Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Red Hat — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting Red Hat. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

CVE IDTitleCVSSSeverityPublished
CVE-2023-39418 Postgresql: merge fails to enforce update or select row security policies — Red Hat Enterprise Linux 8CWE-1220 3.1 Low2023-08-11
CVE-2023-39417 Postgresql: extension script @substitutions@ within quoting allow sql injection — Red Hat Advanced Cluster Security 4.2CWE-89 7.5 High2023-08-11
CVE-2023-4273 Kernel: exfat: stack overflow in exfat_get_uniname_from_ext_entry — Red Hat Enterprise Linux 9CWE-121 6.0 Medium2023-08-09
CVE-2023-4194 Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid — Red Hat Enterprise Linux 9CWE-843 5.5 Medium2023-08-07
CVE-2023-4147 Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free — Red Hat Enterprise Linux 9CWE-416 7.8 High2023-08-07
CVE-2023-4132 Kernel: smsusb: use-after-free caused by do_submit_urb() — Red Hat Enterprise Linux 8CWE-416 5.5 Medium2023-08-03
CVE-2023-4133 Kernel: cxgb4: use-after-free in ch_flower_stats_cb() — Red Hat Enterprise Linux 8CWE-416 5.5 Medium2023-08-03
CVE-2023-38560 Ghostscript: integer overflow in pcl/pl/plfont.c:418 in pl_glyph_name — Red Hat Enterprise Linux 6CWE-190 5.5 Medium2023-08-01
CVE-2023-38559 Ghostscript: out-of-bound read in base/gdevdevn.c:1973 in devn_pcx_write_rle could result in dos — Red Hat Enterprise Linux 8CWE-125 5.5 Medium2023-08-01
CVE-2023-4010 Kernel: usb: hcd: malformed usb descriptor leads to infinite loop in usb_giveback_urb() — Red Hat Enterprise Linux 6CWE-835 4.6 Medium2023-07-31
CVE-2023-4004 Kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() — Red Hat Enterprise Linux 8CWE-416 7.8 High2023-07-31
CVE-2023-3773 Kernel: xfrm: out-of-bounds read of xfrma_mtimer_thresh nlattr — Red Hat Enterprise Linux 9CWE-125 5.5 Medium2023-07-25
CVE-2023-3772 Kernel: xfrm: null pointer dereference in xfrm_update_ae_params() — Red Hat Enterprise Linux 8CWE-476 5.5 Medium2023-07-25
CVE-2023-3637 Openstack-neutron: unrestricted creation of security groups (fix for cve-2022-3277) — Red Hat OpenStack Platform 16.2CWE-400 4.3 Medium2023-07-25
CVE-2023-3640 Kernel: x86/mm: a per-cpu entry area leak was identified through the init_cea_offsets function when prefetchnta and prefetcht2 instructions being used for the per-cpu entry area mapping to the user space — Red Hat Enterprise Linux 9CWE-203 7.0 High2023-07-24
CVE-2023-33951 Kernel: vmwgfx: race condition leading to information disclosure vulnerability — Red Hat Enterprise Linux 8CWE-413 6.7 Medium2023-07-24
CVE-2023-3750 Libvirt: improper locking in virstoragepoolobjlistsearch may lead to denial of service — Red Hat Enterprise Linux 9CWE-667 6.5 Medium2023-07-24
CVE-2023-3745 Imagemagick: heap-buffer-overflow in pushcharpixel() in quantum-private.h — Red Hat Enterprise Linux 6CWE-125 5.5 Medium2023-07-24
CVE-2023-3812 Kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags — Red Hat Enterprise Linux 8CWE-787 7.8 High2023-07-24
CVE-2023-3384 Quay: stored cross site scripting — Red Hat Quay 3CWE-79 5.4 Medium2023-07-24
CVE-2023-3567 Kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race — Red Hat Enterprise Linux 8CWE-416 7.1 High2023-07-24
CVE-2023-3019 Qemu: e1000e: heap use-after-free in e1000e_write_packet_to_guest() — Red Hat Enterprise Linux 8CWE-416 6.0 Medium2023-07-24
CVE-2023-38200 Keylime: registrar is subject to a dos against ssl connections — Red Hat Enterprise Linux 9CWE-400 7.5 High2023-07-24
CVE-2023-33952 Kernel: vmwgfx: double free within the handling of vmw_buffer_object objects — Red Hat Enterprise Linux 8CWE-415 6.7 Medium2023-07-24
CVE-2023-34968 Samba: spotlight server-side share path disclosure — Red Hat Enterprise Linux 8CWE-201 5.3 Medium2023-07-20
CVE-2023-34967 Samba: type confusion in mdssvc rpc service for spotlight — Red Hat Enterprise Linux 8CWE-843 5.3 Medium2023-07-20
CVE-2023-34966 Samba: infinite loop in mdssvc rpc service for spotlight — Red Hat Enterprise Linux 8CWE-835 7.5 High2023-07-20
CVE-2023-3347 Samba: smb2 packet signing is not enforced when "server signing = required" is set — Red Hat Enterprise Linux 8CWE-347 5.9 Medium2023-07-20
CVE-2022-2127 Samba: out-of-bounds read in winbind auth_crap — Red Hat Enterprise Linux 8CWE-125 5.9 Medium2023-07-20
CVE-2023-3674 Keylime: attestation failure when the quote's signature does not validate — Red Hat Enterprise Linux 9CWE-1283 2.3 Low2023-07-19

This page lists every published CVE security advisory associated with Red Hat. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.