id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:8906 | Red Hat Security Advisory: Satellite 6.16.0 release | micromatch: vulnerable to Regular Expression Denial of Service github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp puppet-foreman: An authentication bypass vulnerability exists in Foreman grpc: client communicating with a HTTP/2 proxy can poison the HPACK table between the proxy and the backend puppet-pulpcore: An authentication bypass vulnerability exists in pulpcore mosquitto: sending specific sequences of packets may trigger memory leak foreman: Read-only access to entire DB from templates node-tar: denial of service while parsing a tar file due to lack of folders depth validation urllib3: proxy-authorization request header is not stripped during cross-origin redirects python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() python-django: Potential SQL injection in QuerySet.values() and values_list() | [
"cpe:/a:redhat:satellite:6.16::el8",
"cpe:/a:redhat:satellite:6.16::el9",
"cpe:/a:redhat:satellite_capsule:6.16::el8",
"cpe:/a:redhat:satellite_capsule:6.16::el9",
"cpe:/a:redhat:satellite_maintenance:6.16::el8",
"cpe:/a:redhat:satellite_maintenance:6.16::el9",
"cpe:/a:redhat:satellite_utils:6.16::el8",
"cpe:/a:redhat:satellite_utils:6.16::el9"
] | null | 7.3 | 9.8 | null |
RHSA-2024:1549 | Red Hat Security Advisory: ACS 4.3 enhancement and security update | helm: shows secrets with --dry-run option in clear text go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients helm: Missing YAML Content Leads To Panic | [
"cpe:/a:redhat:advanced_cluster_security:4.3::el8"
] | null | 7.5 | null | null |
RHSA-2024:4827 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2023:3660 | Red Hat Security Advisory: c-ares security update | c-ares: 0-byte UDP payload Denial of Service | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2024:3619 | Red Hat Security Advisory: kernel security and bug fix update | kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2022:4808 | Red Hat Security Advisory: rsyslog and rsyslog7 security update | rsyslog: Heap-based overflow in TCP syslog server | [
"cpe:/o:redhat:rhel_els:6"
] | null | 8.1 | null | null |
RHSA-2015:1185 | Red Hat Security Advisory: nss security update | NSS: incorrectly permited skipping of ServerKeyExchange (MFSA 2015-71) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2023:5455 | Red Hat Security Advisory: glibc security update | glibc: Stack read overflow in getaddrinfo in no-aaaa mode glibc: potential use-after-free in getaddrinfo() glibc: potential use-after-free in gaih_inet() glibc: buffer overflow in ld.so leading to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2016:2819 | Red Hat Security Advisory: memcached security update | memcached: Server append/prepend remote code execution memcached: Server update remote code execution memcached: SASL authentication remote code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2025:1120 | Red Hat Security Advisory: OpenShift Container Platform 4.17.16 bug fix and security update | python: Path traversal on tempfile.TemporaryDirectory unbound: Unbounded name compression could lead to Denial of Service rsync: Info Leak via Uninitialized Stack Contents golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 7.5 | null | null |
RHSA-2006:0354 | Red Hat Security Advisory: elfutils security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:2678 | Red Hat Security Advisory: rh-postgresql94-postgresql security update | postgresql: Empty password accepted in some authentication methods postgresql: pg_user_mappings view discloses passwords to users lacking server privileges postgresql: lo_put() function ignores ACLs | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5.4 | null |
RHSA-2018:1252 | Red Hat Security Advisory: kernel security and bug fix update | kernel: exec/ptrace: get_dumpable() incorrect tests hw: cpu: speculative execution branch target injection | [
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 5.6 | null |
RHSA-2012:1605 | Red Hat Security Advisory: Fuse MQ Enterprise 7.1.0 update | jetty: hash table collisions CPU usage DoS (oCERT-2011-003) | [
"cpe:/a:redhat:fuse_mq_enterprise:7.1.0"
] | null | null | null | null |
RHSA-2024:5324 | Red Hat Security Advisory: firefox security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/o:redhat:rhel_els:7"
] | null | 6.1 | null | null |
RHSA-2020:4072 | Red Hat Security Advisory: libcroco security update | libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | null | null |
RHSA-2012:0149 | Red Hat Security Advisory: kvm security and bug fix update | kernel: kvm: device assignment DoS | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2019:1594 | Red Hat Security Advisory: redhat-virtualization-host security update | Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.3 | null |
RHSA-2017:2707 | Red Hat Security Advisory: kernel security and bug fix update | kernel: stack buffer overflow in the native Bluetooth stack | [
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.5::server"
] | null | null | 7.5 | null |
RHSA-2022:7009 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 3.7 | null | null |
RHSA-2019:0832 | Red Hat Security Advisory: polkit security update | polkit: Temporary auth hijacking via PID reuse and non-atomic fork | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 7.3 | null |
RHSA-2002:244 | Red Hat Security Advisory: apache, mod_ssl, php security update for Stronghold | security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2015:0126 | Red Hat Security Advisory: rhev-hypervisor6 security update | openssl: TLS protocol downgrade attack openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash kernel: kvm: PIT timer race condition kernel: kvm: vmx: invept vm exit not handled kernel: kvm: vmx: invvpid vm exit not handled glibc: __nss_hostname_digits_dots() heap-based buffer overflow | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2025:3930 | Red Hat Security Advisory: RHACS 4.7 security update | http-proxy-middleware: Denial of Service redoc: Prototype Pollution in redoc golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing | [
"cpe:/a:redhat:advanced_cluster_security:4.7::el8"
] | null | 7.5 | null | null |
RHSA-2015:1635 | Red Hat Security Advisory: sqlite security update | sqlite: use of uninitialized memory when parsing collation sequences in src/where.c sqlite: invalid free() in src/vdbe.c sqlite: stack buffer overflow in src/printf.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:6891 | Red Hat Security Advisory: firefox update | mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Firefox did not ask before openings news: links in an external application mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2013:1101 | Red Hat Security Advisory: virtio-win security update | qemu: qemu-ga win32 service unquoted search path | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:3057 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2023:4838 | Red Hat Security Advisory: cups security update | cups: Information leak through Cups-Get-Document operation | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2009:0005 | Red Hat Security Advisory: gnome-vfs, gnome-vfs2 security update | grip,libcdaudio: buffer overflow caused by large amount of CDDB replies | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:0501 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use after free in dccp protocol | [
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2024:8830 | Red Hat Security Advisory: bpftrace security update | bpftrace: unprivileged users can force loading of compromised linux headers | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 2.8 | null | null |
RHSA-2022:6165 | Red Hat Security Advisory: thunderbird security update | Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2023:7856 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 8 | keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 7.7 | null | null |
RHSA-2013:1763 | Red Hat Security Advisory: ruby193-ruby security update | ruby: heap overflow in floating point parsing | [
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2005:745 | Red Hat Security Advisory: vim security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:5574 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2020:4352 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2025:2903 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.18.0 | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:openshift_pipelines:1.18::el9"
] | null | 7.5 | null | null |
RHSA-2019:2974 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 security update | wildfly-security-manager: security manager authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 7.5 | null |
RHSA-2011:1307 | Red Hat Security Advisory: jbossws security update | JBossWS remote Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3"
] | null | null | null | null |
RHSA-2019:0997 | Red Hat Security Advisory: python3 security update | python: Information Disclosure due to urlsplit improper NFKC normalization | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 9.8 | null |
RHSA-2016:1628 | Red Hat Security Advisory: python27-python security update | python: smtplib StartTLS stripping attack python: http protocol steam injection attack CGIHandler: sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5 | null |
RHBA-2019:0619 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.9 bug fix update | kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp` | [
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 5.3 | null |
RHSA-2009:0259 | Red Hat Security Advisory: mod_auth_mysql security update | mod_auth_mysql: character encoding SQL injection flaw | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4943 | Red Hat Security Advisory: httpd security update | httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2019:0485 | Red Hat Security Advisory: tomcat security update | tomcat: Open redirect in default servlet | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2021:4595 | Red Hat Security Advisory: binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.5 | null | null |
RHSA-2010:0043 | Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update | xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass OpenJDK remote LDAP Denial-Of-Service (6717680) OpenJDK LDAP client remote code execution (6737315) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997) OpenJDK GIF processing buffer overflow vulnerability (6804998) OpenJDK: Type1 font processing buffer overflow vulnerability OpenJDK: DoS (disk consumption) via handling of temporary font files OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639) OpenJDK: Files disclosure, arbitrary code execution via "deserializing applets" (6646860) OpenJDK: Intended access restrictions bypass via LiveConnect (6724331) OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490) OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948) OpenJDK: Signed applet remote misuse possibility (6782871) JDK: XML parsing Denial-Of-Service (6845701) OpenJDK Untrusted applet System properties access (6738524) OpenJDK Proxy mechanism information leaks (6801071) OpenJDK Proxy mechanism information leaks (6801071) OpenJDK proxy mechanism allows non-authorized socket connections (6801497) Java Web Start Buffer JPEG processing integer overflow (6823373) Java Web Start Buffer unpack200 processing integer overflow (6830335) JRE applet launcher vulnerability java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752) java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824) java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 | [
"cpe:/a:redhat:network_satellite:5.3::el4",
"cpe:/a:redhat:network_satellite:5.3::el5"
] | null | null | null | null |
RHSA-2013:0169 | Red Hat Security Advisory: vino security update | vino: Out of bounds read flaw by processing certain client raw encoding framebuffer update requests vino: Out of bounds read flaw by processing certain client tight encoding framebuffer update requests vino: vino-preferences incorrectly indicates that computer is only reachable over local network vino-preferences does not warn about UPnP especially with no password and no confirmation. vino: information leak and authentication bypass | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:0447 | Red Hat Security Advisory: krb5 security update | krb5: kadmind invalid pointer free() (MITKRB5-SA-004) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:2633 | Red Hat Security Advisory: updated rhceph-6.1 container image | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients grafana: Improper priviledge managent for users with data source permissions | [
"cpe:/a:redhat:ceph_storage:6.1::el9"
] | null | 6 | null | null |
RHSA-2024:6145 | Red Hat Security Advisory: postgresql security update | postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2022:0246 | Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update | nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-normalize-url: ReDoS for data URLs nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2019:1180 | Red Hat Security Advisory: libvirt security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.8 | null |
RHSA-2017:2077 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | Kernel: fs: VFS denial of service Kernel: fs: umount denial of service kernel: ext4 filesystem page fault race condition with fallocate call. kernel: crypto: GPF in lrw_crypt caused by null-deref kernel: Overflowing kernel mount table using shared bind mount kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c kernel: Use after free in SCSI generic device interface Kernel: kvm: nVMX: uncaught software exceptions in L1 guest leads to DoS kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user kernel: Memory leaks in xfs_attr_list.c error paths kernel: netlink: double-free in netlink_dump kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression) kernel: Kernel crash by spawning mcrypt(alg) with incompatible algorithm kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c Kernel: kvm: use after free in complete_emulated_mmio Kernel: kvm: page reference leakage in handle_vmon kernel: Null pointer dereference in search_keyring kernel: ping socket / AF_LLC connect() sin_family race kernel: S_ISGD is not cleared when setting posix ACLs in tmpfs (CVE-2016-7097 incomplete fix) kernel: ipv4: Invalid IP options could cause skb->dst drop kernel: Race condition between multiple sys_perf_event_open() calls kernel: NULL pointer dereference in keyring_search_aux function kernel: scsi: Stack-based buffer overflow in sg_ioctl function kernel: ext4: power failure during write(2) causes on-disk information leak kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option kernel: net: sctp_v6_create_accept_sk function mishandles inheritance kernel: net: IPv6 DCCP implementation mishandles inheritance kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance kernel: Incorrect overwrite check in __ip6_append_data() | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.5 | null |
RHSA-2025:1187 | Red Hat Security Advisory: buildah security update | podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.6 | null | null |
RHSA-2012:0116 | Red Hat Security Advisory: kernel security and bug fix update | kernel: no access restrictions of /proc/pid/* after setuid program exec kernel: be2net: promiscuous mode and non-member VLAN packets DoS kernel: ext4: ext4_ext_insert_extent() kernel oops kernel: keys: NULL pointer deref in the user-defined key type | [
"cpe:/o:redhat:rhel_eus:6.1"
] | null | null | null | null |
RHSA-2023:7434 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2021:3154 | Red Hat Security Advisory: firefox security update | Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2025:4128 | Red Hat Security Advisory: mod_auth_openidc:2.3 security update | mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:0089 | Red Hat Security Advisory: Red Hat CloudForms 4.1 security update | An update is now available for Red Hat CloudForms 4.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:cloudforms_managementengine:5.6::el7"
] | null | null | null | null |
RHSA-2020:4907 | Red Hat Security Advisory: freetype security update | freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2001:126 | Red Hat Security Advisory: : Updated apache packages available | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2021:3758 | Red Hat Security Advisory: OpenShift Container Platform 4.9.0 packages and security update | coreos-installer: restrict access permissions on /boot/ignition{,/config.ign} jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory golang: archive/zip: malformed archive may cause panic or memory exhaustion jetty: SessionListener can prevent a session from being invalidated breaking logout openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.5 | null | null |
RHSA-2023:5029 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | ArgoCD: secrets can be leak through kubectl.kubernetes.io/last-applied-configuration ArgoCD: Denial of Service to Argo CD repo-server | [
"cpe:/a:redhat:openshift_gitops:1.9::el9"
] | null | 6.5 | null | null |
RHSA-2023:3932 | Red Hat Security Advisory: python27:2.7 security update | python: urllib.parse url blocklisting bypass | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2024:2080 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2024:10942 | Red Hat Security Advisory: kernel:5.14.0 security update | kernel: nouveau: lock the client object tree. kernel: filelock: fix potential use-after-free in posix_lock_inode kernel: powerpc/eeh: avoid possible crash when edev->pdev changes kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible kernel: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() kernel: bpf: Fix a sdiv overflow issue kernel: bpf: Fix out-of-bounds write in trie_get_next_key() | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/a:redhat:rhel_eus:9.4::nfv",
"cpe:/a:redhat:rhel_eus:9.4::realtime",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 6.7 | null | null |
RHSA-2020:1794 | Red Hat Security Advisory: systemd security, bug fix, and enhancement update | systemd: services with DynamicUser can create SUID/SGID binaries systemd: services with DynamicUser can get new privileges and create SGID binaries | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 4.5 | null |
RHSA-2023:6168 | Red Hat Security Advisory: libguestfs-winsupport security update | NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 3.3 | null | null |
RHSA-2006:0533 | Red Hat Security Advisory: zebra security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2022:5894 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update. | minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2010:0424 | Red Hat Security Advisory: kernel security and enhancement update | kernel: ipv6: skb is unexpectedly freed | [
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2019:1480 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 5.3 | null |
RHSA-2023:5043 | Red Hat Security Advisory: flac security update | flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2020:0688 | Red Hat Security Advisory: OpenShift Container Platform 4.2.22 runc security update | runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation | [
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 7 | null | null |
RHSA-2022:5915 | Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.2 security update | moment: inefficient parsing algorithm resulting in DoS | [
"cpe:/a:redhat:service_mesh:2.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:1896 | Red Hat Security Advisory: OpenShift Container Platform 4.12.56 security update | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 8.1 | null | null |
RHSA-2017:0986 | Red Hat Security Advisory: kernel security update | kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
RHSA-2022:6357 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: local root privilege escalation in the virtual machine | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7 | null | null |
RHSA-2020:0228 | Red Hat Security Advisory: git security update | git: Arbitrary path overwriting via export-marks in-stream command feature git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/ git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams git: Remote code execution in recursive clones with nested submodules | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2009:1588 | Red Hat Security Advisory: kernel security update | kernel: fs: pipe.c null pointer dereference | [
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2018:3795 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Arbitrary Code Execution vulnerability (APSB18-42) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2010:0939 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP09 update | JBoss drools deserialization remote code execution JBoss Remoting Denial-Of-Service JBoss EAP jmx console FileDeployment CSRF | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3"
] | null | null | null | null |
RHSA-2018:3852 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service | [
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 6.5 | null |
RHSA-2021:2053 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster | [
"cpe:/a:redhat:openshift_gitops:1.1::el8"
] | null | 6.5 | null | null |
RHSA-2005:009 | Red Hat Security Advisory: kdelibs, kdebase security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:2988 | Red Hat Security Advisory: varnish:6 security update | varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHBA-2020:3180 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.31 bug fix update | golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 5.3 | null | null |
RHSA-2020:1209 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.6 | null | null |
RHSA-2022:5251 | Red Hat Security Advisory: pcre2 security update | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2005:512 | Red Hat Security Advisory: mc security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2013:1142 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:17.0.8) (MFSA 2013-63) Mozilla: Document URI misrepresentation and masquerading (MFSA 2013-68) Mozilla: CRMF requests allow for code execution and XSS attacks (MFSA 2013-69) Mozilla: Wrong principal used for validating URI for some Javascript components (MFSA 2013-72) Mozilla: Same-origin bypass with web workers and XMLHttpRequest (MFSA 2013-73) Mozilla: Local Java applets may read contents of local file system (MFSA 2013-75) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1427 | Red Hat Security Advisory: libreoffice security update | libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution libreoffice: Insufficient macro permission validation leading to macro execution | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.3 | null | null |
RHSA-2023:2458 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs kernel: mlxsw: thermal: Fix out-of-bounds memory accesses kernel: mlxsw: spectrum: Protect driver from buggy firmware kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering kernel: possible race condition in drivers/tty/tty_buffers.c kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: use-after-free in free_pipe_info() could lead to privilege escalation kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: netfilter: nf_conntrack_irc message handling issue kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: memory leak in ipv6_renew_options() kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: data races around sk->sk_prot kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: use-after-free after failed devlink reload in devlink_param_get kernel: USB-accessible buffer overflow in brcmfmac kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: lockdown bypass using IMA kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405) kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in bss_ref_get in net/wireless/scan.c kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c kernel: Denial of service in beacon protection for P2P-device kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: scsi: mpt3sas: Fix use-after-free warning kernel: regmap: spi: Reserve space for register address/padding kernel: net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent kernel: net/mlx5: Fix command stats access after free kernel: ice: Fix potential memory leak in ice_gnss_tty_write() kernel: thermal: core: Fix TZ_GET_TRIP NULL pointer dereference kernel: nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() kernel: bpf: Add schedule points in batch ops kernel: hwmon: Handle failure to register sensor with thermal zone correctly kernel: netfilter: conntrack: fix using __this_cpu_add in preemptible kernel: netfilter: flowtable_offload: fix using __this_cpu_add in preemptible kernel: HID: core: fix shift-out-of-bounds in hid_report_raw_event kernel: ASoC: soc-pcm: Add NULL check in BE reparenting kernel: hwmon: (coretemp) Check for null before removing sysfs attrs kernel: wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration kernel: fbdev: Fix unregistering of framebuffers without device kernel: Bluetooth: use memset avoid memory leaks kernel: bpf, sockmap: Fix memleak in sk_psock_queue_msg kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource() kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() kernel: mm/page_owner: use strscpy() instead of strlcpy() kernel: firmware: arm_scmi: Fix list protocols enumeration in the base protocol kernel: rtw89: cfo: check mac_id to avoid out-of-bounds kernel: nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags kernel: cifs: fix potential double free during failed mount kernel: bpf: Fix potential array overflow in bpf_trampoline_get_progs() kernel: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle. kernel: tcp: Fix a data-race around sysctl_tcp_early_retrans. kernel: tcp: Fix data-races around sysctl_tcp_recovery. kernel: tcp: Fix a data-race around sysctl_tcp_thin_linear_timeouts. kernel: udp: Fix a data-race around sysctl_udp_l3mdev_accept. kernel: ip: Fix data-races around sysctl_ip_prot_sock. kernel: ipv4: Fix data-races around sysctl_fib_multipath_hash_policy. kernel: ipv4: Fix a data-race around sysctl_fib_multipath_use_neigh. kernel: iavf: Fix handling of dummy receive descriptors kernel: tcp: Fix data-races around sysctl_tcp_fastopen_blackhole_timeout. kernel: tcp: Fix data-races around sysctl_tcp_fastopen. kernel: tcp: Fix a data-race around sysctl_tcp_notsent_lowat. kernel: tcp: Fix data-races around sysctl_tcp_migrate_req. kernel: igmp: Fix data-races around sysctl_igmp_qrv. kernel: igmp: Fix data-races around sysctl_igmp_llm_reports. kernel: tcp: Fix a data-race around sysctl_tcp_probe_interval. kernel: tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor. kernel: tcp: Fix a data-race around sysctl_tcp_probe_threshold. kernel: tcp: Fix data-races around sysctl_tcp_min_snd_mss. kernel: tcp: Fix data-races around sysctl_tcp_mtu_probing. kernel: tcp: Fix data-races around sysctl_tcp_l3mdev_accept. kernel: ip: Fix a data-race around sysctl_ip_autobind_reuse. kernel: tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept. kernel: ip: Fix a data-race around sysctl_fwmark_reflect. kernel: ip: Fix data-races around sysctl_ip_fwd_update_priority. kernel: ip: Fix data-races around sysctl_ip_fwd_use_pmtu. kernel: nexthop: Fix data-races around nexthop_compat_mode. kernel: tcp: Fix a data-race around sysctl_tcp_ecn_fallback. kernel: raw: Fix a data-race around sysctl_raw_l3mdev_accept. kernel: icmp: Fix a data-race around sysctl_icmp_errors_use_inbound_ifaddr. kernel: sysctl: Fix data-races in proc_dou8vec_minmax(). kernel: vlan: fix memory leak in vlan_newlink() kernel: ipv4: Fix a data-race around sysctl_fib_sync_mem. kernel: icmp: Fix data-races around sysctl. kernel: cipso: Fix data-races around sysctl. kernel: sysctl: Fix data races in proc_douintvec(). kernel: drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector() kernel: fscache: Fix invalidation/lookup race kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: net/ulp: use-after-free in listening ULP sockets kernel: use-after-free due to race condition in qdisc_graft() kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: denial of service in tipc_conn_close Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: ext4: use-after-free in ext4_xattr_set_entry() kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU kernel: octeontx2-pf: Fix resource leakage in VF driver unbind | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2020:0816 | Red Hat Security Advisory: firefox security update | usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.8 | 6.1 | null |
RHSA-2023:7213 | Red Hat Security Advisory: squid:4 security update | squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | null | null |
RHSA-2022:6757 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.3.3 security update | snakeyaml: Denial of Service due to missing nested depth limitation for collections graphql-java: DoS by malicious query snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 6.5 | null | null |
RHSA-2009:1081 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: nfsd should drop CAP_MKNOD for non-root kernel: agp: zero pages before sending to userspace kernel: 'kill sig -1' must only apply to caller's pid namespace kernel: cifs: memory overwrite when saving nativeFileSystem field during mount kernel: random: add robust get_random_u32, remove weak get_random_int | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.