Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

RED HAT — Vulnerabilities & Security Advisories 676

Browse all 676 CVE security advisories affecting RED HAT. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2023-7042 Kernel: null pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() — Red Hat Enterprise Linux 6CWE-476 4.4 Medium2023-12-21
CVE-2023-6546 Kernel: gsm multiplexing race condition leads to privilege escalation — Red Hat Enterprise Linux 8CWE-366 7.0 High2023-12-21
CVE-2023-2585 Keycloak: client access via device auth request spoof — Red Hat Single Sign-On 7CWE-358 3.5 Low2023-12-21
CVE-2023-6918 Libssh: missing checks for return values for digests — Red Hat Enterprise Linux 8CWE-252 3.7 Low2023-12-18
CVE-2023-6927 Keycloak: open redirect via "form_post.jwt" jarm response mode — Red Hat build of Keycloak 22CWE-601 4.6 Medium2023-12-18
CVE-2023-5384 Infinispan: credentials returned from configuration as clear text — Red Hat Data Grid 8.4.6CWE-312 7.2 High2023-12-18
CVE-2023-6228 Libtiff: heap-based buffer overflow in cpstriptotile() in tools/tiffcp.c — Red Hat Enterprise Linux 8CWE-787 3.3 Low2023-12-18
CVE-2023-4320 Satellite: arithmetic overflow in satellite — Red Hat Satellite 6.15 for RHEL 8CWE-613 7.6 High2023-12-18
CVE-2023-3628 Infispan: rest bulk ops don't check permissions — Red Hat Data Grid 8.4.4CWE-304 6.5 Medium2023-12-18
CVE-2023-3629 Infinispan: non-admins should not be able to get cache config via rest api — Red Hat Data Grid 8.4.4CWE-304 4.3 Medium2023-12-18
CVE-2023-5056 Skupper-operator: privelege escalation via config map — Service Interconnect 1 for RHEL 9CWE-862 6.8 Medium2023-12-18
CVE-2023-5115 Ansible: malicious role archive can cause ansible-galaxy to overwrite arbitrary files — Red Hat Ansible Automation Platform 2.3 for RHEL 8CWE-36 6.3 Medium2023-12-18
CVE-2023-5236 Infinispan: circular reference on marshalling leads to dos — Red Hat Data Grid 8.4.4 4.4 Medium2023-12-18
CVE-2023-6134 Keycloak: reflected xss via wildcard in oidc redirect_uri — Red Hat build of Keycloak 22CWE-79 4.6 Medium2023-12-14
CVE-2023-6563 Keycloak: offline session token dos — Red Hat Single Sign-On 7.6 for RHEL 7CWE-770 7.7 High2023-12-14
CVE-2023-6377 Xorg-x11-server: out-of-bounds memory reads/writes in xkb button actions — Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONCWE-125 7.8 High2023-12-13
CVE-2023-6478 Xorg-x11-server: out-of-bounds memory read in rrchangeoutputproperty and rrchangeproviderproperty — Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONCWE-190 7.6 High2023-12-13
CVE-2023-6710 Mod_cluster/mod_proxy_cluster: stored cross site scripting — JBoss Core Services for RHEL 8CWE-79 5.4 Medium2023-12-12
CVE-2023-5764 Ansible: template injection — Red Hat Ansible Automation Platform 2.4 for RHEL 8CWE-1336 7.1 High2023-12-12
CVE-2023-5379 Undertow: ajp request closes connection exceeding maxrequestsize — Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7CWE-770 7.5 High2023-12-12
CVE-2023-4958 Stackrox: missing http security headers allows for clickjacking in web ui — Red Hat Advanced Cluster Security 4.2CWE-1021 6.1 Medium2023-12-12
CVE-2023-6679 Kernel: null pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c — Red Hat Enterprise Linux 9CWE-476 5.5 Medium2023-12-11
CVE-2023-5870 Postgresql: role pg_signal_backend can signal certain superuser processes. — Red Hat Advanced Cluster Security 4.2CWE-400 2.2 Low2023-12-10
CVE-2023-5869 Postgresql: buffer overrun from integer overflow in array modification — Red Hat Advanced Cluster Security 4.2CWE-190 8.8 High2023-12-10
CVE-2023-5868 Postgresql: memory disclosure in aggregate function calls — Red Hat Advanced Cluster Security 4.2CWE-686 4.3 Medium2023-12-10
CVE-2023-6394 Quarkus: graphql operations over websockets bypass — Red Hat build of Quarkus 2.13.9.FinalCWE-862 7.4 High2023-12-09
CVE-2023-6622 Kernel: null pointer dereference vulnerability in nft_dynset_init() — Red Hat Enterprise Linux 8CWE-476 5.5 Medium2023-12-08
CVE-2023-6610 Kernel: oob access in smb2_dump_detail — Red Hat Enterprise Linux 8CWE-125 7.1 High2023-12-08
CVE-2023-6606 Kernel: out-of-bounds read vulnerability in smbcalcsize — Red Hat Enterprise Linux 8CWE-125 7.1 High2023-12-08
CVE-2023-6393 Quarkus: potential invalid reuse of context when @cacheresult on a uni is used — Red Hat build of Quarkus 2.13.9.FinalCWE-200 5.3 Medium2023-12-06

This page lists every published CVE security advisory associated with RED HAT. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.