Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

RED HAT — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting RED HAT. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

Found 21 results / 691Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2023-6917 Pcp: unsafe use of directories allows pcp to root privilege escalation — Red Hat Enterprise Linux 9CWE-367 6.0 Medium2024-02-28
CVE-2024-1151 Kernel: stack overflow problem in open vswitch kernel module leading to dos — Red Hat Enterprise Linux 9CWE-121 5.5 Medium2024-02-11
CVE-2023-6531 Kernel: gc's deletion of an skb races with unix_stream_read_generic() leading to uaf — Red Hat Enterprise Linux 9CWE-362 7.0 High2024-01-21
CVE-2023-4001 Grub2: bypass the grub password protection feature — Red Hat Enterprise Linux 9CWE-290 6.8 Medium2024-01-15
CVE-2023-6679 Kernel: null pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c — Red Hat Enterprise Linux 9CWE-476 5.5 Medium2023-12-11
CVE-2023-5871 Libnbd: malicious nbd server may crash libnbd — Red Hat Enterprise Linux 9CWE-617 5.3 Medium2023-11-27
CVE-2023-4535 Opensc: out-of-bounds read in myeid driver handling encryption using symmetric keys — Red Hat Enterprise Linux 9CWE-125 4.5 Medium2023-11-06
CVE-2023-5574 Xorg-x11-server: use-after-free bug in damagedestroy — Red Hat Enterprise Linux 9CWE-416 7.0 High2023-10-25
CVE-2023-39191 Kernel: ebpf: insufficient stack type checks in dynptr — Red Hat Enterprise Linux 9CWE-20 8.2 High2023-10-04
CVE-2023-3576 Libtiff: memory leak in tiffcrop.c — Red Hat Enterprise Linux 9CWE-119 5.5 Medium2023-10-04
CVE-2023-42756 Kernel: netfilter: race condition between ipset_cmd_add and ipset_cmd_swap — Red Hat Enterprise Linux 9CWE-362 4.4 Medium2023-09-28
CVE-2023-5215 Libnbd: crash or misbehaviour when nbd server returns an unexpected block size — Red Hat Enterprise Linux 9CWE-241 5.3 Medium2023-09-28
CVE-2023-38201 Keylime: challenge-response protocol bypass during agent registration — Red Hat Enterprise Linux 9CWE-639 6.5 Medium2023-08-25
CVE-2023-4273 Kernel: exfat: stack overflow in exfat_get_uniname_from_ext_entry — Red Hat Enterprise Linux 9CWE-121 6.0 Medium2023-08-09
CVE-2023-4147 Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free — Red Hat Enterprise Linux 9CWE-416 7.8 High2023-08-07
CVE-2023-4194 Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid — Red Hat Enterprise Linux 9CWE-843 5.5 Medium2023-08-07
CVE-2023-3773 Kernel: xfrm: out-of-bounds read of xfrma_mtimer_thresh nlattr — Red Hat Enterprise Linux 9CWE-125 5.5 Medium2023-07-25
CVE-2023-3640 Kernel: x86/mm: a per-cpu entry area leak was identified through the init_cea_offsets function when prefetchnta and prefetcht2 instructions being used for the per-cpu entry area mapping to the user space — Red Hat Enterprise Linux 9CWE-203 7.0 High2023-07-24
CVE-2023-3750 Libvirt: improper locking in virstoragepoolobjlistsearch may lead to denial of service — Red Hat Enterprise Linux 9CWE-667 6.5 Medium2023-07-24
CVE-2023-38200 Keylime: registrar is subject to a dos against ssl connections — Red Hat Enterprise Linux 9CWE-400 7.5 High2023-07-24
CVE-2023-3674 Keylime: attestation failure when the quote's signature does not validate — Red Hat Enterprise Linux 9CWE-1283 2.3 Low2023-07-19

This page lists every published CVE security advisory associated with RED HAT. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.