id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:1417
Red Hat Security Advisory: libX11 security update
libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.3
null
null
RHSA-2024:9430
Red Hat Security Advisory: nano security update
nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.7
null
null
RHSA-2024:0559
Red Hat Security Advisory: firefox security update
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2016:1629
Red Hat Security Advisory: python33-python security update
python: smtplib StartTLS stripping attack python: http protocol steam injection attack CGIHandler: sets environmental variable based on user supplied Proxy request header
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
5
null
RHBA-2024:4589
Red Hat Bug Fix Advisory: Satellite 6.15.2 Async Update
foreman: Host ssh key not being checked in remote execution
[ "cpe:/a:redhat:satellite:6.15::el8", "cpe:/a:redhat:satellite_capsule:6.15::el8", "cpe:/a:redhat:satellite_utils:6.15::el8" ]
null
6.8
null
null
RHSA-2018:3404
Red Hat Security Advisory: Red Hat Enterprise Linux 7.3 Extended Update Support One-Month Notice
This is the One-Month notification for the retirement of Red Hat Enterprise Linux 7.3 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.3.
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
null
null
RHSA-2024:0422
Red Hat Security Advisory: perl-HTTP-Tiny security update
http-tiny: insecure TLS cert default
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
6.8
null
null
RHSA-2020:4129
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1 servicemesh-proxy security update
envoyproxy/envoy: incorrectly handles multiple HTTP headers in requests
[ "cpe:/a:redhat:service_mesh:1.1::el8" ]
null
8.3
null
null
RHSA-2013:1171
Red Hat Security Advisory: condor security update
condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED
[ "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
RHSA-2022:5201
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes
golang.org/x/crypto: empty plaintext packet causes panic nconf: Prototype pollution in memory store golang: crypto/elliptic: IsOnCurve returns true for invalid field elements nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account Moment.js: Path traversal in moment.locale dset: Prototype Pollution in dset golang: syscall: faccessat checks wrong group go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses
[ "cpe:/a:redhat:acm:2.4::el8" ]
null
5.1
null
null
RHSA-2021:2203
Red Hat Security Advisory: glib2 security update
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
9.8
null
null
RHSA-2025:1609
Red Hat Security Advisory: Cluster Observability Operator 1.0.0
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() follow-redirects: Possible credential leak golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:cluster_observability_operator:1.0::el8" ]
null
7.5
null
null
RHSA-2024:4976
Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.3 release and security update
tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat
[ "cpe:/a:redhat:jboss_enterprise_web_server:6.0::el8", "cpe:/a:redhat:jboss_enterprise_web_server:6.0::el9" ]
null
7.5
null
null
RHSA-2023:4655
Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update
RHDS: LDAP browser tries to decode userPassword instead of userCertificate attribute
[ "cpe:/a:redhat:directory_server:11.6::el8" ]
null
5.5
null
null
RHSA-2017:0113
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path kernel: Slab out-of-bounds access in sctp_sf_ootb() kernel: sound: a race condition in the kernel sound timer in snd_timer_user_read()
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
3.6
null
RHSA-2009:0981
Red Hat Security Advisory: util-linux security and bug fix update
util-linux: audit log injection via login
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:0308
Red Hat Security Advisory: OpenShift Container Storage 3.11.z security and bug fix update
golang: crypto/elliptic: incorrect operations on the P-224 curve golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
[ "cpe:/a:redhat:storage:3.5:server:el7", "cpe:/a:redhat:storage:3:client:el7" ]
null
5.9
null
null
RHSA-2021:0620
Red Hat Security Advisory: stunnel security update
stunnel: client certificate not correctly verified when redirect and verifyChain options are used
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.5
null
null
RHSA-2004:681
Red Hat Security Advisory: samba security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2011:1534
Red Hat Security Advisory: nfs-utils security, bug fix, and enhancement update
nfs-utils: mount.nfs fails to anticipate RLIMIT_FSIZE nfs-utils: Improper authentication of an incoming request when an IP based authentication used
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:1856
Red Hat Security Advisory: rh-ror41-rubygem-actionview security update
rubygem-actionview: cross-site scripting flaw in Action View
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
6.1
null
RHSA-2022:1013
Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.2.1 security update
guava: local information disclosure via temporary directory created with unsafe permissions bouncycastle: Timing issue within the EC math library mysql-connector-java: unauthorized access to critical kubernetes-client: Insecure deserialization in unmarshalYaml method protobuf-java: potential DoS in the parsing procedure for binary data maven: Block repositories using http by default jersey: Local information disclosure via system temporary directory jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way xml-security: XPath Transform abuse allows for information disclosure cron-utils: template Injection leading to unauthenticated Remote Code Execution h2: Remote Code Execution in Console
[ "cpe:/a:redhat:camel_quarkus:2.2.1" ]
null
9.8
null
null
RHSA-2023:6813
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2023:3429
Red Hat Security Advisory: cups-filters security update
cups-filters: remote code execution in cups-filters, beh CUPS backend
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2023:2248
Red Hat Security Advisory: xorg-x11-server security and bug fix update
xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2017:0246
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
7
null
RHSA-2020:2817
Red Hat Security Advisory: rh-nginx116-nginx security update
nginx: HTTP request smuggling in configurations with URL redirect used as error_page
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.3
null
null
RHSA-2007:1049
Red Hat Security Advisory: kernel security and bug fix update
kernel: Local DoS with corrupted ELF fib_semantics.c out of bounds access vulnerability LTC36188-Don't allow the stack to grow into hugetlb reserved regions Privilege escalation via PR_SET_PDEATHSIG kernel: Missing ioctl() permission checks in aacraid driver
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:5942
Red Hat Security Advisory: vim security update
vim: Out-of-bounds Write vim: out-of-bounds write in vim_regsub_both() in regexp.c vim: buffer over-read in utf_ptr2char() in mbyte.c
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2022:5813
Red Hat Security Advisory: vim security update
vim: Out-of-bounds Write vim: out-of-bounds write in vim_regsub_both() in regexp.c vim: buffer over-read in utf_ptr2char() in mbyte.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2021:4140
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Intel graphics card information leak. kernel: out-of-bounds reads in pinctrl subsystem. kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers kernel: Fragmentation cache not cleared on reconnection kernel: Reassembling fragments encrypted under different keys kernel: wifi frame payload being parsed incorrectly as an L2 frame kernel: Forwarding EAPOL from unauthenticated wifi client kernel: accepting plaintext data frames in protected networks kernel: not verifying TKIP MIC of fragmented frames kernel: accepting fragmented plaintext frames in protected networks kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header kernel: accepting plaintext broadcast fragments as full frames kernel: reassembling encrypted fragments with non-consecutive packet numbers kernel: reassembling mixed encrypted/plaintext fragments kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c kernel: Improper access control in BlueZ may allow information disclosure vulnerability. kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c kernel: Linux kernel eBPF RINGBUF map oversized allocation kernel: double free in bluetooth subsystem when the HCI device initialization fails kernel: use-after-free in function hci_sock_bound_ioctl() kernel: eBPF 32-bit source register truncation on div/mod kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c kernel: DoS in rb_per_cpu_empty() kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure kernel: Race condition in sctp_destroy_sock list_del kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS kernel: local escalation of privileges in handling of eBPF programs kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory kernel: out of bounds array access in drivers/md/dm-ioctl.c kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier kernel: NULL-deref on disconnect regression kernel: possible buffer overflow in sysfs reading
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
6.4
5.5
null
RHSA-2008:0715
Red Hat Security Advisory: nss_ldap security and bug fix update
nss_ldap randomly replying with wrong user's data
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:0829
Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update
brotli: buffer overflow when input chunk is larger than 2GiB dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
6.3
null
null
RHSA-2003:269
Red Hat Security Advisory: : Updated KDE packages fix security issues
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2017:0254
Red Hat Security Advisory: spice security update
spice: Buffer overflow in main_channel_alloc_msg_rcv_buf when reading large messages spice: Remote DoS via crafted message
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2022:1820
Red Hat Security Advisory: udisks2 security and bug fix update
udisks2: insecure defaults in user-accessible mount helpers allow for a DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
4.5
null
null
RHSA-2016:0540
Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.2 update
bsh2: remote code execution via deserialization
[ "cpe:/a:redhat:jboss_brms:6.2" ]
null
null
7.4
null
RHSA-2023:3429
Red Hat Security Advisory: cups-filters security update
cups-filters: remote code execution in cups-filters, beh CUPS backend
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2022:4889
Red Hat Security Advisory: thunderbird security update
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
9.8
6.1
null
RHSA-2015:1979
Red Hat Security Advisory: libreswan security and enhancement update
openswan: denial of service via IKE daemon restart when receiving a bad DH gx value
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:5928
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update
minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHSA-2022:7051
Red Hat Security Advisory: OpenJDK 17.0.5 Security Update for Windows Builds
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
[ "cpe:/a:redhat:openjdk:17::windows" ]
null
3.7
null
null
RHSA-2023:5459
Red Hat Security Advisory: ghostscript security update
ghostscript: vulnerable to OS command injection due to mishandles permission validation for pipe devices
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.4
null
null
RHSA-2024:5832
Red Hat Security Advisory: httpd security update
httpd: Security issues via backend applications whose response headers are malicious or exploitable
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
9.1
null
null
RHSA-2023:2764
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: open redirection vulnerability in lib/http/server.py may lead to information disclosure python: CPU denial of service via inefficient IDNA decoder
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2020:2405
Red Hat Security Advisory: freerdp security update
freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.3
null
null