHEL 6
keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
5.6
null
null
RHSA-2024:1545
Red Hat Security Advisory: dnsmasq security update
dnsmasq: Heap use after free in dhcp6_no_relay dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2019:3892
Red Hat Security Advisory: Red Hat Fuse 7.5.0 security update
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) infinispan: deserialization of data in XML and JSON transcoders hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file tomcat: Host name verification missing in WebSocket client jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis activemq: ActiveMQ Client Missing TLS Hostname Verification tika: Incomplete fix allows for XML entity expansion resulting in denial of service jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class retrofit: Directory traversal in RequestBuilder allows manipulation of resources zookeeper: Information disclosure in Apache ZooKeeper mesos: docker image code execution HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: flood using empty frames results in excessive resource consumption xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) syndesis: default CORS configuration is allow all netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
null
7.5
null
RHSA-2020:4944
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
null
null
RHSA-2024:7312
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
djangorestframework: Cross-site Scripting (XSS) via break_long_headers urllib3: proxy-authorization request header is not stripped during cross-origin redirects python-twisted: Reflected XSS via HTML Injection in Redirect Response
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9" ]
null
4.2
null
null
RHSA-2022:5556
Red Hat Security Advisory: Logging Subsystem 5.4.3 - Red Hat OpenShift security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:logging:5.4::el8" ]
null
7.5
null
null
RHSA-2015:2560
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.2.0 update
batik: XML External Entity (XXE) injection in SVG parsing jsoup: XSS vulnerability related to incomplete tags at EOF apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_bpms:6.2" ]
null
null
null
null
RHSA-2024:4326
Red Hat Security Advisory: Red Hat build of Quarkus 3.8.5 release and security update
org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class org.bouncycastle: Use of Incorrectly-Resolved Name or Reference
[ "cpe:/a:redhat:quarkus:3.8::el8" ]
null
5.3
null
null
RHSA-2012:0517
Red Hat Security Advisory: kernel security and bug fix update
kernel: ext4: ext4_ext_insert_extent() kernel oops
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
RHSA-2013:0709
Red Hat Security Advisory: openstack-nova security and bug fix update
nova: VNC proxy can connect to the wrong VM Nova: DoS by allocating all Fixed IPs
[ "cpe:/a:redhat:openstack:2::el6" ]
null
null
null
null
RHSA-2024:10219
Red Hat Security Advisory: perl-App-cpanminus:1.7044 security update
perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2017:2997
Red Hat Security Advisory: chromium-browser security update
chromium-browser: uxss with mhtml chromium-browser: heap overflow in skia chromium-browser: use after free in pdfium chromium-browser: use after free in pdfium chromium-browser: heap overflow in webgl chromium-browser: use after free in webaudio chromium-browser: heap overflow in libxml2 chromium-browser: out of bounds write in skia chromium-browser: incorrect stack manipulation in webassembly chromium-browser: out of bounds write in skia chromium-browser: ui spoofing in blink chromium-browser: content security bypass chromium-browser: out of bounds read in skia chromium-browser: url spoofing in omnibox chromium-browser: url spoofing in omnibox chromium-browser: extension limitation bypass in extensions chromium-browser: incorrect registry key handling in platformintegration chromium-browser: referrer leak in devtools chromium-browser: url spoofing in extensions ui chromium-browser: null pointer dereference in imagecapture
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
RHSA-2005:105
Red Hat Security Advisory: perl security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2007:0132
Red Hat Security Advisory: libXfont security update
Multiple font integer overflows (CVE-2007-1352) Multiple font integer overflows (CVE-2007-1352)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0386
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.5
null
null
RHSA-2022:8090
Red Hat Security Advisory: runc security update
runc: incorrect handling of inheritable capabilities
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.6
null
null
RHSA-2016:1002
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: incorrect banked access bounds checking in vga module
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
7.6
null
RHBA-2021:3396
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6.44 packages update
jenkins: improper permission checks allow canceling queue items and aborting builds jenkins: session fixation vulnerability
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
7.5
null
null
RHSA-2003:249
Red Hat Security Advisory: glibc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2007:0732
Red Hat Security Advisory: poppler security update
xpdf integer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:2867
Red Hat Security Advisory: postgresql-jdbc security update
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2014:1913
Red Hat Security Advisory: ruby193-ruby security update
ruby: off-by-one stack-based buffer overflow in the encodes() function ruby: REXML billion laughs attack via parameter entity expansion ruby: REXML incomplete fix for CVE-2014-8080
[ "cpe:/a:redhat:rhel_software_collections:1::el6", "cpe:/a:redhat:rhel_software_collections:1::el7" ]
null
null
null
null
RHSA-2013:0643
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB13-09) flash-plugin: multiple code execution flaws (APSB13-09) flash-plugin: multiple code execution flaws (APSB13-09) flash-plugin: multiple code execution flaws (APSB13-09)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2016:1346
Red Hat Security Advisory: Red Hat JBoss Data Virtualization security and bug fix update
JGroups: Authorization bypass
[ "cpe:/a:redhat:jboss_data_virtualization:6.2" ]
null
null
9.8
null
RHSA-2022:6024
Red Hat Security Advisory: New container image for Red Hat Ceph Storage 5.2 Security update
grafana: directory traversal vulnerability grafana: Forward OAuth Identity Token can allow users to access some data sources
[ "cpe:/a:redhat:ceph_storage:5.2::el8" ]
null
4.3
null
null
RHSA-2021:1125
Red Hat Security Advisory: virt:8.3 and virt-devel:8.3 security and bug fix update
qemu: out-of-bound heap buffer access via an interrupt ID field
[ "cpe:/a:redhat:advanced_virtualization:8.3::el8" ]
null
2.5
null
null
RHSA-2017:0172
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.4
EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7" ]
null
null
4.3
null
RHSA-2010:0109
Red Hat Security Advisory: mysql security update
mysql: DoS (crash) when comparing GIS items from subquery and when handling subqueires in WHERE and assigning a SELECT result to a @variable mysql: client SSL certificate verification flaw mysql: Incomplete fix for CVE-2008-2079 / CVE-2008-4098
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2017:3369
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
4.4
null
RHSA-2017:1209
Red Hat Security Advisory: rhev-hypervisor bug fix and enhancement update for RHEV 3.6.11
kernel: use after free in dccp protocol
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.8
null
RHSA-2017:2818
Red Hat Security Advisory: Red Hat Enterprise Virtualization 3.x - End Of Life Notice
This is the final notification for the End of Production Phase 2 of Red Hat Enterprise Virtualization 3.x.
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2006:0015
Red Hat Security Advisory: initscripts security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:4498
Red Hat Security Advisory: dbus security update
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.2
null
null
RHSA-2009:0225
Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 kernel security and bug fix update
kernel: Unix sockets kernel panic Linux Kernel 'atm module' Local Denial of Service kernel: fix inotify watch removal/umount races kernel: fix soft lockups/OOM issues with unix socket garbage collector
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:1679
Red Hat Security Advisory: Cryostat 2.1.0: new Cryostat on RHEL 8 container images
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:cryostat:2::el8" ]
null
8.6
null
null
RHSA-2003:289
Red Hat Security Advisory: XFree86 security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2003:398
Red Hat Security Advisory: : : : New rsync packages fix remote security vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2024:6016
Red Hat Security Advisory: OpenShift Container Platform 4.15.30 packages and security update
python-werkzeug: user may execute code on a developer's machine
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9", "cpe:/a:redhat:openshift_ironic:4.15::el9" ]
null
7.5
null
null
RHSA-2024:6657
Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update
netty-codec-http: Allocation of Resources Without Limits or Throttling
[ "cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8" ]
null
5.3
null
null
RHSA-2018:0044
Red Hat Security Advisory: redhat-virtualization-host security update
An update for redhat-virtualization-host is now available for RHEV 3.X Hypervisor and Agents for RHEL-7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2016:0780
Red Hat Security Advisory: ntp security and bug fix update
ntp: crash with crafted logconfig configuration command ntp: ntpd crash when processing config commands with statistics type ntp: infinite loop in sntp processing crafted packet ntp: incomplete checks in ntp_crypto.c ntp: incomplete checks in ntp_crypto.c ntp: slow memory leak in CRYPTO_ASSOC ntp: incomplete checks in ntp_crypto.c ntp: config command can be used to set the pidfile and drift file paths ntp: ntpq atoascii memory corruption vulnerability ntp: restriction list NULL pointer dereference ntp: stack exhaustion in recursive traversal of restriction list
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:6168
Red Hat Security Advisory: thunderbird security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
7.5
null
RHSA-2017:0190
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (MFSA 2017-01) Mozilla: Excessive JIT code allocation allows bypass of ASLR and DEP (MFSA 2017-02) Mozilla: Use-after-free in XSL (MFSA 2017-02) Mozilla: Pointer and frame data leakage of Javascript objects (MFSA 2017-02) Mozilla: Potential use-after-free during DOM manipulations (MFSA 2017-02) Mozilla: Location bar spoofing with unicode characters (MFSA 2017-02) Mozilla: WebExtensions can use data: protocol to affect other extensions (MFSA 2017-02) Mozilla: Insecure communication methods in Developer Tools JSON viewer (MFSA 2017-02) Mozilla: Use-after-free with Media Decoder (MFSA 2017-02)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2024:5438
Red Hat Security Advisory: OpenShift Container Platform 4.15.28 packages and security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
5.9
null
null
RHSA-2016:1814
Red Hat Security Advisory: kernel security and bug fix update
kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko kernel: challenge ACK counter information disclosure.
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
4.8
null
RHSA-2013:0552
Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 1-week EOL Notice
This is the 1-week notification of the End Of Life plans for Red Hat Enterprise Virtualization 2.
[]
null
null
null
null
RHSA-2020:1016
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: out of bound read in DVB connexant driver. kernel: Missing permissions check for request_key() destination allows local attackers to add keys to keyring without Write permission kernel: denial of service via ioctl call in network tun handling kernel: oob memory read in hso_probe in drivers/net/usb/hso.c kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: perf_event_open() and execve() race in setuid programs allows a data leak kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS kernel: brcmfmac frame validation bypass kernel: null-pointer dereference in hci_uart_set_flow_control Kernel: net: weak IP ID generation leads to remote device tracking Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: ASLR bypass for setuid binaries due to late install_exec_creds() kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service kernel: use-after-free in arch/x86/lib/insn-eval.c kernel: denial of service in arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c via sigreturn() system call kernel: integer overflow and OOB read in drivers/block/floppy.c kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure kernel: use-after-free in sound/core/init.c and sound/core/info.c kernel: Null pointer dereference in the sound/usb/line6/pcm.c kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: buffer-overflow hardening in WiFi beacon validation code. kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
4.7
5.5
null
RHSA-2023:3087
Red Hat Security Advisory: mysql:8.0 security, bug fix, and enhancement update
mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022) mysql: Server: Replication unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: DML unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: GIS unspecified vulnerability (CPU Jan 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.9
null
null
RHSA-2007:0731
Red Hat Security Advisory: tetex security update
xpdf integer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:4914
Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update
nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution nodejs: Prototype pollution via console.table properties
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.2
null
null
RHSA-2024:4871
Red Hat Security Advisory: Red Hat Service Interconnect security update
python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service skupper: potential authentication bypass to skupper console via forged cookies
[ "cpe:/a:redhat:service_interconnect:1::el9" ]
null
5.3
null
null
RHSA-2013:0570
Red Hat Security Advisory: Oracle Java SE 6 - notification of end of public updates
Oracle Java SE 6 will no longer receive updates after February 28, 2013. The java-1.6.0-sun packages on the Red Hat Enterprise Linux 5 and 6 Supplementary media and Supplementary Red Hat Network (RHN) channels are affected.
[]
null
null
null
null
RHSA-2015:0256
Red Hat Security Advisory: samba security update
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
[ "cpe:/a:redhat:storage:3:server:el6" ]
null
null
null
null
RHSA-2011:0390
Red Hat Security Advisory: rsync security update
rsync: Incremental file-list corruption due to temporary file_extra_cnt increments
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:8358
Red Hat Security Advisory: NetworkManager-libreswan security update
NetworkManager-libreswan: Local privilege escalation via leftupdown
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.8
null
null
RHSA-2013:1569
Red Hat Security Advisory: wireshark security, bug fix, and enhancement update
wireshark: Infinite and large loops in ANSI MAP, ASF, IEEE 802.11, IEEE 802.3, and LTP dissectors (wnpa-sec-2012-08) wireshark: Integer overflows in BACapp and Bluetooth HCI dissectors, leading to DoS (wnpa-sec-2012-08) wireshark: crash due to zero division in DCP ETSI dissector (wnpa-sec-2012-13) wireshark: DoS via excessive resource consumption in XTP dissector (wnpa-sec-2012-15) wireshark: DoS via excessive CPU consumption in AFP dissector (wnpa-sec-2012-17) wireshark: DoS via excessive CPU consumption in CTDB dissector (wnpa-sec-2012-23) wireshark: DoS via excessive system resource consumption in CIP dissector (wnpa-sec-2012-20) wireshark: crash in STUN dissector (wnpa-sec-2012-21) wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33) wireshark: DoS (crash) in the ISAKMP dissector (wnpa-sec-2012-35) wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36) wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37) wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38) wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33) wireshark: DoS (crash) in the ISAKMP dissector (wnpa-sec-2012-35) wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36) wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37) wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38) wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599) wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541) wireshark: Multiple Denial of Service flaws wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39) wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41) wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45) wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49) wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50) wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933) wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52) wireshark: DoS (NULL pointer dereference, crash) in the PROFINET Real-Time dissector (wnpa-sec-2013-53) wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2009:0271
Red Hat Security Advisory: gstreamer-plugins-good security update
gstreamer-plugins-good: heap-based buffer overflow while parsing malformed QuickTime media files via crafted Composition Time To Sample (aka ctts) atom data gstreamer-plugins-good: Array index error while parsing malformed QuickTime media files via crafted Sync Sample (aka stss) atom data gstreamer-plugins-good: heap-based buffer overflow while parsing malformed QuickTime media files via crafted Time-to-sample (stss) atom data
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2141
Red Hat Security Advisory: kde-workspace security and bug fix update
kde-workspace: Missing sanitization of notifications allows to leak client IP address via IMG element
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHBA-2015:0965
Red Hat Bug Fix Advisory: nss, nss-util, and nspr bug fix and enhancement update
nss: QuickDER decoder length issue
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null