id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2020:3382
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
7.5
null
null
RHSA-2019:4019
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7" ]
null
null
7.5
null
RHBA-2021:2854
Red Hat Bug Fix Advisory: Migration Toolkit for Containers (MTC) 1.4.6 release advisory
libwebp: heap-based buffer overflow in PutLE16() nss: TLS 1.3 CCS flood remote DoS Attack openldap: NULL pointer dereference for unauthenticated packet in slapd kernel: security bypass in certs/blacklist.c and certs/system_keyring.c jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS libwebp: heap-based buffer overflow in WebPDecode*Into functions libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c lz4: memory corruption due to an integer overflow bug caused by memmove argument libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms rpm: Signature checks bypass via corrupted rpm package jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
[ "cpe:/a:redhat:rhmt:1.4::el7", "cpe:/a:redhat:rhmt:1.4::el8" ]
null
7.8
null
null
RHSA-2024:0714
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 Security update
jgit: arbitrary file overwrite santuario: Private Key disclosure in debug-log output
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
6.5
null
null
RHSA-2008:0512
Red Hat Security Advisory: XFree86 security update
X.org Record and Security extensions memory corruption X.org MIT-SHM extension arbitrary memory read X.org Render extension AllocateGlyph() heap buffer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2011:0843
Red Hat Security Advisory: postfix security update
(smtpd): Crash due to improper management of SASL handlers for SMTP sessions
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2017:3216
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update
keycloak: SAML request parser replaces special strings with system properties
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
6.5
null
RHSA-2017:0448
Red Hat Security Advisory: ansible and openshift-ansible security and bug fix update
Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
[ "cpe:/a:redhat:openshift:3.2::el7", "cpe:/a:redhat:openshift:3.3::el7", "cpe:/a:redhat:openshift:3.4::el7" ]
null
null
6.6
null
RHSA-2024:11049
Red Hat Security Advisory: squid security update
squid: Request/Response smuggling in HTTP/1.1 and ICAP
[ "cpe:/o:redhat:rhel_els:7" ]
null
9.3
null
null
RHSA-2012:1577
Red Hat Security Advisory: java-1.4.2-ibm-sap End of Support Notice
The java-1.4.2-ibm-sap packages shipped in the Red Hat Enterprise Linux 5 and 6 for SAP RHN repositories are no longer supported for SAP products. As a result, these packages will no longer be updated and may contain security flaws. Users are advised to migrate to the supported version of SAP certified Java.
[ "cpe:/a:redhat:rhel_extras_sap:5" ]
null
null
null
null
RHSA-2017:2838
Red Hat Security Advisory: dnsmasq security update
dnsmasq: heap overflow in the code responsible for building DNS replies
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
RHSA-2020:1150
Red Hat Security Advisory: qemu-kvm-ma security update
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
5.6
null
null
RHSA-2016:1296
Red Hat Security Advisory: ocaml security update
ocaml: sizes arguments are sign-extended from 32 to 64 bits
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:6274
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.3.0 operator/operand containers
Red Hat OpenShift distributed tracing 3.3.0
[ "cpe:/a:redhat:openshift_distributed_tracing:3.3::el8" ]
null
null
null
null
RHSA-2020:1126
Red Hat Security Advisory: mutt security update
mutt: IMAP header caching path traversal vulnerability
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2021:3088
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
RHSA-2007:0356
Red Hat Security Advisory: libpng security update
libpng DoS libpng png_handle_tRNS flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2007:1045
Red Hat Security Advisory: net-snmp security update
net-snmp remote DoS via udp packet
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:7046
Red Hat Security Advisory: dnsmasq security and bug fix update
dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2015:1862
Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 7 director update
openstack-tripleo-heat-templates: unsafe pipeline ordering of swift staticweb middleware
[ "cpe:/a:redhat:openstack-director:7::el7" ]
null
null
null
null
RHSA-2018:0031
Red Hat Security Advisory: libvirt security update
An update for libvirt is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
null
null
RHSA-2015:0416
Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update
389-ds-base: information disclosure through 'cn=changelog' subtree 389-ds-base: password hashing bypassed when "nsslapd-unhashed-pw-switch" is set to off
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:1264
Red Hat Security Advisory: systemd security and bug fix update
systemd: line splitting via fgets() allows for state injection during daemon-reexec systemd: out-of-bounds read when parsing a crafted syslog message
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
4.3
null
RHSA-2008:0857
Red Hat Security Advisory: kernel security and bug fix update
kernel snd_seq_oss_synth_make_info leak Linux kernel local filesystem DoS Linux kernel dccp_setsockopt_change() integer overflow Linux kernel sctp_setsockopt_auth_key() integer overflow kernel: tmpfs: fix kernel BUG in shmem_delete_inode kernel: fix off-by-one error in iov_iter_advance() kernel: sctp: fix potential panics in the SCTP-AUTH API kernel: nfsd: fix buffer overrun decoding NFSv4 acl kernel: sctp_getsockopt_hmac_ident information disclosure kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2005:823
Red Hat Security Advisory: fetchmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2018:2419
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.4.11 security update
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_bpms:6.4" ]
null
null
8.1
null
RHSA-2011:0303
Red Hat Security Advisory: kernel security and bug fix update
kernel: unix socket local dos kernel: unlimited socket backlog DoS kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl kernel: unlimited socket backlog DoS
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2002:101
Red Hat Security Advisory: : Updated mailman packages available
security flaw
[ "cpe:/a:redhat:secure_web_server:3.2" ]
null
null
null
null
RHSA-2020:2798
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1 servicemesh-proxy security update
envoy: Resource exhaustion when accepting too many connections envoy: Resource exhaustion when proxying HTTP/2 requests or responses with small data frames envoy: Resource exhaustion via HTTP/2 client requests with large payloads and improper stream windows envoy: Resource exhaustion when processing HTTP/1.1 headers with long field names
[ "cpe:/a:redhat:service_mesh:1.1::el8" ]
null
7.5
null
null
RHSA-2003:117
Red Hat Security Advisory: openssl security update for Stronghold
security flaw security flaw
[ "cpe:/a:redhat:stronghold:3" ]
null
null
null
null
RHSA-2020:0111
Red Hat Security Advisory: firefox security update
Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
8.8
null
RHSA-2023:2161
Red Hat Security Advisory: fence-agents security and bug fix update
python-oauthlib: DoS when attacker provides malicious IPV6 URI
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
6.5
null
null
RHSA-2023:5224
Red Hat Security Advisory: thunderbird security update
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
0
null
null
RHSA-2016:0329
Red Hat Security Advisory: openstack-swift security update
openstack-swift: Information leak via Swift tempurls openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects
[ "cpe:/a:redhat:storage:3.1:server:el6" ]
null
null
null
null
RHSA-2013:0839
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.1.0 update
Web: jsessionid exposed via encoded url when using cookie based session tracking JBoss: custom authorization module implementations shared between applications apache-cxf: XML encryption backwards compatibility attacks tomcat: Session fixation in form authenticator
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2016:0723
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) OpenJDK: insufficient DSA key parameters checks (Security, 8138593) OpenJDK: incorrect handling of surrogate pairs in XML attribute values (JAXP, 8143167) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2007:0395
Red Hat Security Advisory: mod_perl security update
mod_perl PerlRun denial of service
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:3803
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Out of bounds write in V8 chromium-browser: Use after frees in PDFium chromium-browser: Heap buffer overflow in Skia chromium-browser: Use after free in PDFium chromium-browser: Use after free in Blink chromium-browser: Heap buffer overflow in Canvas chromium-browser: Use after free in WebAudio chromium-browser: Use after free in MediaRecorder chromium-browser: Heap buffer overflow in Blink chromium-browser: Out of bounds write in V8 chromium-browser: Use after free in Skia chromium-browser: Inappropriate implementation in Extensions chromium-browser: Inappropriate implementation in Site Isolation chromium-browser: Incorrect security UI in Blink chromium-browser: Inappropriate implementation in Navigation chromium-browser: Inappropriate implementation in Omnibox chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in Navigation chromium-browser: Inappropriate implementation in Media chromium-browser: Inappropriate implementation in Network Authentication chromium-browser: Insufficient data validation in Shell Integration chromium-browser: Insufficient policy enforcement in URL Formatter mozilla: Use after free in Skia chromium-browser: Insufficient policy enforcement in URL Formatter chromium-browser: Insufficient policy enforcement in Proxy chromium-browser: Out of bounds read in V8
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
6.5
null
RHSA-2021:3477
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.18
sssd: shell command injection in sssctl kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c libX11: missing request length checks kernel: race condition for removal of the HCI controller
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
7
null
null
RHSA-2018:1129
Red Hat Security Advisory: kernel security and bug fix update
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution permission faults handling
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.5
null
RHSA-2020:3643
Red Hat Security Advisory: thunderbird security update
Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
8.8
null
null
RHSA-2024:0845
Red Hat Security Advisory: OpenShift Container Platform 4.13.34 security update
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
8.1
null
null
RHSA-2022:0892
Red Hat Security Advisory: libarchive security update
libarchive: extracting a symlink with ACLs modifies ACLs of target libarchive: symbolic links incorrectly followed when changing modes, times, ACL and flags of a file while extracting an archive
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.1
null
null
RHSA-2003:193
Red Hat Security Advisory: kdelibs security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:0125
Red Hat Security Advisory: tomcat security update
tomcat: Open Redirect vulnerability in FORM authentication tomcat: FileUpload: DoS due to accumulation of temporary files on Windows tomcat: improper cleaning of recycled objects could lead to information leak tomcat: incorrectly parsed http trailer headers can cause request smuggling
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2024:1388
Red Hat Security Advisory: ovn23.03 security update
ovn: insufficient validation of BFD packets may lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
RHSA-2017:3244
Red Hat Security Advisory: Red Hat JBoss Data Grid 7.1.1 security update
client: unchecked deserialization in marshaller util undertow: IO thread DoS via unclean Websocket closing log4j: Socket receiver deserialization vulnerability Solr: Code execution via entity expansion log4j: deserialization of untrusted data in SocketServer
[ "cpe:/a:redhat:jboss_data_grid:7.1" ]
null
9.8
9.8
null
RHSA-2019:2110
Red Hat Security Advisory: rsyslog security and bug fix update
rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2022:6224
Red Hat Security Advisory: openssl security and bug fix update
openssl: c_rehash script allows command injection openssl: Signer certificate verification returns inaccurate response when using OCSP_NOCHECKS openssl: OPENSSL_LH_flush() breaks reuse of memory openssl: the c_rehash script allows command injection openssl: AES OCB fails to encrypt some bytes
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
RHSA-2021:2380
Red Hat Security Advisory: servicemesh-operator security update
servicemesh-operator: NetworkPolicy resources incorrectly specify ports for ingress resources
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
9.8
null
null
RHSA-2010:0755
Red Hat Security Advisory: cups security update
xpdf/poppler: ImageStream:: ImageStream integer overflow xpdf: uninitialized Gfx::parser pointer dereference
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:1802
Red Hat Security Advisory: unbound security update
unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8
null
null
RHSA-2023:4172
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
3.7
null
null
RHSA-2017:0190
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (MFSA 2017-01) Mozilla: Excessive JIT code allocation allows bypass of ASLR and DEP (MFSA 2017-02) Mozilla: Use-after-free in XSL (MFSA 2017-02) Mozilla: Pointer and frame data leakage of Javascript objects (MFSA 2017-02) Mozilla: Potential use-after-free during DOM manipulations (MFSA 2017-02) Mozilla: Location bar spoofing with unicode characters (MFSA 2017-02) Mozilla: WebExtensions can use data: protocol to affect other extensions (MFSA 2017-02) Mozilla: Insecure communication methods in Developer Tools JSON viewer (MFSA 2017-02) Mozilla: Use-after-free with Media Decoder (MFSA 2017-02)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2021:4686
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Use-after-free leading to arbitrary code execution
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2019:1700
Red Hat Security Advisory: python27-python security update
python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms python: regression of CVE-2019-9636 due to functional fix to allow port numbers in netloc
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
9.8
null
RHSA-2021:0219
Red Hat Security Advisory: sudo security update
sudo: Heap buffer overflow in argument parsing
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
RHSA-2024:4622
Red Hat Security Advisory: libndp security update
libndp: buffer overflow in route information length field
[ "cpe:/o:redhat:rhel_els:7" ]
null
8.1
null
null
RHSA-2024:2394
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c kernel: Bluetooth: L2CAP: Fix u8 overflow kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: cxgb4: use-after-free in ch_flower_stats_cb() kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get kernel: local dos vulnerability in scatterwalk_copychunks kernel: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF kernel: GSM multiplexing race condition leads to privilege escalation kernel: null pointer dereference vulnerability in nft_dynset_init() kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: use-after-free in IPv4 IGMP kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: Bluetooth: HCI: global out-of-bounds access in net/bluetooth/hci_sync.c kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: usb: out-of-bounds read in read_descriptors kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() kernel: netfilter: xtables sctp out-of-bounds read in match_flags() kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() kernel: netfilter: race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: NULL pointer dereference vulnerability in io_uring_show_fdinfo kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: use-after-free in net/atm/ioctl.c kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: intel: Fix NULL pointer dereference issue in upi_fill_topology() kernel: perf/x86/lbr: Filter vsyscall addresses kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: net: fix possible store tearing in neigh_periodic_work() kernel: HID: sony: Fix a potential memory leak in sony_probe() kernel: team: NULL pointer dereference when team device type is changed kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: net/core: kernel crash in ETH_P_1588 flow dissector kernel: netfilter: nf_tables: memory leak when more than 255 elements expired kernel: KVM: s390: fix setting of fpc register kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: netfilter: nf_tables: disallow timeout for anonymous sets kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: untrusted VMM can trigger int80 syscall handling kernel: tls: use-after-free with partial reads and async decrypt kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: i2c: i801: Fix block process call transactions kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters kernel: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() kernel: blk-mq: fix IO hang from sbitmap wakeup race kernel: i40e: Do not allow untrusted VF to remove administratively set MAC
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.4
null
null
RHSA-2021:1214
Red Hat Security Advisory: libldb security update
samba: Out of bounds read in AD DC LDAP server
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.1
null
null
RHSA-2023:2653
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Regression of CVE-2023-28205 fixes in the Red Hat Enterprise Linux
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2024:8856
Red Hat Security Advisory: kernel security update
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: gso: do not skip outer ip header in case of ipip and net_failover kernel: dmaengine: fix NULL pointer in channel unregistration function kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range kernel: netfilter: nft_set_pipapo: do not free live element kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump kernel: nouveau: lock the client object tree. kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: dma-direct: Leak pages on dma_set_decrypted() failure kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: of: module: add buffer overflow check in of_modalias() kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. kernel: net/mlx5e: Fix netif state handling kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type kernel: drm/i915/dpt: Make DPT object unshrinkable kernel: ipv6: prevent possible NULL deref in fib6_nh_init() kernel: tipc: force a dst refcount before doing decryption kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: bpf: Fix overrunning reservations in ringbuf kernel: netfilter: nf_tables: prefer nft_chain_validate kernel: ibmvnic: Add tx check to prevent skb leak kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers kernel: drm/amdgpu: avoid using null object of framebuffer kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush kernel: USB: serial: mos7840: fix crash on resume kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error kernel: kobject_uevent: Fix OOB access within zap_modalias_env() kernel: dev/parport: fix the array out-of-bounds risk kernel: block: initialize integrity buffer to zero before writing it to media kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() kernel: memcg: protect concurrent access to mem_cgroup_idr kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). kernel: bonding: fix xfrm real_dev null pointer dereference kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok kernel: netfilter: flowtable: initialise extack before use kernel: ethtool: check device is present when getting link settings kernel: ELF: fix kernel.randomize_va_space double read kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.7
null
null
RHSA-2022:8222
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
RHSA-2007:1037
Red Hat Security Advisory: openldap security and enhancement update
openldap slapd DoS via objectClasses attribute
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:0831
Red Hat Security Advisory: rh-nodejs12-nodejs security update
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2018:1933
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Out of bounds write in V8
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHEA-2021:2679
Red Hat Enhancement Advisory: ACS 3.62 enhancement update
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
[ "cpe:/a:redhat:advanced_cluster_security:3.62::el8" ]
null
5.9
null
null
RHSA-2016:2042
Red Hat Security Advisory: python-django security update
python-django: CSRF protection bypass on a site with Google Analytics
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
6.1
null
RHSA-2023:7029
Red Hat Security Advisory: libX11 security update
libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.3
null
null
RHSA-2022:5475
Red Hat Security Advisory: thunderbird security update
Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: An email with a mismatching OpenPGP signature date was accepted as valid Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
7.5
null
RHSA-2023:6784
Red Hat Security Advisory: Node Health Check Operator 0.6.1 security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:workload_availability_node_healthcheck:0.6::el8" ]
null
7.5
null
null
RHSA-2001:060
Red Hat Security Advisory: : Updated Kerberos 5 packages available
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2025:1230
Red Hat Security Advisory: kernel-rt security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.3
null
null
RHSA-2007:0336
Red Hat Security Advisory: postgresql security update
PostgreSQL security-definer function privilege escalation
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0249
Red Hat Security Advisory: java-21-openjdk security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.4
null
null
RHSA-2023:3262
Red Hat Security Advisory: sudo security update
sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
7.8
null
null
RHSA-2015:1840
Red Hat Security Advisory: openldap security update
openldap: ber_get_next denial of service vulnerability
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHBA-2019:0763
Red Hat Bug Fix Advisory: redhat-virtualization-host security update
python: Information Disclosure due to urlsplit improper NFKC normalization
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
9.8
null
RHSA-2019:0218
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free parsing HTML5 stream Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 Mozilla: Privilege escalation through IPC channel messages
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
10
null
RHSA-2024:1832
Red Hat Security Advisory: squid:4 security update
squid: Denial of Service in HTTP Chunked Decoding squid: denial of service in HTTP header parser
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.6
null
null
RHSA-2021:5055
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
5.4
6.1
null
RHSA-2022:0482
Red Hat Security Advisory: Red Hat Ansible Ansible Tower 3.8 security update
ansible-tower: Privilege escalation via job isolation escape
[ "cpe:/a:redhat:ansible_automation_platform:3.8::el7", "cpe:/a:redhat:ansible_automation_platform:3.8::el8" ]
null
8.8
null
null
RHSA-2024:0962
Red Hat Security Advisory: thunderbird security update
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2019:4018
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" ]
null
null
7.5
null
RHSA-2018:3242
Red Hat Security Advisory: glusterfs security, bug fix, and enhancement update
glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2014:1255
Red Hat Security Advisory: krb5 security update
krb5: buffer overrun in kadmind with LDAP backend (MITKRB5-SA-2014-001)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:3925
Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security, enhancements, and bug fix update
grafana: account takeover possible when using Azure AD OAuth grafana: incorrect assessment of permissions across organizations go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:ceph_storage:7.1::el8", "cpe:/a:redhat:ceph_storage:7.1::el9" ]
null
8.1
null
null
RHSA-2011:1401
Red Hat Security Advisory: xen security and bug fix update
qemu: local DoS with SCSI CD-ROM
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2009:1193
Red Hat Security Advisory: kernel security and bug fix update
kernel: non-root can trigger cpu_idle soft lockup kernel: e1000_clean_rx_irq() denial of service kernel: do_coredump() vs ptrace_start() deadlock kernel: r8169: fix crash when large packets are received kernel: personality: fix PER_CLEAR_ON_SETID kernel: ecryptfs stack overflow in parse_tag_11_packet() kernel: ecryptfs heap overflow in parse_tag_3_packet()
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:5.3" ]
null
null
null
null
RHSA-2020:0568
Red Hat Security Advisory: ksh security update
ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.4
null
null
RHSA-2016:0489
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2.9 security, bug fix, and enhancement update
ObjectMessage: unsafe deserialization jenkins: Project name disclosure via fingerprints (SECURITY-153) jenkins: Public value used for CSRF protection salt (SECURITY-169) jenkins: XXE injection into job configurations via CLI (SECURITY-173) jenkins: Secret key not verified when connecting a slave (SECURITY-184) jenkins: Information disclosure via sidepanel (SECURITY-192) jenkins: Local file inclusion vulnerability (SECURITY-195) jenkins: API tokens of other users available to admins (SECURITY-200) jenkins: Queue API did show items not visible to the current user (SECURITY-186) jenkins: JNLP slaves not subject to slave-to-master access control (SECURITY-206) jenkins: Stored XSS vulnerability in slave offline status message (SECURITY-214) jenkins: CSRF vulnerability in some administrative actions (SECURITY-225) jenkins: CSRF protection ineffective (SECURITY-233) jenkins: Jenkins plugin manager vulnerable to MITM attacks (SECURITY-234) jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218)
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2020:2049
Red Hat Security Advisory: thunderbird security update
usrsctp: Buffer overflow in AUTH chunk input validation Mozilla: Use-after-free during worker shutdown Mozilla: Arbitrary local file access with 'Copy as cURL' Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 Mozilla: Sender Email Address Spoofing using encoded Unicode characters
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
4.3
6.1
null
RHSA-2021:4057
Red Hat Security Advisory: python3 security update
python: urllib: Regular expression DoS in AbstractBasicAuthHandler
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2022:4919
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 8
jackson-databind: denial of service via a large depth of nested objects netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors h2: Loading of custom classes from remote servers through JNDI xerces-j2: infinite loop when handling specially crafted XML document payloads artemis-commons: Apache ActiveMQ Artemis DoS Moment.js: Path traversal in moment.locale
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
7.5
null
null
RHSA-2021:3638
Red Hat Security Advisory: nodejs:12 security and bug fix update
c-ares: Missing input validation of host names may lead to domain hijacking libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.1
null
null
RHSA-2023:0048
Red Hat Security Advisory: grub2 security and bug fix update
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.1
null
null
RHSA-2022:0271
Red Hat Security Advisory: polkit security update
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
7.8
null
null
RHSA-2021:5094
Red Hat Security Advisory: OpenShift Container Platform 3.11.z security update
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
8.1
null
null
RHSA-2016:0447
Red Hat Security Advisory: samba security and bug fix update
samba: Incorrect ACL get/set allowed on symlink path
[ "cpe:/a:redhat:storage:3.1:samba:el6", "cpe:/a:redhat:storage:3.1:samba:el7" ]
null
null
null
null
RHSA-2007:0012
Red Hat Security Advisory: kernel security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null