Redhat Security Vulnerabilities (CVEs)

Track 318 security vulnerabilities affecting Redhat products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

39 Critical
234 High
45 Medium
🔔 Get Alerts for Redhat
CVE-2023-5764 7.1

This CVE describes a template injection vulnerability in Ansible where unsafe template data can be executed, potentially allowing attackers to run arb...

Dec 12, 2023
CVE-2023-5869 8.8

This CVE-2023-5869 vulnerability in PostgreSQL allows authenticated database users to execute arbitrary code on the server through an integer overflow...

Dec 10, 2023
CVE-2023-6394 7.4

CVE-2023-6394 is an authentication bypass vulnerability in Quarkus where GraphQL operations over WebSocket connections are processed without proper ro...

Dec 9, 2023
CVE-2023-6606 7.1

An out-of-bounds read vulnerability in the Linux kernel's SMB client implementation allows local attackers to read kernel memory. This could lead to s...

Dec 8, 2023
CVE-2023-46848 8.6

Squid proxy server is vulnerable to a denial-of-service attack where remote attackers can crash the service by sending specially crafted ftp:// URLs i...

Nov 3, 2023
CVE-2023-5824 7.5

A vulnerability in Squid proxy server allows cached HTTP response headers to exceed configured size limits, causing worker process stalls or crashes w...

Nov 3, 2023
CVE-2023-46846 9.3

CVE-2023-46846 is an HTTP request smuggling vulnerability in Squid proxy due to lenient chunked decoder handling. It allows attackers to bypass securi...

Nov 3, 2023
CVE-2023-5408 7.2

CVE-2023-5408 is a privilege escalation vulnerability in OpenShift's Kubernetes API server node restriction admission plugin. A remote attacker who ca...

Nov 2, 2023
CVE-2023-5178 8.8

This CVE describes a use-after-free vulnerability in the NVMe/TCP subsystem of the Linux kernel that could allow attackers to execute arbitrary code o...

Nov 1, 2023
CVE-2023-3972 7.8

This vulnerability allows unprivileged local users to escalate privileges to root by exploiting insecure temporary directory handling in insights-clie...

Nov 1, 2023
CVE-2023-5367 7.8

This CVE-2023-5367 is an out-of-bounds write vulnerability in xorg-x11-server that allows attackers to write beyond allocated heap buffers. It could l...

Oct 25, 2023
CVE-2023-5574 7.0

A use-after-free vulnerability in xorg-x11-server-Xvfb allows privilege escalation or denial of service when exploiting a specific legacy multi-screen...

Oct 25, 2023
CVE-2023-4692 7.5

An out-of-bounds write vulnerability in grub2's NTFS filesystem driver allows attackers to corrupt heap metadata by presenting a specially crafted NTF...

Oct 25, 2023
CVE-2023-5633 7.8

CVE-2023-5633 is a use-after-free vulnerability in VMware's 3D acceleration memory handling that allows local unprivileged users within a VMware guest...

Oct 23, 2023
CVE-2023-44487 7.5

CVE-2023-44487 is an HTTP/2 protocol vulnerability that allows attackers to cause denial of service by rapidly resetting streams, consuming server res...

Oct 10, 2023
CVE-2023-43787 7.8

This vulnerability in libX11's XCreateImage() function allows local users to trigger an integer overflow, potentially leading to arbitrary code execut...

Oct 10, 2023
CVE-2023-5366 7.1

This vulnerability in Open vSwitch allows ICMPv6 Neighbor Advertisement packets to bypass OpenFlow rules between virtual machines. A local attacker ca...

Oct 6, 2023
CVE-2023-3971 7.3

This CVE describes an HTML injection vulnerability in a Controller's user interface settings. Attackers can inject malicious HTML to create fake login...

Oct 4, 2023
CVE-2023-4237 7.3

This vulnerability in Ansible Automation Platform's ec2_key module exposes private keys in standard output when creating new keypairs. Attackers can e...

Oct 4, 2023
CVE-2023-3361 7.7

This vulnerability in Red Hat OpenShift Data Science exposes S3 credentials in plain text when exporting pipelines from the Elyra notebook pipeline ed...

Oct 4, 2023
CVE-2023-4911 7.8

CVE-2023-4911 is a buffer overflow vulnerability in the GNU C Library's dynamic loader (ld.so) that allows local attackers to exploit SUID binaries. B...

Oct 3, 2023
CVE-2023-5157 7.5

A vulnerability in MariaDB allows remote attackers to cause denial of service via port scans on ports 3306 and 4567. This affects MariaDB servers with...

Sep 27, 2023
CVE-2023-0456 7.4

This vulnerability in APICast's 3Scale OIDC module allows attackers to access unauthorized information from separate realms when token mismatches aren...

Sep 27, 2023
CVE-2023-42753 7.0

This CVE-2023-42753 is an array indexing vulnerability in the Linux kernel's netfilter subsystem that allows local attackers to perform out-of-bounds ...

Sep 25, 2023
CVE-2022-4318 7.8

This vulnerability in cri-o allows attackers to inject arbitrary lines into the /etc/passwd file using a specially crafted environment variable. This ...

Sep 25, 2023
CVE-2022-4137 8.1

This reflected cross-site scripting (XSS) vulnerability in Keycloak's 'oob' OAuth endpoint allows attackers to inject malicious scripts via crafted li...

Sep 25, 2023
CVE-2023-5156 7.5

CVE-2023-5156 is a memory leak vulnerability in the GNU C Library (glibc) introduced by a previous fix for CVE-2023-4806. This flaw can cause applicat...

Sep 25, 2023
CVE-2023-1260 8.0

CVE-2023-1260 is an authentication bypass vulnerability in Kubernetes kube-apiserver that allows authenticated attackers with specific permissions to ...

Sep 24, 2023
CVE-2022-3596 7.5

CVE-2022-3596 is an information disclosure vulnerability in OpenStack's undercloud that allows unauthenticated remote attackers to access sensitive da...

Sep 20, 2023
CVE-2023-0118 9.1

This vulnerability allows admin users in Foreman to bypass safe mode restrictions in templates, enabling arbitrary code execution on the underlying op...

Sep 20, 2023
CVE-2023-4853 8.1

This vulnerability in Quarkus allows attackers to bypass HTTP security policies by using specially crafted character permutations in requests. Affecte...

Sep 20, 2023
CVE-2023-0813 7.5

This vulnerability in the Network Observability plugin for OpenShift console allows authentication bypass when Loki authToken configuration is not set...

Sep 15, 2023
CVE-2023-1108 7.5

CVE-2023-1108 is a denial-of-service vulnerability in Undertow's SSL/TLS implementation where an infinite loop in the handshake process can crash the ...

Sep 14, 2023
CVE-2023-2680 7.5

CVE-2023-2680 is a use-after-free vulnerability in qemu-kvm virtualization software that occurs due to an incomplete fix for CVE-2021-3750. This allow...

Sep 13, 2023
CVE-2022-1415 8.1

CVE-2022-1415 is a deserialization vulnerability in Drools core utility classes that allows authenticated attackers to execute arbitrary code on affec...

Sep 11, 2023
CVE-2023-39417 7.5

This SQL injection vulnerability in PostgreSQL allows attackers with database-level CREATE privilege to execute arbitrary code as the bootstrap superu...

Aug 11, 2023
CVE-2023-3812 7.8

This vulnerability allows a local user to trigger an out-of-bounds memory access in the Linux kernel's TUN/TAP device driver by sending malicious over...

Jul 24, 2023
CVE-2023-38200 7.5

This vulnerability in Keylime's registrar component allows remote attackers to cause a denial of service by exhausting all available SSL connections d...

Jul 24, 2023
CVE-2023-3567 7.1

This CVE describes a use-after-free vulnerability in the Linux kernel's virtual console screen driver (vc_screen). An attacker with local user access ...

Jul 24, 2023
CVE-2023-33951 6.7

A race condition vulnerability in the Linux kernel's vmwgfx driver allows improper handling of GEM objects due to insufficient locking. This enables a...

Jul 24, 2023
CVE-2023-34966 7.5

This CVE describes an infinite loop vulnerability in Samba's mdssvc RPC service for Spotlight. Attackers can send specially crafted RPC packets with a...

Jul 20, 2023
CVE-2023-3269 7.8

This Linux kernel vulnerability allows attackers to exploit incorrect lock handling in virtual memory area management, leading to use-after-free condi...

Jul 11, 2023
CVE-2023-34432 7.8

A heap buffer overflow vulnerability in sox's lsx_readbuf function allows attackers to write beyond allocated memory boundaries. This can lead to deni...

Jul 10, 2023
CVE-2023-34318 7.8

A heap buffer overflow vulnerability in sox's hcom.c file allows attackers to write beyond allocated memory boundaries. This can lead to denial of ser...

Jul 10, 2023
CVE-2022-4361 10.0

Keycloak has a cross-site scripting (XSS) vulnerability in SAML and OIDC providers where attackers can inject malicious scripts via AssertionConsumerS...

Jul 7, 2023
CVE-2023-3089 7.0

This CVE describes a compliance issue in Red Hat OpenShift Container Platform where, when FIPS mode is enabled, not all cryptographic modules used are...

Jul 5, 2023
CVE-2023-3138 7.5

A memory corruption vulnerability in libX11 allows malicious X servers or man-in-the-middle proxies to crash X11 client applications. The flaw occurs ...

Jun 28, 2023
CVE-2023-32373 8.8

This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious...

Jun 23, 2023
CVE-2023-2454 7.2

CVE-2023-2454 is a PostgreSQL vulnerability where the schema_element function can bypass protective search_path changes, allowing authenticated attack...

Jun 9, 2023
CVE-2023-2603 7.8

An integer overflow vulnerability in libcap's _libcap_strdup() function allows memory corruption when processing extremely large strings (close to 4GB...

Jun 6, 2023

Why Monitor Redhat Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 318+ known vulnerabilities affecting Redhat products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Redhat packages in under 60 seconds. No agents required - completely agentless scanning that works across Redhat deployments.

Free vulnerability database: Access detailed information about every Redhat CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Redhat CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Redhat CVEs Free