Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

RED HAT — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting RED HAT. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

CVE IDTitleCVSSSeverityPublished
CVE-2026-5704 Tar: tar: hidden file injection via crafted archives — Red Hat Enterprise Linux 10CWE-434 5.0 Medium2026-04-06
CVE-2026-5673 Libtheora: libtheora: denial of service or information disclosure via malformed avi file processing — Red Hat Enterprise Linux 10CWE-125 5.6 Medium2026-04-06
CVE-2026-37977 Keycloak: org.keycloak.protocol.oidc.grants.ciba: keycloak: information disclosure via cors header injection due to unvalidated jwt azp claim — Red Hat Build of KeycloakCWE-346 3.7 Low2026-04-06
CVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalization — Red Hat Hardened ImagesCWE-289 3.7 Low2026-04-03
CVE-2026-2625 Rust-rpm-sequoia: rust-rpm-sequoia: denial of service via crafted rpm file during signature verification — Red Hat Hardened ImagesCWE-347 4.0 Medium2026-04-03
CVE-2026-4636 Keycloak: keycloak: uma policy bypass allows authenticated users to gain unauthorized access to victim-owned resources. — Red Hat build of Keycloak 26.2CWE-551 8.1 High2026-04-02
CVE-2026-4634 Keycloak: keycloak: denial of service via excessive processing of openid connect scope parameters — Red Hat build of Keycloak 26.2CWE-1050 7.5 High2026-04-02
CVE-2026-4325 Keycloak: keycloak: replay of action tokens via improper handling of single-use entries — Red Hat build of Keycloak 26.2CWE-653 5.3 Medium2026-04-02
CVE-2026-4282 Keycloak: keycloak: privilege escalation via forged authorization codes due to singleuseobjectprovider isolation flaw — Red Hat build of Keycloak 26.2CWE-653 7.4 High2026-04-02
CVE-2026-3872 Keycloak: keycloak: information disclosure due to redirect_uri validation bypass — Red Hat build of Keycloak 26.2CWE-601 7.3 High2026-04-02
CVE-2026-35094 Libinput: libinput: information disclosure via dangling pointer in lua plugin handling — Red Hat Enterprise Linux 10CWE-825 3.3 Low2026-04-01
CVE-2026-35093 Libinput: libinput: unauthorized code execution and information disclosure through lua bytecode plugins — Red Hat Enterprise Linux 10CWE-94 8.8 High2026-04-01
CVE-2026-35092 Corosync: corosync: denial of service via integer overflow in join message validation — Red Hat Enterprise Linux 10CWE-190 7.5 High2026-04-01
CVE-2026-35091 Corosync: corosync: denial of service and information disclosure via crafted udp packet — Red Hat Enterprise Linux 10CWE-253 8.2 High2026-04-01
CVE-2026-5201 Gdk-pixbuf: gdk-pixbuf: denial of service via heap-based buffer overflow when processing a specially crafted jpeg image — Red Hat Enterprise Linux 10CWE-122 7.5 High2026-03-31
CVE-2026-5165 Virtio-win: virtio-win: memory corruption via use-after-free in virtio blk device reset — Red Hat Enterprise Linux 10CWE-825 6.7 Medium2026-03-30
CVE-2026-5164 Virtio-win: virtio-win: denial of service via unvalidated descriptor count in unmap request — Red Hat Enterprise Linux 10CWE-120 6.7 Medium2026-03-30
CVE-2026-5121 Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing — Red Hat Enterprise Linux 7 Extended Lifecycle SupportCWE-190 7.5 High2026-03-30
CVE-2026-5119 Libsoup: libsoup: information disclosure via cleartext transmission of cookies during https tunnel establishment — Red Hat Enterprise Linux 8CWE-319 5.9 Medium2026-03-30
CVE-2026-28369 Undertow: undertow: request smuggling via malformed http request headers — Red Hat build of Apache Camel for Spring Boot 4CWE-444 8.7 High2026-03-27
CVE-2026-28367 Undertow: undertow: request smuggling via `\r\r\r` as a header block terminator — Red Hat build of Apache Camel for Spring Boot 4CWE-444 8.7 High2026-03-27
CVE-2026-28368 Undertow: undertow: request smuggling via inconsistent header parsing — Red Hat build of Apache Camel for Spring Boot 4CWE-444 8.7 High2026-03-27
CVE-2026-4948 Firewalld: firewalld: local unprivileged user can modify firewall state due to d-bus setter mis-authorization — Red Hat Enterprise Linux 10CWE-279 5.5 Medium2026-03-27
CVE-2025-12805 Llama-stack-k8s-operator: llama stack service exposed across namespaces due to missing networkpolicy — Red Hat OpenShift AI 2.25CWE-653 8.1 High2026-03-26
CVE-2026-0965 Libssh: libssh: denial of service via improper configuration file handling — Red Hat Enterprise Linux 10CWE-73 5.5 -2026-03-26
CVE-2026-0967 Libssh: libssh: denial of service via inefficient regular expression processing — Red Hat Enterprise Linux 10CWE-1333 7.5 -2026-03-26
CVE-2026-0968 Libssh: libssh: denial of service due to malformed sftp message — Red Hat Enterprise Linux 10CWE-476 3.1 Low2026-03-26
CVE-2026-0964 Libssh: improper sanitation of paths received from scp servers — Red Hat Enterprise Linux 10CWE-22 8.8 -2026-03-26
CVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid input — Red Hat Hardened ImagesCWE-124 7.5AIHighAI2026-03-26
CVE-2026-2100 P11-kit: null dereference via c_derivekey with specific null parameters — Red Hat Hardened ImagesCWE-824 5.3 Medium2026-03-26

This page lists every published CVE security advisory associated with RED HAT. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.