Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

RED HAT — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting RED HAT. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

CVE IDTitleCVSSSeverityPublished
CVE-2026-6507 Dnsmasq: dnsmasq: denial of service due to out-of-bounds write in dhcp bootreply processing — Red Hat Enterprise Linux 10CWE-787 7.5 High2026-04-17
CVE-2026-6494 Aap-mcp-server: aap mcp server: log injection allows social engineering attacks via unsanitized input — Red Hat Ansible Automation Platform 2CWE-117 5.3 Medium2026-04-17
CVE-2026-6388 Argocd-image-updater: argocd image updater: cross-namespace privilege escalation via insufficient namespace validation — Red Hat OpenShift GitOpsCWE-1220 9.1 Critical2026-04-15
CVE-2026-6385 Ffmpeg: ffmpeg: denial of service and potential arbitrary code execution via signed integer overflow in dvd subtitle parser — Lightspeed CoreCWE-190 6.5 Medium2026-04-15
CVE-2026-6384 Gimp: gimp: arbitrary code execution or denial of service via buffer overflow in gif image processing — Red Hat Enterprise Linux 6CWE-120 7.3 High2026-04-15
CVE-2026-40919 Gimp: gimp: denial of service via specially crafted seattle filmworks file — Red Hat Enterprise Linux 6CWE-787 6.1 Medium2026-04-15
CVE-2026-40918 Gimp: gimp: denial of service via crafted pvr image file — Red Hat Enterprise Linux 6CWE-131 5.5 Medium2026-04-15
CVE-2026-40917 Gimp: gimp: application crashes or information disclosure via crafted icns image files — Red Hat Enterprise Linux 6CWE-125 5.0 Medium2026-04-15
CVE-2026-40916 Gimp: gimp: denial of service due to stack buffer overflow in tim image loader — Red Hat Enterprise Linux 6CWE-787 5.0 Medium2026-04-15
CVE-2026-40915 Gimp: gimp: heap buffer overflow due to integer overflow in fits image loader — Red Hat Enterprise Linux 6CWE-190 5.5 Medium2026-04-15
CVE-2026-6245 Sssd: out-of-bounds read in the sssd — Red Hat Enterprise Linux 10CWE-805 5.5 Medium2026-04-15
CVE-2026-6383 Kubevirt: kubevirt: unauthorized subresource access due to improper rbac evaluation — Red Hat OpenShift Virtualization 4CWE-863 5.4 Medium2026-04-15
CVE-2026-37980 Org.keycloak.forms.login: keycloak: keycloak: arbitrary code execution via stored cross-site scripting (xss) in organization selection login page — Red Hat Build of KeycloakCWE-79 6.9 Medium2026-04-14
CVE-2026-5483 Odh-dashboard: odh dashboard kubernetes service account exposure — Red Hat OpenShift AI 2.16CWE-201 8.5 High2026-04-10
CVE-2026-1584 Gnutls: gnutls: remote denial of service via crafted clienthello with invalid psk binder — Red Hat Hardened ImagesCWE-476 7.5 High2026-04-09
CVE-2026-4878 Libcap: libcap: privilege escalation via toctou race condition in cap_set_file() — Red Hat Enterprise Linux 10CWE-367 6.7 Medium2026-04-09
CVE-2026-32591 Mirror-registry: quay: server-side request forgery in proxy cache upstream registry configuration — mirror registry for Red Hat OpenShiftCWE-918 5.2 Medium2026-04-08
CVE-2026-32590 Mirror-registry: remote code execution using pickle deserialization — mirror registry for Red Hat OpenShiftCWE-502 7.1 High2026-04-08
CVE-2026-32589 Mirror-registry: quay: insecure direct object reference in blobupload — mirror registry for Red Hat OpenShiftCWE-639 7.4 High2026-04-08
CVE-2025-14243 Mirror-registry: openshift mirror registry: user enumeration via authentication error messages — mirror registry for Red Hat OpenShiftCWE-209 5.3 Medium2026-04-08
CVE-2026-2377 Mirror-registry: quay: quay: server-side request forgery via log export functionality — mirror registry for Red Hat OpenShiftCWE-918 6.5 Medium2026-04-08
CVE-2025-58713 Rhpam: privilege escalation via excessive /etc/passwd permissions — Red Hat Process Automation 7CWE-276 6.4 Medium2026-04-08
CVE-2025-57854 Osus-operator: privilege escalation via excessive /etc/passwd permissions — Red Hat OpenShift Update ServiceCWE-276 6.4 Medium2026-04-08
CVE-2025-57853 Web-terminal: privilege escalation via excessive /etc/passwd permissions — Red Hat Web TerminalCWE-276 6.4 Medium2026-04-08
CVE-2025-57847 Ansible-automation-platform: privilege escalation via excessive group writable /etc/passwd permissions — Red Hat Ansible Automation Platform 2CWE-276 6.4 Medium2026-04-08
CVE-2025-57851 Mce: privilege escalation via excessive /etc/passwd permissions — Multicluster Engine for KubernetesCWE-276 6.4 Medium2026-04-08
CVE-2025-14821 Libssh: libssh: insecure default configuration leads to local man-in-the-middle attacks on windows — Red Hat Hardened ImagesCWE-427 7.8 High2026-04-07
CVE-2026-4631 Cockpit: cockpit: unauthenticated remote code execution due to ssh command-line argument injection — Red Hat Enterprise Linux 10CWE-78 9.8 Critical2026-04-07
CVE-2026-5745 Libarchive: a null pointer dereference vulnerability exists in the acl parser of libarchive — Red Hat Hardened ImagesCWE-476 5.5 Medium2026-04-07
CVE-2026-4740 Rhacm: open cluster management (ocm): cross-cluster privilege escalation via improper kubernetes client certificate renewal validation — Multicluster Engine for KubernetesCWE-295 8.2 High2026-04-07

This page lists every published CVE security advisory associated with RED HAT. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.