Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

RED HAT — Vulnerabilities & Security Advisories 676

Browse all 676 CVE security advisories affecting RED HAT. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2023-6535 Kernel: null pointer dereference in nvmet_tcp_execute_request — Red Hat Enterprise Linux 8CWE-476 6.5 Medium2024-02-07
CVE-2023-6356 Kernel: null pointer dereference in nvmet_tcp_build_iovec — Red Hat Enterprise Linux 8CWE-476 6.5 Medium2024-02-07
CVE-2023-4503 Eap-galleon: custom provisioning creates unsecured http-invoker — EAP 7.4.14CWE-665 6.8 Medium2024-02-06
CVE-2023-7216 Cpio: extraction allows symlinks which enables remote command execution — Red Hat Enterprise Linux 6CWE-59 5.3 Medium2024-02-05
CVE-2023-6240 Kernel: marvin vulnerability side-channel leakage in the rsa decryption operation — Red Hat Enterprise Linux 8CWE-203 6.5 Medium2024-02-04
CVE-2023-5992 Opensc: side-channel leaks while stripping encryption pkcs#1 padding — Red Hat Enterprise Linux 8CWE-203 5.6 Medium2024-01-31
CVE-2023-40551 Shim: out of bounds read when parsing mz binaries — Red Hat Enterprise Linux 7CWE-125 5.1 Medium2024-01-29
CVE-2023-40546 Shim: out-of-bounds read printing error messages — Red Hat Enterprise Linux 7CWE-476 6.2 Medium2024-01-29
CVE-2023-40549 Shim: out-of-bounds read in verify_buffer_authenticode() malformed pe file — Red Hat Enterprise Linux 7CWE-125 6.2 Medium2024-01-29
CVE-2023-40550 Shim: out-of-bound read in verify_buffer_sbat() — Red Hat Enterprise Linux 7CWE-125 5.5 Medium2024-01-29
CVE-2023-40548 Shim: interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems — Red Hat Enterprise Linux 7CWE-787 7.4 High2024-01-29
CVE-2024-0841 Kernel: hugetlbfs: null pointer dereference in hugetlbfs_fill_super function — Red Hat Enterprise Linux 8CWE-476 6.6 Medium2024-01-28
CVE-2023-6291 Keycloak: redirect_uri validation bypass — Red Hat build of Keycloak 22CWE-601 7.1 High2024-01-26
CVE-2023-6267 Quarkus: json payload getting processed prior to security checks when rest resources are used with annotations. — Red Hat build of Quarkus 2.13.9.FinalCWE-755 8.6 High2024-01-25
CVE-2023-40547 Shim: rce in http boot support may lead to secure boot bypass — Red Hat Enterprise Linux 7CWE-787 8.3 High2024-01-25
CVE-2023-39197 Kernel: dccp: conntrack out-of-bounds read in nf_conntrack_dccp_packet() — Red Hat Enterprise Linux 6CWE-125 4.0 Medium2024-01-23
CVE-2023-6531 Kernel: gc's deletion of an skb races with unix_stream_read_generic() leading to uaf — Red Hat Enterprise Linux 9CWE-362 7.0 High2024-01-21
CVE-2023-6816 Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer — Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONCWE-787 9.8 Critical2024-01-18
CVE-2023-4001 Grub2: bypass the grub password protection feature — Red Hat Enterprise Linux 9CWE-290 6.8 Medium2024-01-15
CVE-2023-6915 Kernel: null pointer dereference vulnerability in ida_free in lib/idr.c — Red Hat Enterprise Linux 8CWE-476 6.2 Medium2024-01-15
CVE-2023-6683 Qemu: vnc: null pointer dereference in qemu_clipboard_request() — Red Hat Enterprise Linux 8CWE-476 6.5 Medium2024-01-12
CVE-2023-5455 Ipa: invalid csrf protection — Red Hat Enterprise Linux 7CWE-352 6.5 Medium2024-01-10
CVE-2023-6476 Cri-o: pods are able to break out of resource confinement on cgroupv2 — Red Hat OpenShift Container Platform 4.13CWE-770 6.5 Medium2024-01-09
CVE-2023-6270 Kernel: aoe: improper reference count leads to use-after-free vulnerability — Red Hat Enterprise Linux 6CWE-416 7.0 High2024-01-04
CVE-2023-6944 Rhdh: catalog-import function leaks credentials to frontend — RHDH-1.1-RHEL-9CWE-209 5.7 Medium2024-01-04
CVE-2023-6004 Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname — Red Hat Enterprise Linux 8CWE-74 4.8 Medium2024-01-03
CVE-2023-7192 Kernel: refcount leak in ctnetlink_create_conntrack() — Red Hat Enterprise Linux 8.2 Advanced Update SupportCWE-401 5.5 Medium2024-01-02
CVE-2023-6693 Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx() — Red Hat Enterprise Linux 8CWE-121 4.9 Medium2024-01-02
CVE-2023-3171 Eap-7: heap exhaustion via deserialization — EAP 7.4.13CWE-789 7.5 High2023-12-27
CVE-2023-7008 Systemd-resolved: unsigned name response in signed zone is not refused when dnssec=yes — Red Hat Enterprise Linux 8CWE-300 5.9 Medium2023-12-23

This page lists every published CVE security advisory associated with RED HAT. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.