id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2017:2569
Red Hat Security Advisory: 389-ds-base security and bug fix update
389-ds-base: Password brute-force possible for locked account due to different return codes
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHBA-2024:1136
Red Hat Bug Fix Advisory: podman bug fix update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2024:4646
Red Hat Security Advisory: qt5-qtbase security update
qtbase: qtbase: Delay any communication until encrypted() can be responded to
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.5
null
null
RHSA-2021:2866
Red Hat Security Advisory: RHV Engine and Host Common Packages security update [ovirt-4.4.7]
ansible: multiple modules expose secured values
[ "cpe:/a:redhat:rhev_manager:4.4:el8", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
5
null
null
RHSA-2020:5422
Red Hat Security Advisory: openssl security update
openssl: EDIPARTYNAME NULL pointer de-reference
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
5.9
null
null
RHSA-2012:0681
Red Hat Security Advisory: tomcat6 security and bug fix update
tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: password disclosure vulnerability tomcat: security manager restrictions bypass tomcat: authentication bypass and information disclosure tomcat: information disclosure due to improper response and request object recycling tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:1.0" ]
null
null
null
null
RHSA-2023:4949
Red Hat Security Advisory: firefox security update
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2018:0268
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.19 security update
artemis/hornetq: memory exhaustion via UDP and JGroups discovery tomcat: Remote Code Execution bypass for CVE-2017-12615 jboss-remoting: High CPU Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
4.3
null
RHSA-2017:3400
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update
log4j: Socket receiver deserialization vulnerability log4j: deserialization of untrusted data in SocketServer
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5" ]
null
9.8
8.1
null
RHSA-2023:7551
Red Hat Security Advisory: kernel-rt security update
kernel: use after free in nvmet_tcp_free_crypto in NVMe hw: amd: Cross-Process Information Leak
[ "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
6.5
null
null
RHSA-2018:2908
Red Hat Security Advisory: OpenShift Container Platform 3.9 security update
atomic-openshift: oc patch with json causes masterapi service crash kubernetes: authentication/authorization bypass in the handling of non-101 responses
[ "cpe:/a:redhat:openshift:3.9::el7" ]
null
null
9.8
null
RHSA-2024:4108
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly kernel: xen-netfront: Add missing skb_mark_for_recycle kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow kernel: smb: client: fix UAF in smb2_reconnect_server() kernel: net: ena: Fix incorrect descriptor free behavior kernel: net/mlx5: Properly link new fs rules into the tree kernel: octeontx2-af: avoid off-by-one read from userspace
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
4.4
null
null
RHSA-2018:1449
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.20 security update
Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
8.1
null
RHSA-2020:1828
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
2.9
null
RHSA-2015:1507
Red Hat Security Advisory: qemu-kvm security and bug fix update
qemu/kvm: i8254: out-of-bounds memory access in pit_ioport_read function qemu: ide: atapi: heap overflow during I/O buffer memory access
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2004:504
Red Hat Security Advisory: Updated Itanium kernel packages resolve security issues
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2023:0652
Red Hat Security Advisory: OpenShift Container Platform 4.11.27 security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS prometheus/client_golang: Denial of service using InstrumentHandlerCounter
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2021:5141
Red Hat Security Advisory: OpenShift Container Platform 4.6.52 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
8.1
null
null
RHSA-2023:7243
Red Hat Security Advisory: kernel security update
kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.8
null
null
RHSA-2013:0737
Red Hat Security Advisory: subversion security update
(mod_dav_svn): DoS (excessive memory use) when large number of properties are set or deleted (mod_dav_svn): DoS (crash) via LOCK requests against an activity URL (mod_dav_svn): DoS (crash) via LOCK requests against a non-existent URL (mod_dav_svn): DoS (crash) via PROPFIND request made against activity URLs
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:1213
Red Hat Security Advisory: libldb security update
samba: Out of bounds read in AD DC LDAP server
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.1
null
null
RHSA-2024:2941
Red Hat Security Advisory: RHACS 4.4 enhancement and security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled webpack-dev-middleware: lack of URL validation may lead to file leak
[ "cpe:/a:redhat:advanced_cluster_security:4.4::el8" ]
null
7.4
null
null
RHSA-2016:2822
Red Hat Security Advisory: Red Hat JBoss BPM Suite security update
XStream: enabled processing of external entities Workbench: Path traversal vulnerability Stored XSS in business process editor
[ "cpe:/a:redhat:jboss_bpms:6.3" ]
null
null
5.4
null
RHSA-2021:5132
Red Hat Security Advisory: Red Hat Data Grid 8.2.2 security update
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
[ "cpe:/a:redhat:jboss_data_grid:8.2" ]
null
9.8
null
null
RHSA-2024:10274
Red Hat Security Advisory: kernel security update
kernel: bpf: Fix overrunning reservations in ringbuf kernel: USB: serial: mos7840: fix crash on resume kernel: cxl/port: Fix use-after-free, permit out-of-order decoder shutdown
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.7
null
null
RHSA-2020:0952
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update
undertow: AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_single_sign_on:7.3" ]
null
7.6
null
null
RHSA-2008:0151
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP02 security update
OpenOffice.org-base allows Denial-of-Service and command injection Absolute path traversal Apache Tomcat WEBDAV JFreeChart: XSS vulnerabilities in the image map feature EJBQL injection via 'order' parameter Tomcat information disclosure vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" ]
null
null
null
null
RHSA-2002:125
Red Hat Security Advisory: mailman security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2023:7055
Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update
webkitgtk: Memory corruption issue when processing web content webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. webkitgtk: A website may able to track visited websites in private browsing webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: Visiting a malicious website may lead to address bar spoofing. webkitgtk: Same Origin Policy bypass via crafted web content webkitgtk: Website may be able to track sensitive user information webkitgtk: use after free vulnerability webkitgtk: content security policy blacklist failure webkitgtk: arbitrary code execution webkitgtk: disclose sensitive information webkitgtk: bypass Same Origin Policy webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: track sensitive user information webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary javascript code execution webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code webkitgtk: Processing web content may lead to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2021:2728
Red Hat Security Advisory: kernel security update
kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.8
null
null
RHSA-2002:242
Red Hat Security Advisory: : Updated kerberos packages available
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2015:1385
Red Hat Security Advisory: net-snmp security and bug fix update
net-snmp: snmptrapd crash when handling an SNMP trap containing a ifMtu with a NULL type
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2009:1646
Red Hat Security Advisory: libtool security update
libtool: libltdl may load and execute code from a library in the current directory
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:8614
Red Hat Security Advisory: kernel-rt security update
kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field kernel: ovl: fix use after free in struct ovl_aio_req kernel: mm/sparsemem: fix race in accessing memory_section->usage hw: cpu: intel: Native Branch History Injection (BHI) kernel: blk-mq: fix IO hang from sbitmap wakeup race kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: mptcp: fix data re-injection from stale subflow kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del kernel: mptcp: ensure snd_nxt is properly initialized on connect kernel: ipv6: prevent possible NULL dereference in rt6_probe() kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() kernel: filelock: fix potential use-after-free in posix_lock_inode kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
4.4
null
null
RHSA-2006:0682
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2014:0580
Red Hat Security Advisory: openstack-keystone security and bug fix update
openstack-keystone: trustee token revocation does not work with memcache backend
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2019:1297
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang httpd: privilege escalation from modules scripts
[ "cpe:/a:redhat:jboss_core_services:1::el6", "cpe:/a:redhat:jboss_core_services:1::el7" ]
null
null
8.8
null
RHSA-2024:6843
Red Hat Security Advisory: pcp security update
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
4.4
null
null
RHSA-2016:0429
Red Hat Security Advisory: chromium-browser security update
chromium-browser: type confusion in Blink chromium-browser: use-after-free in Blink chromium-browser: out-of-bounds write in PDFium
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:4160
Red Hat Security Advisory: java-1.8.0-ibm security update
JDK: unsafe deserialization flaw in the Object Request Broker (ORB) OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
3.7
null
null
RHSA-2024:2438
Red Hat Security Advisory: pam security update
pam: allowing unprivileged user to block another user namespace
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2020:0526
Red Hat Security Advisory: OpenShift Container Platform 4.2.20 jenkins-slave-base-rhel7-container security update
openshift/jenkins: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
7
null
null
RHSA-2025:3260
Red Hat Security Advisory: kernel security update
kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
null
null
RHSA-2018:2608
Red Hat Security Advisory: Red Hat Gluster Storage security, bug fix, and enhancement update
glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c glusterfs: I/O to arbitrary devices on storage server glusterfs: Device files can be created in arbitrary locations glusterfs: File status information leak and denial of service glusterfs: Improper resolution of symlinks allows for privilege escalation glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code glusterfs: Files can be renamed outside volume
[ "cpe:/a:redhat:storage:3.4:server:el6", "cpe:/a:redhat:storage:3:client:el6" ]
null
null
6.5
null
RHSA-2018:0105
Red Hat Security Advisory: qemu-kvm security update
An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
null
null
RHSA-2022:2213
Red Hat Security Advisory: zlib security update
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.2
null
null
RHSA-2018:2279
Red Hat Security Advisory: Red Hat Single Sign-On 7.2 security update
apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)
[ "cpe:/a:redhat:jboss_single_sign_on:7.2" ]
null
null
7.6
null
RHSA-2022:8162
Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update
389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database 389-ds-base: SIGSEGV in sync_repl
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2014:1004
Red Hat Security Advisory: yum-updatesd security update
yum: yum-cron installs unsigned packages
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2017:0536
Red Hat Security Advisory: policycoreutils security update
policycoreutils: SELinux sandbox escape via TIOCSTI ioctl
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
8.6
null
RHSA-2024:11486
Red Hat Security Advisory: kernel security update
kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE kernel: bpf: Fix a kernel verifier crash in stacksafe() kernel: nfsd: ensure that nfsd4_fattr_args.context is zeroed out kernel: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() kernel: bpf: Fix a sdiv overflow issue kernel: arm64: probes: Remove broken LDR (literal) uprobe support kernel: xfrm: fix one more kernel-infoleak in algo dumping kernel: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory kernel: Bluetooth: ISO: Fix UAF on iso_sock_timeout kernel: Bluetooth: SCO: Fix UAF on sco_sock_timeout kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset kernel: Bluetooth: bnep: fix wild-memory-access in proto_unregister kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE kernel: sched/numa: Fix the potential null pointer dereference in task_numa_work() kernel: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs kernel: bpf: Fix out-of-bounds write in trie_get_next_key()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.7
null
null
RHSA-2022:6537
Red Hat Security Advisory: Moderate:OpenShift Container Platform 4.11.5 security and extras update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS prometheus/client_golang: Denial of service using InstrumentHandlerCounter
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2022:1643
Red Hat Security Advisory: xmlrpc-c security update
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
9.8
null
null
RHSA-2009:0258
Red Hat Security Advisory: thunderbird security update
Firefox layout crashes with evidence of memory corruption Firefox javascript crashes with evidence of memory corruption Firefox local file stealing with SessionStore Firefox 2 and 3 - Layout engine crashes Firefox 2 and 3 crashes in the JavaScript engine Firefox XUL Linked Clones Double Free Vulnerability Firefox XML data theft via RDFXMLDataSource and cross-domain redirect
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2023:5201
Red Hat Security Advisory: thunderbird security update
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
0
null
null
RHSA-2025:0315
Red Hat Security Advisory: raptor2 security update
raptor: integer underflow when normalizing a URI with the turtle parser
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.3
null
null
RHSA-2025:3055
Red Hat Security Advisory: OpenShift Container Platform 4.15.48 security update
kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
7.8
null
null
RHSA-2006:0201
Red Hat Security Advisory: xpdf security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHEA-2019:4179
Red Hat Enhancement Advisory: new packages: go-toolset-1.12
golang: malformed hosts in URLs leads to authorization bypass
[ "cpe:/a:redhat:devtools:2019" ]
null
null
7.5
null
RHSA-2015:2515
Red Hat Security Advisory: git19-git security update
git: arbitrary code execution via crafted URLs
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2021:0150
Red Hat Security Advisory: dnsmasq security update
dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2012:1259
Red Hat Security Advisory: quagga security update
(ospf6d): Stack-based buffer overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA (ospf6d): Denial of service by decoding malformed Database Description packet headers (ospfd): Denial of service by decoding too short Hello packet or Hello packet with invalid OSPFv2 header type (ospfd): Denial of service by decoding Link State Update LSAs of unknown type (bgpd): Heap-based buffer overflow by decoding BGP UPDATE message with unknown AS_PATH attributes (ospfd): Assertion failure due improper length check for a received LS-Update OSPF packet (ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structures (bgpd): Assertion failure by processing malformed AS4 capability in BGP OPEN message (bgpd): Assertion failure by processing BGP OPEN message with malformed ORF capability TLV (VU#962587)
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:1679
Red Hat Security Advisory: bash security and bug fix update
bash: when effective UID is not equal to its real UID the saved UID is not dropped
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2024:2912
Red Hat Security Advisory: thunderbird security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
6.1
null
null
RHSA-2011:0490
Red Hat Security Advisory: java-1.4.2-ibm security update
JDK unspecified vulnerability in Deployment component OpenJDK DNS cache poisoning by untrusted applets (6981922) JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Sound component OpenJDK Swing timer-based security manager bypass (6907662) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2024:8118
Red Hat Security Advisory: OpenJDK 8u432 Security Update for Portable Linux Builds
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
4.8
null
null
RHSA-2020:1344
Red Hat Security Advisory: virt:rhel security update
QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
5.6
null
null
RHSA-2011:0677
Red Hat Security Advisory: openssl security, bug fix, and enhancement update
openssl: OCSP stapling vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:4099
Red Hat Security Advisory: OpenShift Container Platform 4.2 csi-provisioner-container security update
kubernetes-csi: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
null
4.8
null
RHSA-2018:1646
Red Hat Security Advisory: qemu-kvm-rhev security update
hw: cpu: speculative store bypass QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
5.5
null
RHSA-2020:0178
Red Hat Security Advisory: kernel security and enhancement update
kernel: use-after-free in fs/xfs/xfs_super.c
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
7.8
null
RHSA-2023:7015
Red Hat Security Advisory: wireshark security update
wireshark: RTPS dissector crash wireshark: VMS TCPIPtrace file parser crash wireshark: NetScaler file parser crash wireshark: XRA dissector infinite loop
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.5
null
null
RHSA-2025:1516
Red Hat Security Advisory: libxml2 security update
libxml: use-after-free in xmlXIncludeAddNode
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.9
null
null
RHSA-2012:1014
Red Hat Security Advisory: jbossas security update
JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.1" ]
null
null
null
null
RHSA-2023:2283
Red Hat Security Advisory: skopeo security and bug fix update
golang: crypto/tls: session tickets lack random ticket_age_add golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2022:6065
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (collectd-libpod-stats) security update
golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2020:5139
Red Hat Security Advisory: firefox security update
Mozilla: Write side effects in MCallGetProperty opcode not accounted for
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
null
8.8
null
RHSA-2021:3176
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
2.8
6.5
null
RHSA-2024:0609
Red Hat Security Advisory: thunderbird security update
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2020:3877
Red Hat Security Advisory: audiofile security update
audiofile: NULL pointer dereference in ModuleState::setup() in modules/ModuleState.cpp allows for denial of service via crafted file audiofile: Heap-based buffer overflow in Expand3To4Module::run() when running sfconvert
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7
null
RHSA-2012:0096
Red Hat Security Advisory: ghostscript security update
ghostscript: glyph data access improper input validation ghostscript: CWD included in the default library search path
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:1434
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform update
tomcat: URL Normalization issue JGroups: Authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
9.8
null
RHSA-2023:1467
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: tun: avoid double free in tun_free_netdev
[ "cpe:/a:redhat:rhel_eus:9.0::nfv", "cpe:/a:redhat:rhel_eus:9.0::realtime" ]
null
7.8
null
null
RHSA-2023:7410
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7
null
null
RHSA-2015:1525
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.3 update
JON: Cross Site scripting possible on the JBoss ON 404 error page
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
null
null
RHSA-2024:0346
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: potential slab-out-of-bound access due to integer underflow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7
null
null
RHSA-2024:0146
Red Hat Security Advisory: libarchive security update
libarchive: NULL pointer dereference in archive_write.c
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.9
null
null
RHSA-2009:1530
Red Hat Security Advisory: firefox security update
array index error in dtoa implementation of many products firefox: (rejected CVE-2009-1563) Firefox heap buffer overflow in string to number conversion Firefox: Predictable /tmp pathname use Firefox form history vulnerable to stealing Firefox crash in proxy auto-configuration regexp parsing Firefox heap buffer overflow in GIF color map parser XPCVariant:: VariantDataToJS() Firefox cross-origin data theft through document.getSelection() Firefox download filename spoofing with RTL override Firefox crashes with evidence of memory corruption Firefox crashes with evidence of memory corruption Firefox integer underflow in FTP directory list parser
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:3299
Red Hat Security Advisory: jenkins and jenkins-2-plugins security update
google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization kubernetes-client: Insecure deserialization in unmarshalYaml method jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode springframework: Authorization Bypass in RegexRequestMatcher com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin FileUpload: FileUpload DoS with excessive parts jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin Jenkins: Denial of Service attack Jenkins: Denial of Service attack Jenkins: Workspace temporary directories accessible through directory browser Jenkins: Information disclosure through error stack traces related to agents
[ "cpe:/a:redhat:ocp_tools:4.13::el8" ]
null
5.3
null
null
RHSA-2012:0079
Red Hat Security Advisory: firefox security update
Mozilla: child nodes from nsDOMAttribute still accessible after removal of nodes (MFSA 2012-04) Mozilla: Same-origin bypass using IPv6-like hostname syntax (MFSA 2012-02) Mozilla: memory safety hazards in 10.0/1.9.2.26 (MFSA 2012-01) Firefox: Ogg Vorbis Decoding Memory Corruption (MFSA 2012-07) Mozilla: Crash when rendering SVG+XSLT (MFSA 2012-08)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:0590
Red Hat Security Advisory: ansible security and bug fix update
Ansible: Information leak in "user" module ansible: Information disclosure in vvv+ mode with no_log on
[ "cpe:/a:redhat:openstack:14::el7" ]
null
5.3
7.8
null
RHSA-2020:4315
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2023:7243
Red Hat Security Advisory: kernel security update
kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.8
null
null
RHSA-2024:1269
Red Hat Security Advisory: kernel-rt security update
kernel: nfp: use-after-free in area_cache_get() kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: net/sched: sch_hfsc UAF kernel: use-after-free in sch_qfq network scheduler kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: inactive elements in nft_pipapo_walk kernel: out-of-bounds write in qfq_change_class function kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
[ "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/a:redhat:rhel_tus:8.2::realtime" ]
null
7
null
null
RHSA-2017:2258
Red Hat Security Advisory: gtk-vnc security, bug fix, and enhancement update
gtk-vnc: Improper check of framebuffer boundaries when processing a tile gtk-vnc: Integer overflow when processing SetColorMapEntries
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.1
null
RHSA-2023:0335
Red Hat Security Advisory: dbus security update
dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
RHSA-2009:0011
Red Hat Security Advisory: lcms security update
lcms: insufficient input validation in ReadEmbeddedTextTag lcms: unsigned -> signed integer cast issue in cmsAllocGamma
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2004:585
Red Hat Security Advisory: xchat security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:3962
Red Hat Security Advisory: flatpak security update
flatpak: sandbox escape via RequestBackground portal
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
8.4
null
null
RHSA-2019:4191
Red Hat Security Advisory: sudo security update
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
[ "cpe:/o:redhat:rhel_els:5" ]
null
null
7
null