id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:4335
Red Hat Security Advisory: Security Update for cert-manager Operator for Red Hat OpenShift 1.10.3
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:cert_manager:1.10::el9" ]
null
7.3
null
null
RHSA-2006:0044
Red Hat Security Advisory: openssh security update
local to local copy uses shell expansion twice
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2002:157
Red Hat Security Advisory: openssl security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2011:0305
Red Hat Security Advisory: samba security update
Samba unsafe fd_set usage
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:4875
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.1 security and bug fix updates
ACM: governance policy propagator privilege escalation openshift: OCP & FIPS mode vm2: Promise handler sanitization can be bypassed allowing attackers to escape the sandbox and run arbitrary code vm2: custom inspect function allows attackers to escape the sandbox and run arbitrary code
[ "cpe:/a:redhat:acm:2.8::el8" ]
null
9.8
null
null
RHSA-2024:4404
Red Hat Security Advisory: fence-agents bug fix update
jinja2: accepts keys containing non-attribute characters
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::highavailability", "cpe:/a:redhat:rhel_tus:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::highavailability" ]
null
5.4
null
null
RHSA-2023:0597
Red Hat Security Advisory: rh-git227-git security update
git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
9.8
null
null
RHSA-2021:4060
Red Hat Security Advisory: libsolv security update
libsolv: heap-based buffer overflow in pool_installable() in src/repo.h libsolv: heap-based buffer overflow in pool_disabled_solvable() in src/repo.h libsolv: heap-based buffer overflow in pool_installable_whatprovides() in src/repo.h libsolv: heap-based buffer overflow in prune_to_recommended() in src/policy.c
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2025:0121
Red Hat Security Advisory: OpenShift Container Platform 4.15.43 bug fix and security update
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
7.5
null
null
RHSA-2020:0592
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: use-after-free in fs/xfs/xfs_super.c kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
8
8
null
RHSA-2024:8719
Red Hat Security Advisory: Satellite 6.15.4.2 Async Update
mosquitto: sending specific sequences of packets may trigger memory leak foreman: Read-only access to entire DB from templates
[ "cpe:/a:redhat:satellite:6.15::el8", "cpe:/a:redhat:satellite_capsule:6.15::el8", "cpe:/a:redhat:satellite_utils:6.15::el8" ]
null
6.3
null
null
RHSA-2016:0053
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:2000
Red Hat Security Advisory: Red Hat OpenShift Enterprise final end-of-life notice
This is the final notification for the retirement of Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7. This notification applies only to those customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7.
[ "cpe:/a:redhat:openshift:3.6::el7", "cpe:/a:redhat:openshift:3.7::el7" ]
null
null
null
null
RHSA-2012:0528
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update
qpid-cpp: cluster authentication ignores cluster-* settings
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2022:1198
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.4
null
null
RHSA-2019:0036
Red Hat Security Advisory: source-to-image security, bug fix, and enhancement update
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
9.9
null
RHSA-2013:0148
Red Hat Security Advisory: openshift-origin-node-util security update
openshift-origin-node-util: restorer.php preg_match shell code injection openshift-origin-node-util: restorer.php arbitrary URL redirection
[ "cpe:/a:redhat:openshift:1::el6" ]
null
null
null
null
RHSA-2020:4276
Red Hat Security Advisory: kernel security update
kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2002:100
Red Hat Security Advisory: : : : Updated mailman packages available
security flaw
[ "cpe:/a:redhat:powertools:7.0", "cpe:/a:redhat:powertools:7.1" ]
null
null
null
null
RHSA-2024:3834
Red Hat Security Advisory: gdk-pixbuf2 security update
gnome: heap memory corruption on gdk-pixbuf
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.3
null
null
RHSA-2024:9629
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.6
dompurify: nesting-based mutation XSS vulnerability
[ "cpe:/a:redhat:service_mesh:2.5::el8" ]
null
8
null
null
RHSA-2021:2479
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update
NooBaa: noobaa-operator leaking RPC AuthToken into log files
[ "cpe:/a:redhat:openshift_container_storage:4.6::el8" ]
null
8.8
null
null
RHSA-2024:1066
Red Hat Security Advisory: squid:4 security update
squid: denial of service in HTTP header parser
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.6
null
null
RHSA-2007:0701
Red Hat Security Advisory: xterm security update
(mesg: error: tty device is not owned by group `tty')
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2025:0065
Red Hat Security Advisory: kernel security update
kernel: i40e: fix race condition by adding filter's intermediate sync state kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2024:8415
Red Hat Security Advisory: OpenShift Container Platform 4.16.19 bug fix and security update
openshift-console: OAuth2 insufficient state parameter entropy golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON openstack-ironic: Lack of checksum validation on images
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
6.3
null
null
RHSA-2007:0380
Red Hat Security Advisory: mod_jk security update
mod_jk sends decoded URL to tomcat
[ "cpe:/a:redhat:rhel_application_server:2" ]
null
null
null
null
RHSA-2023:4059
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.1
null
null
RHSA-2024:7867
Red Hat Security Advisory: .NET 6.0 security update
dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2014:0103
Red Hat Security Advisory: libvirt security and bug fix update
qemu: job usage issue in several APIs leading to libvirtd crash libvirt: denial of service with keepalive
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:1049
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Adapter: Open redirect vulnerability in checkSSO Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens keycloak: reflected XSS attack Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6" ]
null
4.6
5.6
null
RHSA-2024:3308
Red Hat Security Advisory: tomcat security and bug fix update
Tomcat: WebSocket DoS with incomplete closing handshake Tomcat: HTTP/2 header handling DoS
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2017:2705
Red Hat Security Advisory: kernel-rt security update
kernel: stack buffer overflow in the native Bluetooth stack
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
7.5
null
RHSA-2021:5160
Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update
golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.8
null
null
RHSA-2023:0786
Red Hat Security Advisory: Network observability 1.1.0 security update
network-observability-console-plugin-container: setting Loki authToken configuration to DISABLE or HOST mode leads to authentication longer being enforced
[ "cpe:/a:redhat:network_observ_optr:1.1.0::el8" ]
null
7.5
null
null
RHSA-2016:0741
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
openssh: XSECURITY restrictions bypass under certain conditions in ssh(1) openssh: Privilege separation weakness related to PAM support openssh: Use-after-free bug related to PAM support openssh: possible fallback from untrusted to trusted X11 forwarding
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:7074
Red Hat Security Advisory: Network Observability 1.6.2 for OpenShift
net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/a:redhat:network_observ_optr:1.6.0::el9" ]
null
5.9
null
null
RHSA-2019:0681
Red Hat Security Advisory: thunderbird security update
mozilla: Use after free in Skia Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied thunderbird: flaw in verification of S/MIME signature resulting in signature spoofing mozilla: Integer overflow in Skia Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 Mozilla: Use-after-free when removing in-use DOM elements Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script Mozilla: Improper bounds checks when Spectre mitigations are disabled Mozilla: Type-confusion in IonMonkey JIT compiler Mozilla: Use-after-free with SMIL animation controller Mozilla: IonMonkey MArraySlice has incorrect alias information Mozilla: Ionmonkey type confusion with __proto__ mutations
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2024:0158
Red Hat Security Advisory: .NET 6.0 security update
crypto-js: PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.8
null
null
RHSA-2024:4411
Red Hat Security Advisory: booth security update
booth: specially crafted hash can lead to invalid HMAC being accepted by Booth server
[ "cpe:/a:redhat:rhel_e4s:9.0::highavailability", "cpe:/a:redhat:rhel_e4s:9.0::resilientstorage" ]
null
5.9
null
null
RHSA-2023:7858
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6.6" ]
null
7.7
null
null
RHSA-2017:1836
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.7
Artemis: Deserialization of untrusted input vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7" ]
null
null
8.1
null
RHSA-2019:2868
Red Hat Security Advisory: dbus security update
dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
null
7
null
RHSA-2023:3589
Red Hat Security Advisory: firefox security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2024:5364
Red Hat Security Advisory: kernel security update
kernel: tty: Fix out-of-bound vmalloc access in imageblit kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() kernel: cxl/port: Fix delete_endpoint() vs parent unregistration race kernel: platform/x86: wmi: Fix opening of char device kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete kernel: nfp: flower: handle acti_netdevs allocation failure kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: mlxbf_gige: call request_irq() after NAPI initialized kernel: wifi: cfg80211: check A-MSDU format more carefully kernel: wifi: iwlwifi: read txq-&gt;read_ptr under lock kernel: wifi: nl80211: don&#39;t free NULL coalescing rule kernel: net: kernel: UAF in network route management kernel: net: bridge: xmit: make sure we have at least eth header len bytes kernel: net/mlx5: Discard command completions in internal error kernel: net/mlx5: Add a timeout to acquire the command queue semaphore kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. kernel: stm class: Fix a double free in stm_register_device()
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.6
null
null
RHSA-2011:0200
Red Hat Security Advisory: krb5 security update
krb5: kpropd unexpected termination on invalid input (MITKRB5-SA-2011-001) krb5: KDC hang when using LDAP backend caused by special principal name (MITKRB5-SA-2011-002) krb5: KDC crash when using LDAP backend caused by a special principal name (MITKRB5-SA-2011-002)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:4332
Red Hat Security Advisory: bind security update
bind: named's configured cache size limit can be significantly exceeded
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.5
null
null
RHSA-2022:0777
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: tcp: fix page frag corruption on page fault kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: missing check in ioctl allows kernel memory read/write kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7
null
null
RHSA-2023:5216
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.1
null
null
RHSA-2011:0334
Red Hat Security Advisory: JBoss Enterprise Portal Platform 4.3.CP06 and 5.1.0 security update
JDK Double.parseDouble Denial-Of-Service
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3", "cpe:/a:redhat:jboss_enterprise_portal_platform:5" ]
null
null
null
null
RHSA-2024:5402
Red Hat Security Advisory: thunderbird security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
null
null
RHSA-2018:2701
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 5 security and bug fix update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6", "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" ]
null
null
7.5
null
RHSA-2014:0517
Red Hat Security Advisory: openstack-foreman-installer security, bug fix, and enhancement update
foreman-installer: insecure defaults
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2011:0177
Red Hat Security Advisory: webkitgtk security update
WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK WebKit: multiple vulnerabilities in WebKitGTK webkit: input validation error when parsing certain NaN values webkit: use-after-free flaw in handling of selections webkit: memory corruption flaw when handling form menus webkit: use-after-free flaw when handling scrollbars webkit: memory corruption when handling SVG documents webkit: bad cast with text editing webkit: address bar spoofing with history bug webkit: memory corruption with MIME types webkit: DoS due to improper Ruby support webkit: DoS via improper handling of counter nodes webkit: stale pointer issue with focusing webkit: cross-origin image theft webkit: Integer overflow in WebKit's handling of Text objects webkit: HTMLLinkElement ignores dnsPrefetchingEnabled setting WebKit: Use-after-free vulnerabiity related to text editing causes memory corruption WebKit: Memory corruption due to improper handling of large text area WebKit: Use-after-free vulnerability related frame object WebKit: Array index error during processing of an SVG document webkit: CSS Font Face Parsing Type Confusion Vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:2094
Red Hat Security Advisory: bind97 security update
bind: assertion failure triggered by a packet with malformed options
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
7.5
null
RHSA-2022:7173
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
[ "cpe:/o:redhat:rhel_e4s:7.6::server" ]
null
7.8
null
null
RHSA-2022:7005
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
5.3
null
null
RHSA-2002:173
Red Hat Security Advisory: krb5 security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2023:1297
Red Hat Security Advisory: OpenShift Container Platform 4.11.32 security and extras update
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7
null
null
RHSA-2012:1149
Red Hat Security Advisory: sudo security and bug fix update
sudo: insecure temporary file use in RPM %postun script
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2025:0052
Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1, kpatch-patch-5_14_0-427_31_1, and kpatch-patch-5_14_0-427_44_1 security update
kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
[ "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
5.9
null
null
RHSA-2024:11035
Red Hat Security Advisory: python3.12 security update
python: Virtual environment (venv) activation scripts don't quote paths python: Unbounded memory buffering in SelectorSocketTransport.writelines()
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb" ]
null
7.5
null
null
RHSA-2011:0879
Red Hat Security Advisory: Red Hat Network Satellite server spacewalk-java security update
Spacewalk: CSRF in all web portal forms
[ "cpe:/a:redhat:network_satellite:5.4::el5" ]
null
null
null
null
RHSA-2025:0714
Red Hat Security Advisory: rsync security update
rsync: Info Leak via Uninitialized Stack Contents
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
RHSA-2023:1203
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
[ "cpe:/a:redhat:rhel_eus:9.0::nfv", "cpe:/a:redhat:rhel_eus:9.0::realtime" ]
null
7.8
null
null
RHSA-2003:312
Red Hat Security Advisory: pan security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:4367
Red Hat Security Advisory: pki-core security update
ca: token authentication bypass vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2014:1338
Red Hat Security Advisory: openstack-glance security and bug fix update
openstack-glance: Glance store disk space exhaustion
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHBA-2019:0884
Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.3.5-3 - Container
Tower: credentials leaked through environment variables
[ "cpe:/a:redhat:ansible_tower:3.3::el7" ]
null
null
7.2
null
RHSA-2021:0338
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free in fs/block_dev.c kernel: Nfsd failure to clear umask after processing an open or create
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
4.4
null
null
RHSA-2020:1353
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
6.3
null
RHSA-2020:5566
Red Hat Security Advisory: openssl security update
openssl: EDIPARTYNAME NULL pointer de-reference
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.9
null
null
RHSA-2018:2881
Red Hat Security Advisory: firefox security update
Mozilla: type confusion in JavaScript Mozilla: stack out-of-bounds read in Array.prototype.push
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
8.8
null
RHSA-2008:0003
Red Hat Security Advisory: e2fsprogs security update
e2fsprogs multiple integer overflows
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:4725
Red Hat Security Advisory: OpenShift Virtualization 2.6.8 Images security and bug fix update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:container_native_virtualization:2.6::el8" ]
null
6.5
null
null
RHSA-2022:7280
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
[ "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/a:redhat:rhel_tus:8.2::realtime" ]
null
5.5
null
null
RHSA-2019:0971
Red Hat Security Advisory: ghostscript security update
ghostscript: superexec operator is available (700585) ghostscript: forceput in DefineResource is still accessible (700576) ghostscript: missing attack vector protections for CVE-2019-6116
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
7.3
null
RHSA-2018:3466
Red Hat Security Advisory: CloudForms 4.6.5 security, bug fix and enhancement update
rubyzip: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file
[ "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" ]
null
null
4.8
null
RHSA-2019:0547
Red Hat Security Advisory: OpenShift Container Platform 3.9 haproxy security update
haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash
[ "cpe:/a:redhat:openshift:3.9::el7" ]
null
null
5.9
null
RHSA-2021:2364
Red Hat Security Advisory: libwebp security update
libwebp: heap-based buffer overflow in PutLE16() libwebp: heap-based buffer overflow in WebPDecode*Into functions libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
9.8
null
null
RHSA-2018:1192
Red Hat Security Advisory: rh-perl524-perl security update
perl: heap write overflow in regcomp.c perl: heap read overflow in regexec.c
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.5
null
RHSA-2010:0424
Red Hat Security Advisory: kernel security and enhancement update
kernel: ipv6: skb is unexpectedly freed
[ "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es" ]
null
null
null
null
RHSA-2019:1140
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.1 security update
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users keycloak: session hijack using the user access token wildfly: wrong SecurityIdentity for EE concurrency threads that are reused
[ "cpe:/a:redhat:jboss_single_sign_on:7.3" ]
null
null
5.4
null
RHSA-2008:0547
Red Hat Security Advisory: seamonkey security update
Firefox malformed web content flaws Firefox javascript arbitrary code execution Firefox XSS attacks Firefox arbitrary signed JAR code execution Firefox arbitrary JavaScript code execution Firefox javascript arbitrary code execution Firefox arbitrary file disclosure Firefox .properties memory leak Firefox file location escaping flaw Firefox self signed certificate flaw Firefox arbitrary file disclosure Firefox block reflow flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:0486
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP6 security update
openssl: EDIPARTYNAME NULL pointer de-reference
[ "cpe:/a:redhat:jboss_core_services:1::el7" ]
null
5.9
null
null
RHSA-2016:0371
Red Hat Security Advisory: nss security update
nss: Heap buffer overflow vulnerability in ASN1 certificate parsing (MFSA 2016-35)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:0729
Red Hat Security Advisory: haproxy security update
haproxy: rewrite rules flaw can lead to arbitrary code execution
[ "cpe:/a:redhat:openshift:1::el6" ]
null
null
null
null
RHSA-2018:1199
Red Hat Security Advisory: patch security update
patch: Malicious patch files cause ed to execute arbitrary commands
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2014:0349
Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 Advanced Mission Critical Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 5.3 Advanced Mission Critical (AMC). This notification applies only to those customers with subscriptions for Red Hat Enterprise Linux 5.3 Advanced Mission Critical (AMC).
[ "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2022:6318
Red Hat Security Advisory: OpenShift Container Platform 4.9.48 extras security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
7.5
null
null
RHSA-2019:3338
Red Hat Security Advisory: edk2 security, bug fix, and enhancement update
edk2: Stack buffer overflow with corrupted BMP edk2: Buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media edk2: stack overflow in XHCI causing denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
5.9
null
RHSA-2024:7921
Red Hat Security Advisory: OpenShift Container Platform 4.17.1 security and extras update
opentelemetry: DoS vulnerability in otelhttp
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
7.5
null
null
RHSA-2015:1544
Red Hat Security Advisory: java-1.5.0-ibm security update
JDK: plain text data stored in memory dumps OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
3.7
null
RHSA-2023:1366
Red Hat Security Advisory: nss security update
nss: Arbitrary memory write via PKCS 12
[ "cpe:/o:redhat:rhel_els:6" ]
null
8.8
null
null
RHSA-2014:1033
Red Hat Security Advisory: java-1.6.0-ibm security update
JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2021:1582
Red Hat Security Advisory: cpio security update
cpio: improper input validation when writing tar header fields leads to unexpected tar generation
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
6.7
null
RHSA-2015:2131
Red Hat Security Advisory: openldap security, bug fix, and enhancement update
openldap: crash in ldap_domain2hostlist when processing SRV records openldap: incorrect multi-keyword mode cipherstring parsing
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.7
null
RHSA-2016:0185
Red Hat Security Advisory: kernel security and bug fix update
kernel: x86-64: IRET faults during NMIs processing kernel: Keyrings crash triggerable by unprivileged user
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:5604
Red Hat Security Advisory: kernel security and bug fix update
kernel: hash collisions in the IPv6 connection lookup table kernel: Spectre v2 SMT mitigations problem kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: denial of service problem in net/unix/diag.c kernel: nf_tables: use-after-free in nft_chain_lookup_byid() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.8
5.6
null
RHEA-2023:3850
Red Hat Enhancement Advisory: krb5 bug fix update
krb5: integer overflow vulnerabilities in PAC parsing
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.8
null
null