Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Red Hat — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting Red Hat. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

CVE IDTitleCVSSSeverityPublished
CVE-2023-6915 Kernel: null pointer dereference vulnerability in ida_free in lib/idr.c — Red Hat Enterprise Linux 8CWE-476 6.2 Medium2024-01-15
CVE-2023-6683 Qemu: vnc: null pointer dereference in qemu_clipboard_request() — Red Hat Enterprise Linux 8CWE-476 6.5 Medium2024-01-12
CVE-2023-5455 Ipa: invalid csrf protection — Red Hat Enterprise Linux 7CWE-352 6.5 Medium2024-01-10
CVE-2023-6476 Cri-o: pods are able to break out of resource confinement on cgroupv2 — Red Hat OpenShift Container Platform 4.13CWE-770 6.5 Medium2024-01-09
CVE-2023-6270 Kernel: aoe: improper reference count leads to use-after-free vulnerability — Red Hat Enterprise Linux 6CWE-416 7.0 High2024-01-04
CVE-2023-6944 Rhdh: catalog-import function leaks credentials to frontend — RHDH-1.1-RHEL-9CWE-209 5.7 Medium2024-01-04
CVE-2023-6004 Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname — Red Hat Enterprise Linux 8CWE-74 4.8 Medium2024-01-03
CVE-2023-7192 Kernel: refcount leak in ctnetlink_create_conntrack() — Red Hat Enterprise Linux 8.2 Advanced Update SupportCWE-401 5.5 Medium2024-01-02
CVE-2023-6693 Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx() — Red Hat Enterprise Linux 8CWE-121 4.9 Medium2024-01-02
CVE-2023-3171 Eap-7: heap exhaustion via deserialization — EAP 7.4.13CWE-789 7.5 High2023-12-27
CVE-2023-7008 Systemd-resolved: unsigned name response in signed zone is not refused when dnssec=yes — Red Hat Enterprise Linux 8CWE-300 5.9 Medium2023-12-23
CVE-2023-7042 Kernel: null pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() — Red Hat Enterprise Linux 6CWE-476 4.4 Medium2023-12-21
CVE-2023-6546 Kernel: gsm multiplexing race condition leads to privilege escalation — Red Hat Enterprise Linux 8CWE-366 7.0 High2023-12-21
CVE-2023-2585 Keycloak: client access via device auth request spoof — Red Hat Single Sign-On 7CWE-358 3.5 Low2023-12-21
CVE-2023-6918 Libssh: missing checks for return values for digests — Red Hat Enterprise Linux 8CWE-252 3.7 Low2023-12-18
CVE-2023-6927 Keycloak: open redirect via "form_post.jwt" jarm response mode — Red Hat build of Keycloak 22CWE-601 4.6 Medium2023-12-18
CVE-2023-5384 Infinispan: credentials returned from configuration as clear text — Red Hat Data Grid 8.4.6CWE-312 7.2 High2023-12-18
CVE-2023-6228 Libtiff: heap-based buffer overflow in cpstriptotile() in tools/tiffcp.c — Red Hat Enterprise Linux 8CWE-787 3.3 Low2023-12-18
CVE-2023-5236 Infinispan: circular reference on marshalling leads to dos — Red Hat Data Grid 8.4.4 4.4 Medium2023-12-18
CVE-2023-3628 Infispan: rest bulk ops don't check permissions — Red Hat Data Grid 8.4.4CWE-304 6.5 Medium2023-12-18
CVE-2023-3629 Infinispan: non-admins should not be able to get cache config via rest api — Red Hat Data Grid 8.4.4CWE-304 4.3 Medium2023-12-18
CVE-2023-4320 Satellite: arithmetic overflow in satellite — Red Hat Satellite 6.15 for RHEL 8CWE-613 7.6 High2023-12-18
CVE-2023-5056 Skupper-operator: privelege escalation via config map — Service Interconnect 1 for RHEL 9CWE-862 6.8 Medium2023-12-18
CVE-2023-5115 Ansible: malicious role archive can cause ansible-galaxy to overwrite arbitrary files — Red Hat Ansible Automation Platform 2.3 for RHEL 8CWE-36 6.3 Medium2023-12-18
CVE-2023-6134 Keycloak: reflected xss via wildcard in oidc redirect_uri — Red Hat build of Keycloak 22CWE-79 4.6 Medium2023-12-14
CVE-2023-6563 Keycloak: offline session token dos — Red Hat Single Sign-On 7.6 for RHEL 7CWE-770 7.7 High2023-12-14
CVE-2023-6377 Xorg-x11-server: out-of-bounds memory reads/writes in xkb button actions — Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONCWE-125 7.8 High2023-12-13
CVE-2023-6478 Xorg-x11-server: out-of-bounds memory read in rrchangeoutputproperty and rrchangeproviderproperty — Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONCWE-190 7.6 High2023-12-13
CVE-2023-6710 Mod_cluster/mod_proxy_cluster: stored cross site scripting — JBoss Core Services for RHEL 8CWE-79 5.4 Medium2023-12-12
CVE-2023-5764 Ansible: template injection — Red Hat Ansible Automation Platform 2.4 for RHEL 8CWE-1336 7.1 High2023-12-12

This page lists every published CVE security advisory associated with Red Hat. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.