id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:2852
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.0 for Quarkus 3.2 update is now available (RHBQ 3.2.12.GA)
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
[ "cpe:/a:redhat:camel_quarkus:3" ]
null
7.4
null
null
RHSA-2018:0299
Red Hat Security Advisory: collectd security update
collectd: double free in csnmp_read_table function in snmp.c
[ "cpe:/a:redhat:openstack-optools:11::el7" ]
null
null
5.6
null
RHSA-2007:0245
Red Hat Security Advisory: cpio security and bug fix update
cpio large filesize buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:3586
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
7.8
null
RHSA-2021:3495
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2021:0053
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2023:3550
Red Hat Security Advisory: python security update
python: urllib.parse url blocklisting bypass
[ "cpe:/o:redhat:rhel_els:6" ]
null
7.5
null
null
RHSA-2019:1579
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients libvirt: arbitrary command execution via virConnectGetDomainCapabilities API libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2023:5628
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: save/restore speculative MSRs during S3 suspend/resume kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.8
null
null
RHSA-2007:0640
Red Hat Security Advisory: conga security, bug fix, and enhancement update
ricci is vulnerable to a connect DoS attack
[ "cpe:/a:redhat:rhel_cluster:5" ]
null
null
null
null
RHSA-2023:7876
Red Hat Security Advisory: opensc security update
OpenSC: Potential PIN bypass when card tracks its own login state OpenSC: multiple memory issues with pkcs15-init (enrollment tool)
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.4
null
null
RHSA-2025:2670
Red Hat Security Advisory: .NET 8.0 security, bug fix, and enhancement update
dotnet: Privilege Escalation Vulnerability in .NET SignInManager.RefreshSignInAsync Method
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
RHSA-2017:2840
Red Hat Security Advisory: dnsmasq security update
dnsmasq: heap overflow in the code responsible for building DNS replies
[ "cpe:/o:redhat:rhel_els:5" ]
null
null
9.8
null
RHSA-2005:378
Red Hat Security Advisory: cpio security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:1154
Red Hat Security Advisory: OpenShift Container Platform 4.10.54 security update
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
5.3
null
null
RHSA-2016:2045
Red Hat Security Advisory: tomcat6 security and bug fix update
tomcat: URL Normalization issue tomcat: directory disclosure tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms Tomcat: CGI sets environmental variable based on user supplied Proxy request header tomcat: tomcat writable config files allow privilege escalation
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2013:1044
Red Hat Security Advisory: jboss-seam2 security update
RichFaces: Remote code execution due to insecure deserialization
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHSA-2024:8679
Red Hat Security Advisory: podman security update
buildah: Buildah allows arbitrary directory mount
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2013:1263
Red Hat Security Advisory: Red Hat Storage Console 2.1 security update
RESTEasy: XML eXternal Entity (XXE) flaw
[ "cpe:/a:redhat:storage:2.1:console:el6" ]
null
null
null
null
RHSA-2018:2161
Red Hat Security Advisory: kernel security and bug fix update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.6
null
RHSA-2020:3581
Red Hat Security Advisory: git security update
git: Crafted URL containing new lines can cause credential leak git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.5
null
null
RHSA-2024:0040
Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security and extras update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON cloudevents/sdk-go: usage of WithRoundTripper to create a Client leaks credentials
[ "cpe:/a:redhat:openshift:4.16::el8", "cpe:/a:redhat:openshift:4.16::el9" ]
null
6.5
null
null
RHSA-2023:6363
Red Hat Security Advisory: skopeo security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2008:0161
Red Hat Security Advisory: cups security update
cups: memory leak handling IPP browse requests cups: dereference of free'd memory handling IPP browse requests
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:1134
Red Hat Security Advisory: tomcat security update
tomcat: HTTP request smuggling via malformed trailer headers
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2014:0455
Red Hat Security Advisory: openstack-glance security update
openstack-glance: remote code execution in Glance Sheepdog backend
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2023:6316
Red Hat Security Advisory: pcs security, bug fix, and enhancement update
decode-uri-component: improper input validation resulting in DoS
[ "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
7.5
null
null
RHSA-2022:0002
Red Hat Security Advisory: grafana security update
golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.5
null
null
RHSA-2024:8339
Red Hat Security Advisory: Red Hat Integration Camel K 1.10.8 release and security update.
Camel-CassandraQL: Unsafe Deserialization from CassandraAggregationRepository cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
[ "cpe:/a:redhat:camel_k:1.10.8" ]
null
8.8
null
null
RHSA-2014:0702
Red Hat Security Advisory: mariadb security update
mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.9
null
RHSA-2020:5040
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.4
null
null
RHSA-2014:0172
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 update
Java: Java XML Signature DoS Attack Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.2.1" ]
null
null
null
null
RHSA-2011:0210
Red Hat Security Advisory: jbossweb security update
JDK Double.parseDouble Denial-Of-Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5" ]
null
null
null
null
RHSA-2009:1243
Red Hat Security Advisory: Red Hat Enterprise Linux 5.4 kernel security and bug fix update
kernel: ext4: ext4_group_add() missing initialisation issue kernel: ext4: make_indexed_dir() missing validation kernel: ext4: ext4_isize() denial of service kernel: ext4: ext4_fill_super() missing validation issue kernel: information leak in sigaltstack kernel: execve: must clear current->clear_child_tid
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:0628
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1 security update
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
8.1
null
RHSA-2024:3139
Red Hat Security Advisory: squashfs-tools security update
squashfs-tools: unvalidated filepaths allow writing outside of destination squashfs-tools: possible Directory Traversal via symbolic link
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.1
null
null
RHSA-2013:0701
Red Hat Security Advisory: ruby193-ruby, rubygem-json and rubygem-rdoc security update
rubygem-rdoc: Cross-site scripting in the documentation created by Darkfish Rdoc HTML generator / template rubygem-json: Denial of Service and SQL Injection
[ "cpe:/a:redhat:openshift:1::el6" ]
null
null
null
null
RHSA-2013:0840
Red Hat Security Advisory: kernel security update
kernel: perf_swevent_enabled array out-of-bound access
[ "cpe:/o:redhat:rhel_eus:6.2::server" ]
null
null
null
null
RHSA-2020:1378
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
6.8
null
null
RHSA-2016:1301
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: SCTP denial of service during timeout kernel-rt: Sending SysRq command via ICMP echo request kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7.8
null
RHSA-2011:0462
Red Hat Security Advisory: jboss-seam security update
JBoss Seam privilege escalation caused by EL interpolation in FacesMessages
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3", "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
RHSA-2024:10176
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.9 Update
org.keycloak/keycloak-quarkus-server: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability keycloak-core: mTLS passthrough org.keycloak:keycloak-services: Keycloak Denial of Service org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process keycloak-quarkus-server: Keycloak path trasversal
[ "cpe:/a:redhat:build_keycloak:24" ]
null
5.9
2.7
null
RHSA-2021:3157
Red Hat Security Advisory: firefox security update
Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
7.5
null
RHSA-2022:0894
Red Hat Security Advisory: vim security update
vim: Heap-based buffer overflow in block_insert() in src/ops.c vim: Heap-based buffer overflow in utf_head_off() in mbyte.c vim: Heap-based buffer overflow in init_ccline() in ex_getln.c vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c vim: Use after free in src/ex_cmds.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.3
null
null
RHSA-2022:2205
Red Hat Security Advisory: OpenShift Container Platform 4.9.33 packages and security update
credentials: Stored XSS vulnerabilities in jenkins plugin Jira: Stored XSS vulnerabilities in Jenkins Jira plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin Libraries: Untrusted users can modify some Pipeline libraries in Pipeline Shared Groovy Libraries Plugin
[ "cpe:/a:redhat:openshift:4.9::el7", "cpe:/a:redhat:openshift:4.9::el8" ]
null
7.3
null
null
RHSA-2023:1017
Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (openstack-glance) security update
openstack: Arbitrary file access through custom VMDK flat descriptor
[ "cpe:/a:redhat:openstack:17.0::el9" ]
null
7.7
null
null
RHSA-2020:5201
Red Hat Security Advisory: net-snmp security and bug fix update
net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream", "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
8.8
null
null
RHSA-2021:2763
Red Hat Security Advisory: OpenShift Container Platform 4.7.21 security and bug fix update
An update is now available for Red Hat OpenShift Container Platform 4.7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
null
null
null
RHSA-2022:1540
Red Hat Security Advisory: xmlrpc-c security update
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
9.8
null
null
RHSA-2023:0045
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2024:0188
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-eventlet) security update
python-eventlet: patch regression for CVE-2021-21419 in some Red Hat builds
[ "cpe:/a:redhat:openstack:17.1::el8" ]
null
5.3
null
null
RHSA-2021:1475
Red Hat Security Advisory: bind security update
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
7.5
null
null
RHSA-2023:0811
Red Hat Security Advisory: firefox security update
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2024:9551
Red Hat Security Advisory: grafana-pcp security update
golang-fips: Golang FIPS zeroed buffer
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
6.5
null
null
RHBA-2024:1440
Red Hat Bug Fix Advisory: MTV 2.5.6 Images
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests nodejs-ip: arbitrary code execution via the isPublic() function
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8", "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9" ]
null
9.8
null
null
RHSA-2018:2037
Red Hat Security Advisory: podman security update
podman: Containers run as non-root users do not drop capabilities
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
5.3
null
RHSA-2023:4005
Red Hat Security Advisory: bind security update
bind: named's configured cache size limit can be significantly exceeded
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
7.5
null
null
RHSA-2024:2239
Red Hat Security Advisory: skopeo security update
golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2016:1429
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.3.1 security and bug fix update
Dashbuilder: SQL Injection on data set lookup filters
[ "cpe:/a:redhat:jboss_bpms:6.3" ]
null
null
8.8
null
RHSA-2024:4902
Red Hat Security Advisory: kernel security update
kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: net: amd-xgbe: Fix skb data length underflow kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: bonding: stop the device in bond_setup_by_slave() kernel: arp: Prevent overflow in arp_req_get(). kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: x86/xen: Add some null pointer checking to smp.c kernel: net/mlx5: Properly link new fs rules into the tree kernel: i40e: fix vf may be used uninitialized in this function warning kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
4.7
null
null
RHSA-2023:4377
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: KVM: x86/mmu: race condition in direct_page_fault() kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: Spectre v2 SMT mitigations problem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
5.6
null
RHSA-2024:3875
Red Hat Security Advisory: nghttp2 security update
nghttp2: CONTINUATION frames DoS
[ "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
5.3
null
null
RHSA-2024:1076
Red Hat Security Advisory: edk2 security update
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
8.8
null
null
RHSA-2006:0177
Red Hat Security Advisory: gpdf security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:1830
Red Hat Security Advisory: postgresql:10 security update
postgresql: server processes unencrypted bytes from man-in-the-middle
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2005:788
Red Hat Security Advisory: HelixPlayer security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:7417
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console owasp-java-html-sanitizer: improper policies enforcement may lead to remote code execution netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console artemis-commons: Apache ActiveMQ Artemis DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6.1" ]
null
7.5
null
null
RHSA-2013:0248
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0 CP10 security update
JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:update10" ]
null
null
null
null
RHSA-2013:1540
Red Hat Security Advisory: evolution security, bug fix, and enhancement update
evolution: incorrect selection of recipient gpg public key for encrypted mail
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:5026
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: net-sysfs: *_queue_add_kobject refcount issue kernel: kernel: buffer over write in vgacon_scroll
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
6.6
null
null
RHSA-2022:5892
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update
minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
7.5
null
null
RHSA-2014:0818
Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.2 update
Xalan-Java: insufficient constraints in secure processing feature netty: DoS via memory exhaustion during data aggregation smack: incorrect X.509 certificate validation smack: IQ response spoofing
[ "cpe:/a:redhat:jboss_brms:6.0" ]
null
null
null
null
RHSA-2015:0065
Red Hat Security Advisory: RHN Satellite Server 5.5 4-Month Retirement Notice
This is the four-month notification for the retirement of the following versions of Red Hat Satellite 5: * Red Hat Satellite 5.2 * Red Hat Satellite 5.3 * Red Hat Satellite 5.4 * Red Hat Satellite 5.5
[]
null
null
null
null
RHSA-2024:6684
Red Hat Security Advisory: thunderbird security update
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2014:0764
Red Hat Security Advisory: rubygem-openshift-origin-node security update
Origin: Command execution as root via downloadable cartridge source-url
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2025:3492
Red Hat Security Advisory: Satellite 6.14.4.5 Async Update
graphql-ruby: Remote code execution when loading a crafted GraphQL schema rack: rubygem-rack: Local File Inclusion in Rack::Static
[ "cpe:/a:redhat:satellite:6.14::el8", "cpe:/a:redhat:satellite_capsule:6.14::el8", "cpe:/a:redhat:satellite_utils:6.14::el8" ]
null
7.5
null
null
RHSA-2019:2022
Red Hat Security Advisory: poppler security, bug fix, and enhancement update
poppler: infinite recursion in Parser::getObj function in Parser.cc poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc poppler: reachable abort in Object.h poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc poppler: pdfdetach utility does not validate save paths poppler: NULL pointer dereference in _poppler_attachment_new poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.1
null
RHSA-2022:1469
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
5.9
null
null
RHSA-2007:1082
Red Hat Security Advisory: firefox security update
jar: protocol XSS Multiple flaws in Firefox Mozilla Cross-site Request Forgery flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:4.5::as", "cpe:/o:redhat:rhel_eus:4.5::es" ]
null
null
null
null
RHSA-2016:2766
Red Hat Security Advisory: kernel security and bug fix update
kernel: Stack overflow via ecryptfs and /proc/$pid/environ kernel: Fork of large process causes memory corruption
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2013:0762
Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-Year Notice
This is the 1-Year notification for the retirement of Red Hat Enterprise MRG Version 1 and Version 2 for Red Hat Enterprise Linux 5.
[ "cpe:/a:redhat:enterprise_mrg:1::el5", "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
RHSA-2024:6595
Red Hat Security Advisory: java-1.8.0-ibm security update
ibm-java: Race condition may cause Denial of Service
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
5.9
null
null
RHSA-2024:1785
Red Hat Security Advisory: X.Org server security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2012:1180
Red Hat Security Advisory: gimp security update
David Koblas' GIF decoder LZW decoder buffer overflow plug-in): heap buffer overflow when loading external palette files plug-in): Heap-based buffer overflow by loading certain GIF images
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2014:0908
Red Hat Security Advisory: java-1.6.0-sun security update
OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Incorrect generic signature attribute parsing (Hotspot, 8037076) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2005:762
Red Hat Security Advisory: RealPlayer security update
security flaw security flaw security flaw
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2019:3651
Red Hat Security Advisory: sssd security, bug fix, and enhancement update
sssd: improper implementation of GPOs due to too restrictive permissions
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
5.4
null
RHSA-2014:0877
Red Hat Security Advisory: ror40-rubygem-activerecord security update
rubygem-activerecord: SQL injection vulnerability in 'range' quoting
[ "cpe:/a:redhat:rhel_software_collections:1::el6", "cpe:/a:redhat:rhel_software_collections:1::el7" ]
null
null
null
null
RHSA-2019:3950
Red Hat Security Advisory: SDL security update
SDL: heap-based buffer overflow in SDL blit functions in video/SDL_blit*.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
RHSA-2006:0582
Red Hat Security Advisory: kdebase security fix
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:2298
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Use-after-free bug in DestroyWindow xorg-x11-server: Use-after-free bug in DamageDestroy
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7
null
null
RHSA-2014:1915
Red Hat Security Advisory: flash-plugin security update
flash-plugin: hardening against a code execution flaw (APSB14-26)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:2383
Red Hat Security Advisory: bind security update
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
7.5
null
null
RHSA-2024:0378
Red Hat Security Advisory: kpatch-patch security update
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: out-of-bounds write in qfq_change_class function kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.5
null
null
RHSA-2009:1531
Red Hat Security Advisory: seamonkey security update
array index error in dtoa implementation of many products firefox: (rejected CVE-2009-1563) Firefox heap buffer overflow in string to number conversion Firefox: Predictable /tmp pathname use Firefox cross-origin data theft through document.getSelection() Firefox download filename spoofing with RTL override Firefox crashes with evidence of memory corruption Firefox integer underflow in FTP directory list parser SeaMonkey scriptable plugin execution in mail (mfsa2010-06)
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:0474
Red Hat Security Advisory: dotnet security and bugfix update
dotnet: certificate chain building recursion Denial of Service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2023:4877
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
3.7
null
null
RHSA-2002:117
Red Hat Security Advisory: : : : Updated secureweb packages fix chunked encoding issue
security flaw
[ "cpe:/a:redhat:secure_web_server:3.2" ]
null
null
null
null
RHSA-2016:0121
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update on RHEL 5
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
7.6
null
RHSA-2017:0195
Red Hat Security Advisory: ansible security update
Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
6.6
null