id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2001:095
Red Hat Security Advisory: : New util-linux packages available to fix vipw permissions problems
security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2009:1335
Red Hat Security Advisory: openssl security, bug fix, and enhancement update
openssl: mime_hdr_cmp NULL dereference crash openssl: ASN1 printing crash OpenSSL: DTLS epoch record buffer memory DoS OpenSSL: DTLS fragment handling memory DoS OpenSSL: DTLS pointer use-after-free flaw (DoS) openssl: DTLS NULL deref crash on early ChangeCipherSpec request openssl: DTLS out-of-sequence message handling NULL deref DoS
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:3540
Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update
golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.3
null
null
RHSA-2015:0672
Red Hat Security Advisory: bind security update
bind: issue in trust anchor management can cause named to crash
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2015:2140
Red Hat Security Advisory: libssh2 security and bug fix update
libssh2: Using SSH_MSG_KEXINIT data unbounded
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:1185
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.4
null
null
RHSA-2025:1673
Red Hat Security Advisory: mysql:8.0 security update
openssl: SSL_select_next_proto buffer overread curl: libcurl: ASN.1 date parser overread curl: curl netrc password leak mysql: PS unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: X Plugin unspecified vulnerability (CPU Oct 2024) mysql: Information Schema unspecified vulnerability (CPU Oct 2024) mysql: DDL unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) mysql: FTS unspecified vulnerability (CPU Oct 2024) mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: DML unspecified vulnerability (CPU Oct 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) mysql: Client programs unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) mysql: mysqldump unspecified vulnerability (CPU Oct 2024) krb5: GSS message token handling mysql: High Privilege Denial of Service Vulnerability in MySQL Server mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability mysql: Privileges unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Components Services unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Privileges unspecified vulnerability (CPU Jan 2025) mysql: MySQL Server Options Vulnerability mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) mysql: Parser unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: DDL unspecified vulnerability (CPU Jan 2025) mysql: Information Schema unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Privileges unspecified vulnerability (CPU Jan 2025) mysql: Packaging unspecified vulnerability (CPU Jan 2025) mysql: Privilege Misuse in MySQL Server Security Component mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
5.9
null
RHSA-2022:8827
Red Hat Security Advisory: RHACS 3.73 enhancement and security update
imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path app-containers/cosign: false positive verification
[ "cpe:/a:redhat:advanced_cluster_security:3.73::el8" ]
null
4.1
null
null
RHSA-2016:0065
Red Hat Security Advisory: kernel-rt security update
kernel: Possible use-after-free vulnerability in keyring facility
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
null
null
RHSA-2017:0253
Red Hat Security Advisory: spice-server security update
spice: Buffer overflow in main_channel_alloc_msg_rcv_buf when reading large messages spice: Remote DoS via crafted message
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2023:1090
Red Hat Security Advisory: samba security update
samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2022:8781
Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update
jackson-databind: denial of service via a large depth of nested objects golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service loader-utils: Regular expression denial of service golang: regexp/syntax: limit memory used by parsing regexps jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays
[ "cpe:/a:redhat:logging:5.5::el8" ]
null
7.5
null
null
RHSA-2013:0162
Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.2.0.CP05 and 4.3.0.CP05 update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5" ]
null
null
null
null
RHSA-2014:0784
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 httpd security and bug fix update
httpd: mod_dav denial of service via crafted DAV WRITE request httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.0.1" ]
null
null
null
null
RHSA-2023:0958
Red Hat Security Advisory: vim security update
vim: no check if the return value of XChangeGC() is NULL
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2013:0582
Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.1.1 update
rubygem-actionpack: Unsafe query generation rubygem-activerecord: SQL injection when processing nested query paramaters rubygem-actionpack: Unsafe query generation (a different flaw than CVE-2012-2660) rubygem-activerecord: SQL injection when processing nested query paramaters (a different flaw than CVE-2012-2661) rubygem-actionpack: DoS vulnerability in authenticate_or_request_with_http_digest rubygem-actionpack: potential XSS vulnerability in select_tag prompt rubygem-actionpack: potential XSS vulnerability rubygem-actionpack: XSS Vulnerability in strip_tags 1.9.3: Possibility to bypass Ruby's $SAFE (level 4) semantics ruby: safe level bypass via name_err_mesg_to_str() ruby: unintentional file creation caused by inserting an illegal NUL character ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001) rubygem-activerecord: Unsafe Query Generation Risk in Ruby on Rails rubygem-ruby_parser: incorrect temporary file usage rubygem-activerecord/rubygem-activemodel: circumvention of attr_protected
[ "cpe:/a:redhat:openshift:1::el6" ]
null
null
null
null
RHSA-2024:4010
Red Hat Security Advisory: OpenShift Container Platform 4.14.31 security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can cause DoS on go-git clients jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
4.3
null
null
RHBA-2024:10760
Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.3.3 bugfix release
cross-spawn: regular expression denial of service
[ "cpe:/a:redhat:rhdh:1.3::el9" ]
null
4.4
null
null
RHSA-2013:0562
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3 security update
qpid-cpp: qpid authentication bypass qpid-cpp: long arrays of zero-width types cause a denial of service qpid-cpp: crash due to qpid::framing::Buffer::checkAvailable() wraparound
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2023:3325
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.7 security fixes and container updates
vm2: Inspect Manipulation vm2: Sandbox Escape
[ "cpe:/a:redhat:multicluster_engine:2.1::el8" ]
null
9.8
null
null
RHSA-2024:6462
Red Hat Security Advisory: Cost Management enhancement and security update
golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/a:redhat:cost_management:1::el8" ]
null
5.9
null
null
RHSA-2008:1001
Red Hat Security Advisory: tog-pegasus security update
tog-pegasus: WBEM services access not restricted to dedicated user after 2.7.0 rebase tog-pegasus: failed authentication attempts not logged via PAM
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2413
Red Hat Security Advisory: Red Hat Fuse 7.4.0 security update
hazelcast: java deserialization in join cluster procedure leading to remote code execution spring-security-core: Unauthorized Access with Spring Security Method Security thrift: SASL negotiation isComplete validation bypass in the org.apache.thrift.transport.TSaslTransport class slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution jolokia: system-wide CSRF that could lead to Remote Code Execution spring-security-oauth: Privilege escalation by manipulating saved authorization request solr: remote code execution due to unsafe deserialization wildfly: Race condition on PID file allows for termination of arbitrary processes by local users
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
null
5.5
null
RHSA-2023:1079
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container) security update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
5.3
null
null
RHSA-2024:6187
Red Hat Security Advisory: gvisor-tap-vsock security update
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHBA-2024:3840
Red Hat Bug Fix Advisory: golang bug fix update
golang: net: malformed DNS message can cause infinite loop
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2025:0012
Red Hat Security Advisory: python-requests security update
requests: subsequent requests to the same host ignore cert verification
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.6
null
null
RHSA-2007:0932
Red Hat Security Advisory: pwlib security update
ekiga GetHostAddress remote DoS
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2015:2550
Red Hat Security Advisory: libxml2 security update
libxml2: denial of service processing a crafted XML document libxml2: CPU exhaustion when processing specially crafted XML input libxml2: Heap-based buffer overflow in xmlDictComputeFastQKey libxml2: Heap-based buffer overflow in xmlParseXmlDecl libxml2: Heap-based buffer overflow in xmlGROW libxml2: Heap buffer overflow in xmlParseMisc libxml2: Out-of-bounds memory access libxml2: heap-based buffer overflow in xmlParseConditionalSections() libxml2: Buffer overread with XML parser in xmlNextChar libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration libxml2: out-of-bounds memory access when parsing an unclosed HTML comment
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:4971
Red Hat Security Advisory: emacs security update
emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream", "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7.8
null
null
RHSA-2018:2482
Red Hat Security Advisory: docker security and bug fix update
docker: container breakout without selinux in enforcing mode
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
6.3
null
RHSA-2020:2474
Red Hat Security Advisory: libexif security update
libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
9.1
null
null
RHSA-2021:0073
Red Hat Security Advisory: kernel security and bug fix update
kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
5.5
null
null
RHSA-2020:5479
Red Hat Security Advisory: linux-firmware security and enhancement update
hardware: buffer overflow in bluetooth firmware
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.8
null
null
RHSA-2024:4500
Red Hat Security Advisory: firefox security update
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2024:6236
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.10.5 security and bug fix update
opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
[ "cpe:/a:redhat:acm:2.10::el9" ]
null
7.5
null
null
RHSA-2025:0221
Red Hat Security Advisory: dpdk security update
dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
null
7.4
null
RHSA-2022:1599
Red Hat Security Advisory: convert2rhel security update
convert2rhel: Red Hat account password passed via command line by code
[ "cpe:/a:redhat:convert2rhel::el8" ]
null
6.5
null
null
RHSA-2011:0261
Red Hat Security Advisory: bash security and bug fix update
bash: Insecure temporary file use in aliasconv.sh, aliasconv.bash, cshtobash (symlink attack)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:4039
Red Hat Security Advisory: devtoolset-10-gcc security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.5
null
null
RHSA-2012:1407
Red Hat Security Advisory: firefox security update
Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2013:0784
Red Hat Security Advisory: Red Hat Enterprise Linux 6.1 Extended Update Support 1-Month Notice
This is the 1-Month notification for the retirement of Red Hat Enterprise Linux 6.1 Extended Update Support (EUS).
[ "cpe:/o:redhat:rhel_eus:6.1" ]
null
null
null
null
RHSA-2023:7617
Red Hat Security Advisory: Red Hat Build of Apache Camel for Quarkus 3.2.0 release (RHBQ 3.2.9.Final)
JSON-java: parser confusion leads to OOM apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
[ "cpe:/a:redhat:camel_quarkus:3.2.0" ]
null
7.5
null
null
RHSA-2004:600
Red Hat Security Advisory: apache, mod_ssl security update
httpd mod_digest nonce not verified mod_ssl SSLCipherSuite bypass httpd mod_include SSI overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:4372
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
qemu-kvm: 'qemu-img info' leads to host file read/write
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
7.8
null
null
RHSA-2005:875
Red Hat Security Advisory: curl security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2012:0343
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) JDK: unspecified vulnerability fixed in 6u29 (Sound) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)
[ "cpe:/a:redhat:rhel_extras_sap:4", "cpe:/a:redhat:rhel_extras_sap:5" ]
null
null
null
null
RHSA-2019:1147
Red Hat Security Advisory: rh-ror50-rubygem-actionpack security update
rubygem-actionpack: render file directory traversal in Action View rubygem-actionpack: denial of service vulnerability in Action View
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
5.9
null
RHSA-2019:3978
Red Hat Security Advisory: kernel-rt security and bug fix update
Kernel: KVM: OOB memory access via mmio ring buffer kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7.4
null
RHSA-2011:1243
Red Hat Security Advisory: thunderbird security update
An updated thunderbird package that fixes one security issue is now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact.
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2020:2277
Red Hat Security Advisory: kernel security update
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
5.9
null
null
RHSA-2024:10147
Red Hat Security Advisory: OpenShift Container Platform 4.16.24 security update
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
5.9
null
null
RHSA-2018:2576
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.4
null
RHSA-2020:3658
Red Hat Security Advisory: librepo security update
librepo: missing path validation in repomd.xml may lead to directory traversal
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8
null
null
RHSA-2007:0337
Red Hat Security Advisory: postgresql security update
PostgreSQL security-definer function privilege escalation
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2011:0027
Red Hat Security Advisory: python security, bug fix, and enhancement update
python: untrusted python modules search path python: rgbimg: multiple security issues python: rgbimg: multiple security issues python: rgbimg: multiple security issues python: audioop: incorrect integer overflow checks Python: Memory corruption in audioop module
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:0265
Red Hat Security Advisory: polkit security update
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
RHSA-2013:0234
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 security update
JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1" ]
null
null
null
null
RHSA-2019:3300
Red Hat Security Advisory: rh-php71-php security update
php: underflow in env_path_info in fpm_main.c
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.1
null
RHSA-2023:5192
Red Hat Security Advisory: firefox security update
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
0
null
null
RHSA-2017:3471
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
4.4
null
RHSA-2015:1676
Red Hat Security Advisory: redis security advisory
redis: Lua sandbox escape and arbitrary code execution
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2019:3843
Red Hat Security Advisory: kernel security update
hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
6.5
null
RHSA-2024:5535
Red Hat Security Advisory: python3.9 security update
python: Path traversal on tempfile.TemporaryDirectory
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.8
null
null
RHSA-2016:1137
Red Hat Security Advisory: openssl security update
openssl: Memory corruption in the ASN.1 encoder
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
5.6
null
RHSA-2024:2666
Red Hat Security Advisory: OpenShift Container Platform 4.14.24 security and extras update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
5.9
null
null
RHSA-2020:2040
Red Hat Security Advisory: squid security update
squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
4.3
null
RHSA-2020:5372
Red Hat Security Advisory: net-snmp security update
net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
8.8
null
null
RHSA-2022:8317
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: server memory information leak via SMB1
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.3
null
null
RHSA-2016:1135
Red Hat Security Advisory: Red Hat JBoss Data Virtualization security and bug fix update
apache-poi: denial of service in HSLFSlideShow via corrupted PPT file bsh2: remote code execution via deserialization
[ "cpe:/a:redhat:jboss_data_virtualization:6.2" ]
null
null
7.4
null
RHSA-2020:4290
Red Hat Security Advisory: virt:8.1 and virt-devel:8.1 security update
QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/a:redhat:advanced_virtualization:8.1::el8" ]
null
5
null
null
RHSA-2024:4028
Red Hat Security Advisory: Release of OpenShift Serverless 1.33.0 security update & enhancements
golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect quarkus-core: Leak of local configuration properties into Quarkus applications golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data netty-codec-http: Allocation of Resources Without Limits or Throttling
[ "cpe:/a:redhat:openshift_serverless:1.33::el8" ]
null
5.3
null
null
RHSA-2012:1392
Red Hat Security Advisory: java-1.6.0-sun security update
OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606) OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: disable Gopher support by default (Gopher, 7189567) OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:5216
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.1
null
null
RHSA-2024:6406
Red Hat Security Advisory: OpenShift Container Platform 4.14.36 security update
opentelemetry: DoS vulnerability in otelhttp golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) coredns: CD bit response is cached and served later bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content go-retryablehttp: url might write sensitive information to log file python-werkzeug: user may execute code on a developer's machine
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2018:2181
Red Hat Security Advisory: gnupg2 security update
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2023:0192
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.7
null
null
RHSA-2020:1518
Red Hat Security Advisory: git security update
git: Crafted URL containing new lines can cause credential leak
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
7.5
null
null
RHSA-2022:5766
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
6.1
null
RHSA-2016:1086
Red Hat Security Advisory: libndp security update
libndp: denial of service due to insufficient validation of source of NDP messages
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:1482
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
7.4
null
null
RHSA-2021:2065
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.7 security update on RHEL 8
keycloak: Internationalized domain name (IDN) homograph attack to impersonate users keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
7.1
null
null
RHSA-2024:3254
Red Hat Security Advisory: container-tools:rhel8 security update
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps buildah: full container escape at build time golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.3
null
null
RHSA-2018:3656
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: Use-after-free in the vmacache_flush_all function resulting in a possible privilege escalation kernel: Privilege escalation on arm64 via KVM hypervisor
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
6.7
null
RHSA-2022:8194
Red Hat Security Advisory: libtiff security update
libtiff: Denial of Service via crafted TIFF file libtiff: Null source pointer lead to Denial of Service via crafted TIFF file libtiff: reachable assertion libtiff: heap buffer overflow in extractImageSection tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c tiff: Divide By Zero error in tiffcrop libtiff: Out-of-bounds Read error in tiffcp libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c libtiff: stack-buffer-overflow in tiffcp.c in main() libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.5
null
null
RHSA-2016:1633
Red Hat Security Advisory: kernel security and bug fix update
kernel: challenge ACK counter information disclosure.
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.8
null
RHSA-2007:1024
Red Hat Security Advisory: kdegraphics security update
DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:0918
Red Hat Security Advisory: thunderbird security update
usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
9.8
6.1
null
RHSA-2016:1041
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:38.8) (MFSA 2016-39) Mozilla: Miscellaneous memory safety hazards (rv:46.0 / rv:45.1 / rv:38.8) (MFSA 2016-39)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2007:0981
Red Hat Security Advisory: thunderbird security update
security flaw security flaw security flaw about: blank windows security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2013:1850
Red Hat Security Advisory: openjpeg security update
openjpeg: multiple denial of service flaws openjpeg: heap-based buffer overflows openjpeg: out-of-bounds memory read flaws openjpeg: heap-based buffer overflows in version 1.3
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2020:3032
Red Hat Security Advisory: mod_auth_openidc:2.3 security and bug fix update
mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
null
null
RHSA-2019:0349
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update for February 2019
dotnet: Domain-spoofing attack in System.Uri
[ "cpe:/a:redhat:rhel_dotnet:1.0::el7", "cpe:/a:redhat:rhel_dotnet:1.1::el7", "cpe:/a:redhat:rhel_dotnet:2.1::el7", "cpe:/a:redhat:rhel_dotnet:2.2::el7" ]
null
null
7.5
null
RHSA-2019:0580
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files
[ "cpe:/a:redhat:openstack:14::el7" ]
null
null
4
null
RHSA-2008:0641
Red Hat Security Advisory: acroread security update
acroread: insecure handling of temporary files acroread: input validation issue in a JavaScript method
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2021:5072
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2024:9187
Red Hat Security Advisory: bcc security update
bcc: unprivileged users can force loading of compromised linux headers
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
2.8
null
null
RHSA-2016:2137
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
[ "cpe:/a:redhat:rhel_extras:6", "cpe:/a:redhat:rhel_extras:7" ]
null
null
5.3
null
RHEA-2018:0705
Red Hat Enhancement Advisory: tcpdump bug fix and enhancement update
tcpdump: Heap buffer overflow in the EXTRACT_16BITS function tcpdump: heap-based buffer over-read in the lldp_print tcpdump: heap-based buffer over-read in the pimv1_print tcpdump: buffer overflow in the sliplink_print function tcpdump: Segmentation Violation in the compressed_sl_print tcpdump: Buffer over-read in smbutil.c:name_len() in SMB/CIFS parser tcpdump: Buffer over-read in addrtoname.c:lookup_bytestring() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-isakmp.c:isakmp_rfc3948_print() in ISAKMP parser tcpdump: Buffer over-read in print-isoclns.c:isoclns_print() in ISO CLNS parser tcpdump: Buffer over-read in print-nfs.c:interp_reply() in NFS parser tcpdump: Buffer over-read in print-decnet.c:decnet_print() in DECnet parser tcpdump: Buffer over-read in util-print.c:tok2strbuf() tcpdump: Buffer over-read in print-eigrp.c:eigrp_print() in EIGRP parser tcpdump: Buffer over-read in print-zephyr.c, several functions in Zephyr parser tcpdump: Buffer over-read in print-ip6.c:ip6_print() in IPv6 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-telnet.c:telnet_parse() in telnet parser tcpdump: Infinite loop due to a bug in print-resp.c:resp_get_length() in RESP parser tcpdump: Infinite loop due to bugs in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-ripng.c:ripng_print() in RIPng parser tcpdump: Buffer over-read in print-juniper.c, several functions in Juniper protocols parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Infinite loop due to a bug in print-domain.c:ns_print() in DNS parser tcpdump: Buffer over-read in print-pim.c:pimv2_print() in PIMv2 parser tcpdump: Infinite loop due to a bug in print-lldp.c:lldp_private_8021_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_extd_ip_reach() in IS-IS parser tcpdump: Buffer over-read in print-isoclns.c:isis_print() in IS-IS parser tcpdump: Buffer over-read in print-802_15_4.c:ieee802_15_4_if_print() in IEEE 802.15.4 parser tcpdump: Buffer over-read in print-nfs.c:nfs_printfh() in NFS parser tcpdump: Buffer over-read in print-aodv.c:aodv_extension() in AODV parser tcpdump: Buffer over-read in print-lmp.c:lmp_print() in LMP parser tcpdump: Buffer over-read in print-juniper.c:juniper_parse_header() in Juniper protocols parser tcpdump: Buffer over-read in print-nfs.c:xid_map_enter() in NFS parser tcpdump: Buffer over-read in print-l2tp.c, several functions in L2TP parser tcpdump: Buffer over-read in print-pktap.c:pktap_if_print() in Apple PKTAP parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-mobility.c:mobility_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-beep.c:l_strnstart() in BEEP parser tcpdump: Buffer overflow in util-print.c:bittok2str_internal() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-arp.c, several functions in ARP parser tcpdump: Buffer over-read in print-wb.c:wb_prep(), several functions in White Board protocol parser tcpdump: Buffer over-read in print-eap.c:eap_print() in EAP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-dhcp6.c:dhcp6opt_print() in DHCPv6 parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_print() in ICMPv6 parser tcpdump: Buffer over-read in print-ip.c:ip_printroute() in IP parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-isoclns.c, several functions in ISO IS-IS parser tcpdump: Buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print() in LLDP parser tcpdump: Buffer over-read in print-bootp.c:bootp_print() in BOOTP parser tcpdump: Buffer over-read in print-ppp.c:print_ccp_config_options() in PPP parser tcpdump: Buffer over-read in print-pim.c, several functions in PIM parser tcpdump: Buffer over-read in print-frag6.c:frag6_print() in IPv6 fragmentation header parser tcpdump: Buffer over-read in print-radius.c:print_attr_string() in RADIUS parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_id() in ISO IS-IS parser tcpdump: Buffer over-read in print-ospf6.c:ospf6_decode_v3() in OSPFv3 parser tcpdump: Buffer over-read in print-ip.c:ip_printts() in IP parser tcpdump: Buffer over-read in print-ppp.c:handle_mlppp() in PPP parser tcpdump: Buffer over-read in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-mptcp.c, several functions in MPTCP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_nodeinfo_print() in ICMPv6 parser tcpdump: Buffer over-read in print-hncp.c:dhcpv6_print() in HNCP parser tcpdump: Buffer over-read in print-bgp.c:decode_multicast_vpn() in BGP parser tcpdump: Buffer over-read in print-hncp.c:dhcpv4_print() in HNCP parser tcpdump: Buffer over-read in print-vqp.c:vqp_print() in VQP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-rx.c:ubik_print() in Rx protocol parser tcpdump: Buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print() in RPKI-Router parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-cfm.c:cfm_print() in CFM parser tcpdump: Buffer over-read in print-bgp.c:decode_rt_routing_info() in BGP parser tcpdump: Buffer over-read in print-lldp.c:lldp_private_8023_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv() in ISO IS-IS parser tcpdump: Buffer over-read in print-chdlc.c:chdlc_print() in Cisco HDLC parser tcpdump: Buffer over-read in print-olsr.c:olsr_print() in OLSR parser tcpdump: Buffer over-read in print-isakmp.c:ikev1_id_print() in IKEv1 parser tcpdump: Buffer over-read in print-isakmp.c, several functions in IKEv2 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2019:4021
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 security update
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" ]
null
null
7.5
null