Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Red Hat — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting Red Hat. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

Found 18 results / 691Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-33846 Gnutls: gnutls: denial of service via heap buffer overflow in dtls handshake fragment reassembly — Red Hat Hardened ImagesCWE-130 7.5 High2026-05-04
CVE-2026-6732 Libxml2: libxml2: denial of service via crafted xsd-validated document — Red Hat Hardened ImagesCWE-843 6.5 Medium2026-04-23
CVE-2026-1584 Gnutls: gnutls: remote denial of service via crafted clienthello with invalid psk binder — Red Hat Hardened ImagesCWE-476 7.5 High2026-04-09
CVE-2025-14821 Libssh: libssh: insecure default configuration leads to local man-in-the-middle attacks on windows — Red Hat Hardened ImagesCWE-427 7.8 High2026-04-07
CVE-2026-5745 Libarchive: a null pointer dereference vulnerability exists in the acl parser of libarchive — Red Hat Hardened ImagesCWE-476 5.5 Medium2026-04-07
CVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalization — Red Hat Hardened ImagesCWE-289 3.7 Low2026-04-03
CVE-2026-2625 Rust-rpm-sequoia: rust-rpm-sequoia: denial of service via crafted rpm file during signature verification — Red Hat Hardened ImagesCWE-347 4.0 Medium2026-04-03
CVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid input — Red Hat Hardened ImagesCWE-124 7.5AIHighAI2026-03-26
CVE-2026-2100 P11-kit: null dereference via c_derivekey with specific null parameters — Red Hat Hardened ImagesCWE-824 5.3 Medium2026-03-26
CVE-2026-4426 Libarchive: libarchive: denial of service via malformed iso file processing — Red Hat Hardened ImagesCWE-1335 6.5 Medium2026-03-19
CVE-2026-4105 Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method — Red Hat Hardened ImagesCWE-284 6.7 Medium2026-03-13
CVE-2026-26158 Busybox: busybox: arbitrary file modification and privilege escalation via unvalidated tar archive entries — Red Hat Hardened ImagesCWE-73 7.0 High2026-02-11
CVE-2026-26157 Busybox: busybox: arbitrary file overwrite and potential code execution via incomplete path sanitization — Red Hat Hardened ImagesCWE-73 7.0 High2026-02-11
CVE-2026-1757 Libxml2: memory leak leading to local denial of service in xmllint interactive shell — Red Hat Hardened ImagesCWE-401 6.2 Medium2026-02-02
CVE-2026-0988 Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek() — Red Hat Hardened ImagesCWE-190 3.7 Low2026-01-21
CVE-2026-0992 Libxml2: libxml2: denial of service via crafted xml catalogs — Red Hat Hardened ImagesCWE-400 2.9 Low2026-01-15
CVE-2026-0989 Libxml2: unbounded relaxng include recursion leading to stack overflow — Red Hat Hardened ImagesCWE-674 3.7 Low2026-01-15
CVE-2026-0990 Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing — Red Hat Hardened ImagesCWE-674 5.9 Medium2026-01-15

This page lists every published CVE security advisory associated with Red Hat. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.