Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

RED HAT — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting RED HAT. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

Found 12 results / 691Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-2239 Gimp: gimp: application crash (dos) via crafted psd file due to heap-buffer-overflow — Red Hat Enterprise Linux 7CWE-170 2.8 Low2026-03-26
CVE-2023-40551 Shim: out of bounds read when parsing mz binaries — Red Hat Enterprise Linux 7CWE-125 5.1 Medium2024-01-29
CVE-2023-40549 Shim: out-of-bounds read in verify_buffer_authenticode() malformed pe file — Red Hat Enterprise Linux 7CWE-125 6.2 Medium2024-01-29
CVE-2023-40546 Shim: out-of-bounds read printing error messages — Red Hat Enterprise Linux 7CWE-476 6.2 Medium2024-01-29
CVE-2023-40550 Shim: out-of-bound read in verify_buffer_sbat() — Red Hat Enterprise Linux 7CWE-125 5.5 Medium2024-01-29
CVE-2023-40548 Shim: interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems — Red Hat Enterprise Linux 7CWE-787 7.4 High2024-01-29
CVE-2023-40547 Shim: rce in http boot support may lead to secure boot bypass — Red Hat Enterprise Linux 7CWE-787 8.3 High2024-01-25
CVE-2023-5455 Ipa: invalid csrf protection — Red Hat Enterprise Linux 7CWE-352 6.5 Medium2024-01-10
CVE-2023-3972 Insights-client: unsafe handling of temporary files and directories — Red Hat Enterprise Linux 7CWE-379 7.8 High2023-11-01
CVE-2023-5380 Xorg-x11-server: use-after-free bug in destroywindow — Red Hat Enterprise Linux 7CWE-416 4.7 Medium2023-10-25
CVE-2023-42753 Kernel: netfilter: potential slab-out-of-bound access due to integer underflow — Red Hat Enterprise Linux 7CWE-787 7.0 High2023-09-25
CVE-2023-3899 Subscription-manager: inadequate authorization of com.redhat.rhsm1 d-bus interface allows local users to modify configuration — Red Hat Enterprise Linux 7CWE-285 7.8 High2023-08-23

This page lists every published CVE security advisory associated with RED HAT. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.