id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:0975 | Red Hat Security Advisory: zlib security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 8.2 | null | null |
RHSA-2015:1923 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: Heap overflow vulnerability in ne2000_receive() function | [
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2016:2574 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: File descriptors passed over unix sockets are not properly accounted kernel: Information leak when truncating of compressed/inlined extents on BTRFS kernel: IPv6 connect causes DoS via NULL pointer dereference kernel: when NFSv4 migration is executed, kernel oops occurs at NFS client kernel: CXGB3: Logic bug in return code handling prematurely frees key structures causing Use after free or kernel panic. kernel: incorrect restoration of machine specific registers from userspace kernel: incorrect restoration of machine specific registers from userspace kernel: NULL dereference in RFCOMM bind callback kernel: Kernel panic and system lockup by triggering BUG_ON() in public_key_verify_signature() kernel: race condition in the TLB flush logic kernel: Kernel memory leakage to ethernet frames due to buffer overflow in ethernet drivers kernel: double-free in usb-audio triggered by invalid USB descriptor kernel: pipe: limit the per-user amount of pages allocated in pipes kernel: Infinite loop vulnerability in KVM kernel: Null pointer dereference in trace_writeback_dirty_page() kernel: ipv4: denial of service when destroying a network interface kernel: ACPI table override allowed when securelevel is enabled kernel: use-after-free via crafted IPV6 sendmsg for raw / tcp / udp / l2tp sockets. kernel: Information leak in Linux sound module in timer.c kernel: Information leak in events in timer.c kernel: Slave being first propagated copy causes oops in propagate_mnt kernel: Use after free in array_map_alloc Kernel: powerpc: kvm: Infinite loop via H_CEDE hypercall when running under hypervisor-mode Kernel: powerpc: tm: crash via exec system call on PPC kernel: Heap buffer overflow in hiddev driver kernel: Race condition vulnerability in execve argv arguments kernel: vfs: missing detection of hardlinks in vfs_rename() on overlayfs kernel: infiniband: Kernel crash by sending ABORT_TASK command kernel: scsi: aacraid: double fetch in ioctl_send_fib() kernel: assoc_array: don't call compare_object() on a node kernel: HID: core: prevent out-of-bound readings kernel: ALSA: Use-after-free in kill_fasync kernel: sound: a race condition in the kernel sound timer in snd_timer_user_read() kernel: overlayfs file truncation without permissions | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2023:6473 | Red Hat Security Advisory: buildah security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace containerd: Supplementary groups are not set up properly golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2023:6243 | Red Hat Security Advisory: openshift-gitops-kam security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift_gitops:1.10::el8"
] | null | 7.5 | null | null |
RHSA-2023:3934 | Red Hat Security Advisory: python3 security update | python: urllib.parse url blocklisting bypass | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2024:2932 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:logging:5.8::el9"
] | null | 7.5 | null | null |
RHSA-2023:5675 | Red Hat Security Advisory: OpenShift Container Platform 4.13.17 packages and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2020:0086 | Red Hat Security Advisory: firefox security update | Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | 8.8 | null |
RHSA-2020:4490 | Red Hat Security Advisory: gnupg2 security, bug fix, and enhancement update | gnupg2: Cross site request forgery in dirmngr resulting in an information disclosure or denial of service GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.5 | null |
RHSA-2019:1529 | Red Hat Security Advisory: pki-deps:10.6 security update | tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up tomcat: Open redirect in default servlet | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.3 | null |
RHSA-2016:2573 | Red Hat Security Advisory: glibc security, bug fix, and enhancement update | glibc: Stack overflow in nss_dns_getnetbyname_r | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2012:0533 | Red Hat Security Advisory: samba and samba3x security update | samba: Incorrect permission checks when granting/removing privileges | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:0973 | Red Hat Security Advisory: nss, nss-util, and nspr security, bug fix, and enhancement update | Updated nss, nss-util, and nspr packages that fix one security issue,
several bugs, and add various enhancements are now available for Red Hat
Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2025:0288 | Red Hat Security Advisory: Bug fix of NetworkManager | DHCP: DHCP routing options can manipulate interface-based VPN traffic | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.6 | null | null |
RHSA-2023:0899 | Red Hat Security Advisory: OpenShift Container Platform 4.10.53 bug fix and security update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 5.3 | null | null |
RHSA-2020:0830 | Red Hat Security Advisory: OpenShift Container Platform 4.2 openshift-enterprise-mediawiki-container security update | openshift/mediawiki: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 7 | null | null |
RHSA-2021:3631 | Red Hat Security Advisory: OpenShift Container Platform 4.8.13 security update | kubernetes: Symlink exchange can allow host filesystem access | [
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 8.8 | null | null |
RHSA-2011:0320 | Red Hat Security Advisory: libcgroup security update | libcgroup: Heap-based buffer overflow by converting list of controllers for given task into an array of strings libcgroup: Uncheck origin of NETLINK messages | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:0774 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2014:0133 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:24.3) (MFSA 2014-01) Mozilla: Clone protected content with XBL scopes (MFSA 2014-02) Mozilla: Inconsistent JavaScript handling of access to Window objects (MFSA 2014-13) Mozilla: Incorrect use of discarded images by RasterImage (MFSA 2014-04) Mozilla: Use-after-free with imgRequestProxy and image proccessing (MFSA 2014-08) Mozilla: Cross-origin information leak through web workers (MFSA 2014-09) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:3454 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update | Artemis: Deserialization of untrusted input vulnerability eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves EAP7: Internal IP address disclosed on redirect when request header Host field is not set undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 5.5 | null |
RHSA-2019:0458 | Red Hat Security Advisory: vdsm security and bug fix update | vdsm: privilege escalation to root via systemd_run | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.4 | null |
RHSA-2024:10962 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Jaeger) 3.4 release | http-proxy-middleware: Denial of Service express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser vite: server.fs.deny is bypassed when using `?import&raw` vite: XSS via DOM Clobbering gadget found in vite bundled scripts rollup: DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS | [
"cpe:/a:redhat:openshift_distributed_tracing:3.4::el8"
] | null | 6.4 | null | null |
RHSA-2015:0254 | Red Hat Security Advisory: samba security update | samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution | [
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHBA-2004:232 | Red Hat Bug Fix Advisory: Updated lvm package | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2010:0818 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager security update | spice activex/spicec named pipe races | [
"cpe:/a:redhat:rhev_manager:2"
] | null | null | null | null |
RHBA-2020:5306 | Red Hat Bug Fix Advisory: openvswitch2.13 bug fix and enhancement update | lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c | [
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2022:7008 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | null | null |
RHSA-2024:6691 | Red Hat Security Advisory: OpenShift Container Platform 4.13.50 bug fix and security update | openshift/builder: Path traversal allows command injection in privileged BuildContainer using docker build strategy openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 9.9 | null | null |
RHSA-2024:6879 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 security update on RHEL 8 | keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 6.1 | null | null |
RHSA-2023:7610 | Red Hat Security Advisory: OpenShift Container Platform 4.12.45 packages and security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) python-werkzeug: high resource consumption leading to denial of service | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2023:2713 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update | okhttp: information disclosure via improperly used cryptographic function undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6.3"
] | null | 5.3 | null | null |
RHSA-2012:1543 | Red Hat Security Advisory: CloudForms System Engine 1.1 update | katello: pulp admin password logged in plaintext in world-readable katello/production.log pulp /etc/pulp/pulp.conf world readable, contains default admin password Katello: lack of authorization in proxies_controller.rb grinder: /var/lib/pulp/cache/grinder directory is world-writeable | [
"cpe:/a:cloudforms_systemengine:1::el6",
"cpe:/a:cloudforms_tools:1::el5",
"cpe:/a:cloudforms_tools:1::el6"
] | null | null | null | null |
RHSA-2019:1172 | Red Hat Security Advisory: kernel security and bug fix update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 3.8 | null |
RHSA-2019:4109 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.7 | null |
RHSA-2013:0771 | Red Hat Security Advisory: curl security update | curl: Cookie domain suffix match vulnerability | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:0474 | Red Hat Security Advisory: acpid security update | acpid: too many open files DoS | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:8162 | Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update | 389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database 389-ds-base: SIGSEGV in sync_repl | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHBA-2021:1522 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6.29 security update | golang: crypto/elliptic: incorrect operations on the P-224 curve | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 6.5 | null | null |
RHSA-2023:3741 | Red Hat Security Advisory: c-ares security update | c-ares: 0-byte UDP payload Denial of Service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2025:1088 | Red Hat Security Advisory: ovn23.06 security update | ovn: egress ACLs may be bypassed via specially crafted UDP packet | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.1 | null | null |
RHSA-2019:1326 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R12 security and bug fix update | infinispan: Unsafe deserialization of malicious object injected into data cache | [
"cpe:/a:redhat:jboss_amq:6.3"
] | null | null | 8 | null |
RHSA-2014:0511 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.1 security update | tomcat: multiple content-length header poisoning flaws 1: Class Loader manipulation via request parameters | [
"cpe:/a:redhat:jboss_operations_network:3.2.1"
] | null | null | null | null |
RHSA-2022:1248 | Red Hat Security Advisory: OpenShift Container Platform 4.7.48 packages and security update | workflow-cps: OS command execution through crafted SCM contents workflow-cps-global-lib: OS command execution through crafted SCM contents workflow-multibranch: OS command execution through crafted SCM contents workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps: Password parameters are included from the original build in replayed builds workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability pipeline-build-step: Password parameter default values exposed | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 6.5 | null | null |
RHSA-2016:1626 | Red Hat Security Advisory: python security update | python: smtplib StartTLS stripping attack python: http protocol steam injection attack CGIHandler: sets environmental variable based on user supplied Proxy request header | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5 | null |
RHSA-2024:2930 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:logging:5.7::el8"
] | null | 7.5 | null | null |
RHSA-2016:0497 | Red Hat Security Advisory: git19-git security update | git: path_name() integer truncation and overflow leading to buffer overflow git: path_name() integer truncation and overflow leading to buffer overflow | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2023:4161 | Red Hat Security Advisory: OpenJDK 11.0.20 Security Update for Windows Builds | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:openjdk:11::windows"
] | null | 7.5 | null | null |
RHSA-2013:0681 | Red Hat Security Advisory: jakarta-commons-httpclient security update | jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | 3.7 | null |
RHSA-2018:1136 | Red Hat Security Advisory: glusterfs security update | glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled | [
"cpe:/a:redhat:storage:3.3:server:el7",
"cpe:/a:redhat:storage:3:client:el7",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 8.3 | null |
RHSA-2025:0372 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update | hornetq-core-client: Arbitrarily overwrite files or access sensitive information | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.1 | null | null |
RHSA-2023:0857 | Red Hat Security Advisory: pcs security update | sinatra: Reflected File Download attack | [
"cpe:/a:redhat:rhel_e4s:8.1::highavailability"
] | null | 8.8 | null | null |
RHSA-2024:1241 | Red Hat Security Advisory: postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 8 | null | null |
RHSA-2023:1471 | Red Hat Security Advisory: kpatch-patch security update | kernel: tun: avoid double free in tun_free_netdev ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2024:4370 | Red Hat Security Advisory: python3 security update | python: Path traversal on tempfile.TemporaryDirectory | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.8 | null | null |
RHSA-2022:0592 | Red Hat Security Advisory: kpatch-patch security update | kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: possible privileges escalation due to missing TLB flush kernel: failing usercopy allows for use-after-free exploitation | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7 | null | null |
RHSA-2018:2602 | Red Hat Security Advisory: kernel security update | Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 5.6 | null |
RHSA-2024:1495 | Red Hat Security Advisory: thunderbird security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2012:0531 | Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update | glibc: FORTIFY_SOURCE format string protection bypass via "nargs" integer overflow libtasn1: DER decoding buffer overflow (GNUTLS-SA-2012-3, MU-201202-02) gnutls: TLS record handling issue (GNUTLS-SA-2012-2, MU-201202-01) | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2008:0100 | Red Hat Security Advisory: java-1.4.2-bea security update | Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition java: Vulnerability in the font parsing code Security Vulnerability in Java Runtime Environment With Applet Caching Untrusted Application or Applet May Move or Copy Arbitrary Files Applets or Applications are allowed to display an oversized window Anti-DNS Pinning and Java Applets with HTTP proxy | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2017:2705 | Red Hat Security Advisory: kernel-rt security update | kernel: stack buffer overflow in the native Bluetooth stack | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7.5 | null |
RHSA-2011:1806 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.2 update | extension): MITM due to improper validation of AX attribute signatures | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.1"
] | null | null | null | null |
RHSA-2023:7474 | Red Hat Security Advisory: OpenShift Container Platform 4.13.24 security and extras update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHBA-2013:1150 | Red Hat Bug Fix Advisory: net-snmp bug fix update | net-snmp: snmpd crashes/hangs when AgentX subagent times-out | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2015:2457 | Red Hat Bug Fix Advisory: icedtea-web bug fix and enhancement update | icedtea-web: unexpected permanent authorization of unsigned applets icedtea-web: applet origin spoofing | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:2780 | Red Hat Security Advisory: nodejs:18 security update | nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2024:7436 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.17.0 product release | The components for Red Hat OpenShift for Windows Containers 10.17.0 are now available. This product release includes bug fixes and security updates for the
following packages: windows-machine-config-operator and
windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section. | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | null | null | null |
RHSA-2020:0689 | Red Hat Security Advisory: OpenShift Container Platform 4.2.22 skopeo security update | proglottis/gpgme: Use-after-free in GPGME bindings during container image pull | [
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:1422 | Red Hat Security Advisory: postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8 | null | null |
RHSA-2018:2887 | Red Hat Security Advisory: qemu-kvm-rhev security update | QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.1 | null |
RHSA-2024:1019 | Red Hat Security Advisory: kernel-rt security update | kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: GSM multiplexing race condition leads to privilege escalation kernel: inactive elements in nft_pipapo_walk kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7.8 | null | null |
RHSA-2024:3318 | Red Hat Security Advisory: kernel security update | kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2024:9524 | Red Hat Security Advisory: libsoup security update | libsoup: HTTP request smuggling via stripping null bytes from the ends of header names | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.5 | null | null |
RHSA-2021:0659 | Red Hat Security Advisory: firefox security update | Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2024:6159 | Red Hat Security Advisory: orc security update | orc: Stack-based buffer overflow vulnerability in ORC | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.7 | null | null |
RHSA-2023:5209 | Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update | kernel: Intel firmware update for insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors kernel: Intel firmware update for Incorrect default permissions in some memory controller configurations openssl: X.400 address type confusion in X.509 GeneralName | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.4 | null | null |
RHSA-2010:0651 | Red Hat Security Advisory: spice-xpi security and bug fix update | spice-xpi/qspice-client unix socket race spice-xpi symlink attack | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2021:0833 | Red Hat Security Advisory: OpenShift Container Platform 3.11.404 security and bug fix update | golang-github-gorilla-websocket: integer overflow leads to denial of service | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7.5 | null | null |
RHSA-2021:3723 | Red Hat Security Advisory: samba security, bug fix and enhancement update | samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token | [
"cpe:/a:redhat:storage:3.5:samba:el7"
] | null | 6.8 | null | null |
RHSA-2024:5202 | Red Hat Security Advisory: OpenShift Container Platform 4.12.63 packages and security update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2014:2021 | Red Hat Security Advisory: jasper security update | jasper: double-free in in jas_iccattrval_destroy() (oCERT-2014-012) jasper: heap overflow in jp2_decode() (oCERT-2014-012) jasper: incorrect component number check in COC, RGN and QCC marker segment decoders (oCERT-2014-009) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2012:1203 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: code execution flaw (APSB12-18) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: cross-domain information leak flaw (APSB12-19) flash-plugin: arbitrary code exec via integer overflow in copyRawDataTo method in Matrix3D class | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2006:0598 | Red Hat Security Advisory: gimp security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2003:012 | Red Hat Security Advisory: : : : Updated CVS packages available | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2022:6592 | Red Hat Security Advisory: kpatch-patch security update | kernel: heap overflow in nft_set_elem_init() | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2024:1323 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: use-after-free in sch_qfq network scheduler kernel: out-of-bounds write in qfq_change_class function kernel: IGB driver inadequate buffer size for frames larger than MTU | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.5 | null | null |
RHSA-2016:2040 | Red Hat Security Advisory: python-django security update | python-django: CSRF protection bypass on a site with Google Analytics | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 6.1 | null |
RHSA-2024:1557 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift Builds 1.0.1 | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift_builds:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2024:1832 | Red Hat Security Advisory: squid:4 security update | squid: Denial of Service in HTTP Chunked Decoding squid: denial of service in HTTP header parser | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.6 | null | null |
RHSA-2019:0911 | Red Hat Security Advisory: Red Hat Ceph Storage 3.2 security, bug fix, and enhancement update | grafana: Cross-site Scripting (XSS) in dashboard links grafana: File exfiltration | [
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | null | 6.5 | null |
RHSA-2025:0144 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2025:2998 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: out-of-bounds write vulnerability | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:6726 | Red Hat Security Advisory: fence-agents security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 8.8 | null | null |
RHSA-2022:8353 | Red Hat Security Advisory: python3.9 security, bug fix, and enhancement update | python: mailcap: findmatch() function does not sanitize the second argument python: open redirection vulnerability in lib/http/server.py may lead to information disclosure | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.4 | null | null |
RHSA-2008:0549 | Red Hat Security Advisory: firefox security update | Firefox malformed web content flaws Firefox javascript arbitrary code execution Firefox XSS attacks Firefox arbitrary signed JAR code execution Firefox arbitrary JavaScript code execution Firefox javascript arbitrary code execution Firefox arbitrary file disclosure Firefox .properties memory leak Firefox file location escaping flaw Firefox self signed certificate flaw Firefox arbitrary file disclosure Firefox block reflow flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:5607 | Red Hat Security Advisory: linux-firmware security and enhancement update | hw: amd: Cross-Process Information Leak | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 6.5 | null | null |
RHSA-2003:335 | Red Hat Security Advisory: : Updated Net-SNMP packages fix security and other bugs | security flaw | [
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2015:0287 | Red Hat Security Advisory: foreman-proxy security update | foreman-proxy: failure to verify SSL certificates | [
"cpe:/a:redhat:openstack-installer:5::el6"
] | null | null | null | null |
RHSA-2012:0743 | Red Hat Security Advisory: kernel security and bug fix update | kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl() kernel: thp: __split_huge_page() mapcount != page_mapcount BUG_ON() kernel: macvtap: zerocopy: vector length is not validated before pinning user pages kvm: device assignment page leak kernel: fcaps: clear the same personality flags as suid when fcaps are used kernel: net: insufficient data_len validation in sock_alloc_send_pskb() kernel: kvm: buffer overflow in kvm_set_irq() kernel: rds-ping cause kernel panic kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race condition | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
Subsets and Splits