CVE-2026-3608
Severity: important
Released on: 25/03/2026
Advisory:
Bugzilla: 2451139
Bugzilla Description: Kea: Kea: Denial of Service via maliciously crafted message
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-617
Affected Packages:
Package States: Red Hat Enterprise Linux 10,
Full Details
CVE document


CVE-2026-23322
Severity:
Released on: 25/03/2026
Advisory:
Bugzilla: 2451278
Bugzilla Description: kernel: ipmi: Fix use-after-free and list corruption on sender error
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23327
Severity: moderate
Released on: 25/03/2026
Advisory:
Bugzilla: 2451279
Bugzilla Description: kernel: cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3889
Severity: low
Released on: 24/03/2026
Advisory:
Bugzilla: 2451006
Bugzilla Description: thunderbird: Spoofing issue in Thunderbird
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-33412
Severity: important
Released on: 24/03/2026
Advisory:
Bugzilla: 2450907
Bugzilla Description: vim: Vim: Arbitrary code execution via command injection in glob() function
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-78
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-33349
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450909
Bugzilla Description: fast-xml-parser: fast-xml-parser: Denial of Service via unbounded entity expansion due to incorrect configuration limit handling
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-1284
Affected Packages:
Package States: Migration Toolkit for Applications 8,Red Hat Advanced Cluster Security 4,Red Hat Data Grid 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat OpenShift AI (RHOAI),Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Satellite 6,Red Hat Satellite 6,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-32948
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450890
Bugzilla Description: org.scala-sbt/sbt: sbt: Arbitrary command execution via unvalidated URI fragments on Windows
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-78
Affected Packages:
Package States: Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-32854
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450845
Bugzilla Description: LibVNCServer: LibVNCServer: Denial of Service via specially crafted HTTP requests
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-32853
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450843
Bugzilla Description: LibVNCServer: LibVNCServer: Information disclosure or Denial of Service via heap out-of-bounds read in UltraZip encoding
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4775
Severity: important
Released on: 24/03/2026
Advisory:
Bugzilla: 2450768
Bugzilla Description: libtiff: libtiff: Arbitrary code execution or denial of service via signed integer overflow in TIFF file processing
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27651
Severity: important
Released on: 24/03/2026
Advisory:
Bugzilla: 2450791
Bugzilla Description: NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27654
Severity: important
Released on: 24/03/2026
Advisory:
Bugzilla: 2450776
Bugzilla Description: NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-28755
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450779
Bugzilla Description: NGINX: NGINX: Certificate revocation bypass when OCSP is enabled
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-295
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-28753
Severity: low
Released on: 24/03/2026
Advisory:
Bugzilla: 2450780
Bugzilla Description: NGINX: NGINX Plus: NGINX Open Source: NGINX Plus and NGINX Open Source: Request manipulation via header injection in SMTP upstream requests
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-93
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27784
Severity: important
Released on: 24/03/2026
Advisory:
Bugzilla: 2450785
Bugzilla Description: NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4729
Severity: important
Released on: 24/03/2026
Advisory:
Bugzilla: 2450745
Bugzilla Description: firefox: Memory safety bugs fixed in Firefox 149 and Thunderbird 149
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4728
Severity: low
Released on: 24/03/2026
Advisory:
Bugzilla: 2450717
Bugzilla Description: firefox: Spoofing issue in the Privacy: Anti-Tracking component
CVSS Score:
CVSSv3 Score: 3.4
Vector:
CWE: CWE-290
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4727
Severity: low
Released on: 24/03/2026
Advisory:
Bugzilla: 2450753
Bugzilla Description: firefox: Denial-of-service in the Libraries component in NSS
CVSS Score:
CVSSv3 Score: 3.4
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4726
Severity: low
Released on: 24/03/2026
Advisory:
Bugzilla: 2450731
Bugzilla Description: firefox: Denial-of-service in the XML component
CVSS Score:
CVSSv3 Score: 3.4
Vector:
CWE: CWE-776
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4725
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450716
Bugzilla Description: firefox: Sandbox escape due to use-after-free in the Graphics: Canvas2D component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4723
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450743
Bugzilla Description: firefox: Use-after-free in the JavaScript Engine component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4724
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450749
Bugzilla Description: firefox: Undefined behavior in the Audio/Video component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-475
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4722
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450737
Bugzilla Description: firefox: Privilege escalation in the IPC component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-270
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4649
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450641
Bugzilla Description: Apache Artemis: KNIME Business Hub: Apache Artemis and KNIME Business Hub: Authentication bypass allows information disclosure and message injection.
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-306
Affected Packages:
Package States: Red Hat AMQ Broker 7,Red Hat AMQ Clients,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of OptaPlanner 8,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-32642
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450642
Bugzilla Description: Apache Artemis: Apache ActiveMQ Artemis: Apache Artemis and Apache ActiveMQ Artemis: Unauthorized address creation due to incorrect authorization during JMS topic subscription.
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE:
Affected Packages:
Package States: Red Hat AMQ Broker 7,Red Hat AMQ Clients,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of OptaPlanner 8,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-3260
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2443010
Bugzilla Description: undertow: Undertow: Denial of Service due to premature multipart/form-data parsing in GET requests
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat Data Grid 8,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-33306
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450565
Bugzilla Description: github.com/bcrypt-ruby/bcrypt-ruby: bcrypt-ruby (JRuby): Weakened password hashing due to integer overflow
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-33554
Severity: moderate
Released on: 24/03/2026
Advisory:
Bugzilla: 2450778
Bugzilla Description: freeipmi: buffer overflows on response messages via ipmi-oem
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-33211
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450554
Bugzilla Description: Tekton Pipelines: github.com/tektoncd/pipeline: Tekton Pipelines: Information disclosure via path traversal in git resolver
CVSS Score:
CVSSv3 Score: 7.7
Vector:
CWE: CWE-22
Affected Packages:
Package States: Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-33252
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450542
Bugzilla Description: encoding/json: golang: github.com/modelcontextprotocol/go-sdk: Go MCP SDK: Remote tool execution via cross-site request forgery
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-940
Affected Packages:
Package States: Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,OpenShift Lightspeed,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-33202
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450547
Bugzilla Description: rails: Active Storage: Unintended file deletion via crafted blob keys
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,
Full Details
CVE document


CVE-2026-33195
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450546
Bugzilla Description: Rails: Active Storage: Active Storage (Rails): Arbitrary file access via path traversal in blob keys
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,
Full Details
CVE document


CVE-2026-33176
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450551
Bugzilla Description: Rails: Active Support: Active Support: Denial of Service via large scientific notation strings
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-33174
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450544
Bugzilla Description: Rails: Active Storage: Rails Active Storage: Denial of Service via unbounded Range header
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,
Full Details
CVE document


CVE-2026-33173
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450545
Bugzilla Description: Rails: Active Storage: Rails Active Storage: Content type bypass via arbitrary metadata in direct uploads
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-1287
Affected Packages:
Package States: Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,
Full Details
CVE document


CVE-2026-33170
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450543
Bugzilla Description: Rails: Active Support: Active Support: Cross-Site Scripting (XSS) due to improper HTML safety flag propagation in SafeBuffer#%
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-33169
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450556
Bugzilla Description: rails: rails-activesupport: Active Support: Denial of Service via crafted long digit strings
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-1333
Affected Packages:
Package States: Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-33168
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450549
Bugzilla Description: actionview: Action View: Cross-Site Scripting (XSS) via blank HTML attribute names
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,
Full Details
CVE document


CVE-2026-33167
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450552
Bugzilla Description: Rails: Action Pack: Action Pack: Cross-Site Scripting (XSS) via improper exception message escaping
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-29111
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450505
Bugzilla Description: systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-1287
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-26209
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450422
Bugzilla Description: cbor2: cbor2: Denial of Service due to uncontrolled recursion via crafted CBOR payloads
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-3635
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450330
Bugzilla Description: fastify: request.protocol and request.host spoofable via X-Forwarded-Proto/Host from untrusted connections when trustProxy uses restrictive trust function
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-348
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-4603
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450205
Bugzilla Description: jsrsasign: jsrsasign: Cryptographic operations impacted by division by zero via malicious JSON Web Key
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-369
Affected Packages:
Package States: Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Red Hat Quay 3,Red Hat Quay 3,
Full Details
CVE document


CVE-2026-4601
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450209
Bugzilla Description: jsrsasign: jsrsasign: Private Key Recovery via Missing Cryptographic Step in DSA Signing
CVSS Score:
CVSSv3 Score: 8.7
Vector:
CWE: CWE-325
Affected Packages:
Package States: Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Red Hat Quay 3,Red Hat Quay 3,
Full Details
CVE document


CVE-2026-4599
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450207
Bugzilla Description: jsrsasign: jsrsasign: Private key recovery via incomplete comparison checks biasing DSA nonces
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-338
Affected Packages:
Package States: Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Red Hat Quay 3,Red Hat Quay 3,
Full Details
CVE document


CVE-2026-4598
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450210
Bugzilla Description: jsrsasign: jsrsasign: Denial of Service via infinite loop in bnModInverse function with crafted inputs
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1287
Affected Packages:
Package States: Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Red Hat Quay 3,Red Hat Quay 3,
Full Details
CVE document


CVE-2026-4602
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450206
Bugzilla Description: jsrsasign: jsrsasign: Signature verification bypass via negative exponent handling
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-681
Affected Packages:
Package States: Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Red Hat Quay 3,Red Hat Quay 3,
Full Details
CVE document


CVE-2026-4600
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450208
Bugzilla Description: jsrsasign: jsrsasign: Cryptographic signature forgery via malicious DSA domain parameters
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-347
Affected Packages:
Package States: Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Red Hat Quay 3,Red Hat Quay 3,
Full Details
CVE document


CVE-2026-4628
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450240
Bugzilla Description: keycloak: org.keycloak.authorization: Keycloak: Unauthorized resource modification due to improper access control
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-284
Affected Packages:
Package States: Red Hat Build of Keycloak,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-4647
Severity: moderate
Released on: 23/03/2026
Advisory:
Bugzilla: 2450302
Bugzilla Description: binutils: Out-of-Bounds Read in XCOFF Relocation Processing in GNU Binutils BFD Library
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-4678
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450564
Bugzilla Description: chromium-browser: Use after free in WebGPU
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4674
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450567
Bugzilla Description: chromium-browser: Out of bounds read in CSS
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4680
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450568
Bugzilla Description: chromium-browser: Use after free in FedCM
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4673
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450569
Bugzilla Description: chromium-browser: Heap buffer overflow in WebAudio
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4675
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450570
Bugzilla Description: chromium-browser: Heap buffer overflow in WebGL
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4676
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450571
Bugzilla Description: chromium-browser: Use after free in Dawn
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4679
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450572
Bugzilla Description: chromium-browser: Integer overflow in Fonts
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-190
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4677
Severity: important
Released on: 23/03/2026
Advisory:
Bugzilla: 2450573
Bugzilla Description: chromium-browser: Out of bounds read in WebAudio
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4539
Severity: low
Released on: 22/03/2026
Advisory:
Bugzilla: 2450066
Bugzilla Description: pygments: Pygments: Denial of Service via inefficient regular expression processing in AdlLexer
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-1333
Affected Packages:
Package States: External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Lightspeed Core,Lightspeed Core,Lightspeed Core,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-4538
Severity: moderate
Released on: 22/03/2026
Advisory:
Bugzilla: 2450062
Bugzilla Description: pytorch: PyTorch: Deserialization vulnerability in pt2 Loading Handler allows local impact
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-502
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2019-25544
Severity: moderate
Released on: 21/03/2026
Advisory:
Bugzilla: 2449948
Bugzilla Description: Pidgin: Pidgin: Denial of Service via excessively long username
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-1284
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2026-33210
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449871
Bugzilla Description: ruby/json: Ruby JSON: Denial of Service or Information Disclosure via format string injection
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-134
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat AMQ Clients,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document


CVE-2026-33236
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2449824
Bugzilla Description: nltk: NLTK: Arbitrary file overwrite and creation via path traversal in XML index files
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-22
Affected Packages:
Package States: Lightspeed Core,Lightspeed Core,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-33231
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2449836
Bugzilla Description: nltk: NLTK: Denial of Service via unauthenticated remote shutdown
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-306
Affected Packages:
Package States: Lightspeed Core,Lightspeed Core,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-33230
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449825
Bugzilla Description: nltk: NLTK: Script execution via reflected cross-site scripting in WordNet Browser
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-79
Affected Packages:
Package States: Lightspeed Core,Lightspeed Core,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-33204
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449822
Bugzilla Description: SimpleJWT: SimpleJWT: Denial of Service via JWE header tampering
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-325
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2026-33186
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2449833
Bugzilla Description: golang: google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-551
Affected Packages:
Package States: Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-33180
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2449841
Bugzilla Description: HAPI FHIR: hapifhir/org.hl7.fhir.core: HAPI FHIR: Information disclosure and potential impersonation via HTTP redirects sending sensitive headers
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-201
Affected Packages:
Package States: Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,
Full Details
CVE document


CVE-2026-33155
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449786
Bugzilla Description: deepdiff: python: DeepDiff: Denial of Service via unrestricted memory allocation in pickle unpickler
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-502
Affected Packages:
Package States: Pen Drive Powered by Red Hat Lightspeed,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-33154
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449774
Bugzilla Description: dynaconf: jinja2: Dynaconf: Arbitrary code execution via Server-Side Template Injection
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-917
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2026-33151
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449789
Bugzilla Description: socket.io: Socket.IO: Denial of Service due to excessive buffering of specially crafted packets
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,
Full Details
CVE document


CVE-2026-4438
Severity: low
Released on: 20/03/2026
Advisory:
Bugzilla: 2449783
Bugzilla Description: glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-838
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-4437
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449777
Bugzilla Description: glibc: glibc: Incorrect DNS response parsing via crafted DNS server response
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1286
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-32710
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449711
Bugzilla Description: MariaDB: MariaDB: Remote Code Execution or Denial of Service via JSON_SCHEMA_VALID() function vulnerability
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4519
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2449649
Bugzilla Description: python: Python: Command-line option injection in webbrowser.open() via crafted URLs
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-88
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document


CVE-2026-33132
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449597
Bugzilla Description: github.com/zitadel: ZITADEL: Authentication bypass allows sign-in with other organization's users
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-306
Affected Packages:
Package States: Red Hat Advanced Cluster Management for Kubernetes 2,
Full Details
CVE document


CVE-2026-32595
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449591
Bugzilla Description: traefik: Traefik: Username enumeration via timing attack in BasicAuth middleware
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-208
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-32305
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2449595
Bugzilla Description: Traefik: github.com/traefik/traefik: Traefik: mTLS bypass allows unauthorized service access via fragmented ClientHello.
CVSS Score:
CVSSv3 Score: 8.3
Vector:
CWE: CWE-179
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,Red Hat OpenShift GitOps,
Full Details
CVE document


CVE-2026-33123
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449585
Bugzilla Description: pypdf: pypdf: Denial of Service due to excessive resource consumption from crafted PDF
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Lightspeed Core,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-33022
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449483
Bugzilla Description: github.com/tektoncd/pipeline: Tekton Pipelines: Denial of Service via long resolver names
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-130
Affected Packages:
Package States: Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-33056
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449490
Bugzilla Description: tar-rs: tar-rs: Arbitrary directory permission modification via crafted tar archive
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-59
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Lightspeed Core,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,OpenShift Lightspeed,Pen Drive Powered by Red Hat Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Discovery 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Offline Knowledge Portal,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Update Service,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-33036
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449458
Bugzilla Description: fast-xml-parser: fast-xml-parser: Denial of Service via XML entity expansion bypass
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-776
Affected Packages:
Package States: Migration Toolkit for Applications 8,Red Hat Advanced Cluster Security 4,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat OpenShift AI (RHOAI),Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Satellite 6,Red Hat Satellite 6,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-33013
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449457
Bugzilla Description: micronaut-core: Micronaut Framework: Micronaut Framework: Denial of Service via crafted form parameters
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1285
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-33012
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449450
Bugzilla Description: Micronaut Framework: micronaut-core: Micronaut Framework: Denial of Service via unbounded cache in HTML error response handling
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-32947
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449437
Bugzilla Description: harden-runner: Harden-Runner: Data exfiltration via DNS over HTTPS (DoH) bypass
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-807
Affected Packages:
Package States: External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Gatekeeper 3,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,
Full Details
CVE document


CVE-2026-32946
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449438
Bugzilla Description: step-security/harden-runner: Harden-Runner: Egress policy bypass via DNS over TCP
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-791
Affected Packages:
Package States: External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Gatekeeper 3,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,
Full Details
CVE document


CVE-2026-32889
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449419
Bugzilla Description: tinytag: tinytag: Denial of Service via malicious MP3 file parsing
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: OpenShift Lightspeed,
Full Details
CVE document


CVE-2026-32875
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2449400
Bugzilla Description: ultrajson: UltraJSON: Denial of Service via large indent parameter in JSON serialization
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,
Full Details
CVE document


CVE-2026-32874
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2449411
Bugzilla Description: UltraJSON: UltraJSON: Denial of Service due to memory leak when parsing large integers
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,
Full Details
CVE document


CVE-2026-32766
Severity: low
Released on: 20/03/2026
Advisory:
Bugzilla: 2449371
Bugzilla Description: astral-tokio-tar: astral-tokio-tar: Potential archive misinterpretation via malformed PAX extensions
CVSS Score:
CVSSv3 Score: 2.5
Vector:
CWE: CWE-1286
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-23536
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2429302
Bugzilla Description: feast: Unauthenticated Arbitrary File Read
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-23537
Severity: critical
Released on: 20/03/2026
Advisory:
Bugzilla: 2429304
Bugzilla Description: feast: Unauthenticated Arbitrary File Write
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-862
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-23538
Severity: important
Released on: 20/03/2026
Advisory:
Bugzilla: 2429311
Bugzilla Description: feast: Resource exhaustion via WebSocket endpoint
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-23275
Severity: low
Released on: 20/03/2026
Advisory:
Bugzilla: 2449558
Bugzilla Description: kernel: io_uring: ensure ctx->rings is stable for task work flags manipulation
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-366
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23277
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449560
Bugzilla Description: kernel: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23276
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449561
Bugzilla Description: kernel: net: add xmit recursion limit to tunnel xmit functions
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23273
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449563
Bugzilla Description: kernel: macvlan: observe an RCU grace period in macvlan_common_newlink() error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-364
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23271
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449565
Bugzilla Description: kernel: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-672
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23278
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449570
Bugzilla Description: kernel: netfilter: nf_tables: always walk all pending catchall elements
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-459
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23272
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449571
Bugzilla Description: kernel: netfilter: nf_tables: unconditionally bump set->nelems before insertion
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23274
Severity: moderate
Released on: 20/03/2026
Advisory:
Bugzilla: 2449572
Bugzilla Description: kernel: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-22737
Severity: moderate
Released on: 19/03/2026
Advisory:
Bugzilla: 2449348
Bugzilla Description: Spring Framework: Spring Framework: Information disclosure via Java scripting engine enabled template views
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat AMQ Broker 7,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-22735
Severity: low
Released on: 19/03/2026
Advisory:
Bugzilla: 2449347
Bugzilla Description: org.springframework/spring-webmvc: org.springframework/spring-webflux: Spring MVC and WebFlux: Stream corruption vulnerability when using Server-Sent Events
CVSS Score:
CVSSv3 Score: 2.6
Vector:
CWE: CWE-115
Affected Packages:
Package States: Red Hat AMQ Broker 7,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-22732
Severity: moderate
Released on: 19/03/2026
Advisory:
Bugzilla: 2449306
Bugzilla Description: Spring Security: Spring Security: Security policy bypass and information disclosure due to unwritten HTTP headers
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-166
Affected Packages:
Package States: OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Quarkus,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-22731
Severity: moderate
Released on: 19/03/2026
Advisory:
Bugzilla: 2449290
Bugzilla Description: Spring Boot: Spring Boot: Authentication bypass via misconfigured Health Group additional path
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-305
Affected Packages:
Package States: Red Hat AMQ Broker 7,Red Hat AMQ Clients,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-4428
Severity: moderate
Released on: 19/03/2026
Advisory:
Bugzilla: 2449205
Bugzilla Description: AWS-LC: AWS-LC: Security bypass allows revoked certificates to be accepted due to CRL validation error
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-295
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,OpenShift Lightspeed,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Update Service,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-30836
Severity: critical
Released on: 19/03/2026
Advisory:
Bugzilla: 2449211
Bugzilla Description: github.com/smallstep/certificates: Step CA: Unauthenticated certificate issuance via SCEP Update Request
CVSS Score:
CVSSv3 Score: 10.0
Vector:
CWE: CWE-306
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-26940
Severity: moderate
Released on: 19/03/2026
Advisory:
Bugzilla: 2449139
Bugzilla Description: Kibana: Timelion: Kibana Timelion Plugin: Denial of Service via improper input validation in Timelion expressions
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1284
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift distributed tracing 3,Red Hat OpenStack Platform 16.2,
Full Details
CVE document


CVE-2026-26939
Severity: moderate
Released on: 19/03/2026
Advisory:
Bugzilla: 2449144
Bugzilla Description: Kibana: Kibana: Unauthorized system control via missing authorization
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1220
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document


CVE-2026-3029
Severity: important
Released on: 19/03/2026
Advisory:
Bugzilla: 2449054
Bugzilla Description: PyMuPDF: PyMuPDF: Arbitrary file write via path traversal vulnerability
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document


CVE-2006-10003
Severity: important
Released on: 19/03/2026
Advisory:
Bugzilla: 2448999
Bugzilla Description: perl-xml-parser: XML::Parser: Memory corruption via deeply nested XML files
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-193
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2006-10002
Severity: moderate
Released on: 19/03/2026
Advisory:
Bugzilla: 2449001
Bugzilla Description: perl-xml-parser: XML::Parser for Perl: Heap corruption and denial of service from crafted XML input
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4424
Severity: important
Released on: 19/03/2026
Advisory:
Bugzilla: 2449006
Bugzilla Description: libarchive: libarchive: Information disclosure via heap out-of-bounds read in RAR archive processing
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-4426
Severity: moderate
Released on: 19/03/2026
Advisory:
Bugzilla: 2449010
Bugzilla Description: libarchive: libarchive: Denial of Service via malformed ISO file processing
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1335
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-69720
Severity: moderate
Released on: 19/03/2026
Advisory:
Bugzilla: 2449037
Bugzilla Description: ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-15031
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448912
Bugzilla Description: mlflow/mlflow: Path Traversal Vulnerability in mlflow/mlflow
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-32700
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448858
Bugzilla Description: devise: Devise: Unauthorized email confirmation due to a race condition
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-367
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-32636
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448862
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via out-of-bounds write in NewXMLTree method
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-31965
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448751
Bugzilla Description: htslib: HTSlib: Information disclosure or denial of service via out-of-bounds read in CRAM record processing
CVSS Score:
CVSSv3 Score: 5.6
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-31964
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448756
Bugzilla Description: htslib: HTSlib: Denial of Service via NULL pointer dereference in CRAM decoding
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-476
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-31963
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448755
Bugzilla Description: htslib: HTSlib: Arbitrary code execution via crafted CRAM file
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-193
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3479
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448746
Bugzilla Description: python: Python pkgutil.get_data(): Path Traversal via improper resource argument validation
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-31962
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448750
Bugzilla Description: htslib: htslib: Heap buffer overflow leading to arbitrary code execution via crafted CRAM file
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-1284
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-27135
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448754
Bugzilla Description: nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-617
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-33002
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448643
Bugzilla Description: jenkins: Jenkins: Origin validation bypass via DNS rebinding in CLI WebSocket endpoint
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-346
Affected Packages:
Package States: OpenShift Developer Tools and Services,Red Hat Developer Hub,
Full Details
CVE document


CVE-2026-33001
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448645
Bugzilla Description: jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-22
Affected Packages:
Package States: OpenShift Developer Tools and Services,Red Hat Developer Hub,
Full Details
CVE document


CVE-2026-4427
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448626
Bugzilla Description: github.com/jackc/pgproto3: pgproto3: Denial of Service via negative field length in DataRow message
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-129
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift on AWS,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-31938
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448550
Bugzilla Description: jspdf: jsPDF: Cross site scripting via unsanitized output options
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat Advanced Cluster Security 4,
Full Details
CVE document


CVE-2026-31898
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448547
Bugzilla Description: jspdf: jsPDF: Arbitrary code execution via unsanitized input in createAnnotation method
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat Advanced Cluster Security 4,
Full Details
CVE document


CVE-2026-30922
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448553
Bugzilla Description: pyasn1: pyasn1 Vulnerable to Denial of Service via Unbounded Recursion
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Service Mesh 3,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,
Full Details
CVE document


CVE-2026-28500
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448518
Bugzilla Description: onnx: ONNX: Untrusted Model Repository Warnings Suppressed
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-829
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-29057
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448515
Bugzilla Description: next.js: Next.js: HTTP request smuggling in rewrites
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-444
Affected Packages:
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Trusted Artifact Signer,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27980
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448509
Bugzilla Description: next.js: Next.js: Unbounded next/image disk cache growth can exhaust storage
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Trusted Artifact Signer,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27979
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448512
Bugzilla Description: next.js: Next.js: Unbounded postponed resume buffering can lead to DoS
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Trusted Artifact Signer,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-4366
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448543
Bugzilla Description: keycloak-services: Blind Server-Side Request Forgery (SSRF) via HTTP Redirect Handling in Keycloak
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-918
Affected Packages:
Package States: Red Hat Build of Keycloak,Red Hat Build of Keycloak,Red Hat Build of Keycloak,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-23245
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448593
Bugzilla Description: kernel: net/sched: act_gate: snapshot parameters with RCU on replace
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23243
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448594
Bugzilla Description: kernel: Linux kernel: Denial of service and memory corruption in RDMA umad
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71265
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448595
Bugzilla Description: kernel: fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23248
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448596
Bugzilla Description: kernel: perf/core: Fix refcount bug and potential UAF in perf_mmap
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71266
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448597
Bugzilla Description: kernel: fs: ntfs3: check return value of indx_find to avoid infinite loop
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23247
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448598
Bugzilla Description: kernel: tcp: secure_seq: add back ports to TS offset
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71267
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448599
Bugzilla Description: kernel: fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23246
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448600
Bugzilla Description: kernel: Linux kernel: Denial of Service in mac80211 Wi-Fi due to out-of-bounds write
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23244
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448601
Bugzilla Description: kernel: nvme: fix memory allocation in nvme_pr_read_keys()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23242
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448602
Bugzilla Description: kernel: RDMA/siw: Fix potential NULL pointer dereference in header processing
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71270
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448681
Bugzilla Description: kernel: LoongArch: Enable exception fixup for specific ADE subcode
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23263
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448683
Bugzilla Description: kernel: io_uring/zcrx: fix page array leak
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23266
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448684
Bugzilla Description: kernel: fbdev: rivafb: fix divide error in nv3_arb()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23253
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448685
Bugzilla Description: kernel: Kernel: Denial of Service via DVB DVR ringbuffer reinitialization flaw
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-664
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23261
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448686
Bugzilla Description: kernel: nvme-fc: release admin tagset if init fails
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23259
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448689
Bugzilla Description: kernel: io_uring/rw: free potentially allocated iovec on cache put failure
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71269
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448690
Bugzilla Description: kernel: btrfs: do not free data reservation in fallback from inline due to -ENOSPC
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-832
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23267
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448691
Bugzilla Description: kernel: f2fs: fix IS_CHECKPOINTED flag inconsistency issue caused by concurrent atomic commit and checkpoint writes
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23256
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448693
Bugzilla Description: kernel: net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-193
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23262
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448694
Bugzilla Description: kernel: gve: Fix stats report corruption on queue count change
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71268
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448696
Bugzilla Description: kernel: btrfs: fix reservation leak in some error paths when inserting inline extent
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23254
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448699
Bugzilla Description: kernel: net: gro: fix outer network offset
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23249
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448700
Bugzilla Description: kernel: xfs: check for deleted cursors when revalidating two btrees
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23257
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448701
Bugzilla Description: kernel: net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-193
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23260
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448702
Bugzilla Description: kernel: regmap: maple: free entry on mas_store_gfp() failure
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23255
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448703
Bugzilla Description: kernel: net: add proper RCU protection to /proc/net/ptype
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23252
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448704
Bugzilla Description: kernel: xfs: get rid of the xchk_xfile_*_descr calls
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23265
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448709
Bugzilla Description: kernel: f2fs: fix to do sanity check on node footer in {read,write}_end_io
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23251
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448710
Bugzilla Description: kernel: xfs: only call xf{array,blob}_destroy if we have a valid pointer
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23264
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448711
Bugzilla Description: kernel: Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem"
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23250
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448712
Bugzilla Description: kernel: xfs: check return value of xchk_scrub_create_subord
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-253
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23258
Severity: low
Released on: 18/03/2026
Advisory:
Bugzilla: 2448713
Bugzilla Description: kernel: net: liquidio: Initialize netdev pointer before queue setup
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23270
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448745
Bugzilla Description: kernel: Linux kernel: Use-after-free in traffic control (act_ct) may lead to denial of service or privilege escalation
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26740
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448747
Bugzilla Description: giflib: giflib: Denial of Service via buffer overflow in EGifGCBToExtension
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 1.8,Red Hat build of OpenJDK 21,Red Hat build of OpenJDK 25,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23268
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448752
Bugzilla Description: kernel: apparmor: fix unprivileged local user can do privileged policy management
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23269
Severity:
Released on: 18/03/2026
Advisory:
Bugzilla: 2448753
Bugzilla Description: kernel: apparmor: validate DFA start states are in bounds in unpack_pdb
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-43010
Severity: important
Released on: 18/03/2026
Advisory: RHSA-2024:9679, RHSA-2024:9646, RHSA-2024:9144, RHSA-2024:8496, RHSA-2024:9653, RHSA-2025:10364, RHSA-2024:9680, RHSA-2024:8492, RHSA-2024:9636, RHSA-2024:8180,
Bugzilla: 2448778
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to memory corruption
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages: webkit2gtk3-0:2.46.3-1.el8_4,webkit2gtk3-0:2.44.3-2.el9,webkit2gtk3-0:2.46.3-1.el8_6,webkit2gtk3-0:2.46.3-1.el8_8,webkit2gtk3-0:2.46.3-1.el8_10,webkit2gtk3-0:2.46.1-1.el9_2,webkitgtk4-0:2.48.3-2.el7_9,webkit2gtk3-0:2.46.1-1.el9_0,webkit2gtk3-0:2.46.3-1.el8_2,webkit2gtk3-0:2.46.1-2.el9_4,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2025-31223
Severity: important
Released on: 18/03/2026
Advisory: RHSA-2025:19157, RHSA-2025:17807, RHSA-2025:17741, RHSA-2025:17743, RHSA-2025:17643, RHSA-2025:17802, RHSA-2025:19109, RHSA-2025:19352, RHSA-2025:19165, RHSA-2025:18097,
Bugzilla: 2448779
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to memory corruption
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages: webkit2gtk3-0:2.50.0-1.el8_6,webkit2gtk3-0:2.50.0-2.el9_4,webkit2gtk3-0:2.50.0-1.el8_10,webkit2gtk3-0:2.50.0-1.el8_8.1,webkit2gtk3-0:2.50.0-2.el9_2,webkit2gtk3-0:2.50.0-2.el9_0,webkit2gtk3-0:2.50.0-1.el8_2,webkit2gtk3-0:2.50.0-1.el8_4,webkit2gtk3-0:2.50.1-0.el9_6,webkitgtk4-0:2.50.0-1.el7_9,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2025-31277
Severity: important
Released on: 18/03/2026
Advisory: RHSA-2025:19157, RHSA-2025:17807, RHSA-2025:17741, RHSA-2025:17743, RHSA-2025:17643, RHSA-2025:17802, RHSA-2025:19109, RHSA-2025:19352, RHSA-2025:19165, RHSA-2025:18097,
Bugzilla: 2448780
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to memory corruption
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages: webkit2gtk3-0:2.50.0-1.el8_6,webkit2gtk3-0:2.50.0-2.el9_4,webkit2gtk3-0:2.50.0-1.el8_10,webkit2gtk3-0:2.50.0-1.el8_8.1,webkit2gtk3-0:2.50.0-2.el9_2,webkit2gtk3-0:2.50.0-2.el9_0,webkit2gtk3-0:2.50.0-1.el8_2,webkit2gtk3-0:2.50.0-1.el8_4,webkit2gtk3-0:2.50.1-0.el9_6,webkitgtk4-0:2.50.0-1.el7_9,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2025-43213
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448781
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-43214
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448782
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-43433
Severity: important
Released on: 18/03/2026
Advisory: RHSA-2025:23743, RHSA-2025:22789, RHSA-2025:23434, RHSA-2025:23742, RHSA-2025:23433, RHSA-2025:22790, RHSA-2025:23452, RHSA-2025:23583, RHSA-2025:23451, RHSA-2025:23110, RHSA-2025:23591,
Bugzilla: 2448783
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to memory corruption
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages: webkitgtk4-0:2.50.3-2.el7_9,webkit2gtk3-0:2.50.3-2.el8_6,webkit2gtk3-0:2.50.3-1.el9_0,webkit2gtk3-0:2.50.3-2.el8_8,webkit2gtk3-0:2.50.3-2.el8_2,webkit2gtk3-0:2.50.3-2.el8_4,webkit2gtk3-0:2.50.3-1.el8_10,webkit2gtk3-0:2.50.3-1.el9_6,webkit2gtk3-0:2.50.3-1.el9_7,webkit2gtk3-0:2.50.3-1.el9_4,webkit2gtk3-0:2.50.3-1.el9_2,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2025-43438
Severity: important
Released on: 18/03/2026
Advisory: RHSA-2025:23743, RHSA-2025:22789, RHSA-2025:23434, RHSA-2025:23742, RHSA-2025:23433, RHSA-2025:22790, RHSA-2025:23452, RHSA-2025:23583, RHSA-2025:23451, RHSA-2025:23110, RHSA-2025:23591,
Bugzilla: 2448784
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-416
Affected Packages: webkitgtk4-0:2.50.3-2.el7_9,webkit2gtk3-0:2.50.3-2.el8_6,webkit2gtk3-0:2.50.3-1.el9_0,webkit2gtk3-0:2.50.3-2.el8_8,webkit2gtk3-0:2.50.3-2.el8_2,webkit2gtk3-0:2.50.3-2.el8_4,webkit2gtk3-0:2.50.3-1.el8_10,webkit2gtk3-0:2.50.3-1.el9_6,webkit2gtk3-0:2.50.3-1.el9_7,webkit2gtk3-0:2.50.3-1.el9_4,webkit2gtk3-0:2.50.3-1.el9_2,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2025-43441
Severity: important
Released on: 18/03/2026
Advisory: RHSA-2025:23743, RHSA-2025:22789, RHSA-2025:23434, RHSA-2025:23742, RHSA-2025:23433, RHSA-2025:22790, RHSA-2025:23452, RHSA-2025:23583, RHSA-2025:23451, RHSA-2025:23110, RHSA-2025:23591,
Bugzilla: 2448785
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages: webkitgtk4-0:2.50.3-2.el7_9,webkit2gtk3-0:2.50.3-2.el8_6,webkit2gtk3-0:2.50.3-1.el9_0,webkit2gtk3-0:2.50.3-2.el8_8,webkit2gtk3-0:2.50.3-2.el8_2,webkit2gtk3-0:2.50.3-2.el8_4,webkit2gtk3-0:2.50.3-1.el8_10,webkit2gtk3-0:2.50.3-1.el9_6,webkit2gtk3-0:2.50.3-1.el9_7,webkit2gtk3-0:2.50.3-1.el9_4,webkit2gtk3-0:2.50.3-1.el9_2,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2025-43457
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448786
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-43511
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448787
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-46299
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448788
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may disclose internal states of the app
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-909
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-20608
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448789
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-20635
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448790
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-20636
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448791
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-20644
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448792
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-20652
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2448793
Bugzilla Description: webkitgtk: A remote attacker may be able to cause a denial-of-service
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-20676
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2448794
Bugzilla Description: webkitgtk: A website may be able to track users through Safari web extensions
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-201
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4462
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449381
Bugzilla Description: chromium-browser: Out of bounds read in Blink
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4464
Severity: moderate
Released on: 18/03/2026
Advisory:
Bugzilla: 2449382
Bugzilla Description: chromium-browser: Integer overflow in ANGLE
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-190
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4442
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449383
Bugzilla Description: chromium-browser: Heap buffer overflow in CSS
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-131
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4439
Severity: critical
Released on: 18/03/2026
Advisory:
Bugzilla: 2449384
Bugzilla Description: chromium-browser: Out of bounds memory access in WebGL
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4451
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449385
Bugzilla Description: chromium-browser: Insufficient validation of untrusted input in Navigation
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-1286
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4453
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449387
Bugzilla Description: chromium-browser: Integer overflow in Dawn
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-190
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4452
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449388
Bugzilla Description: chromium-browser: Integer overflow in ANGLE
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-190
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4447
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449389
Bugzilla Description: chromium-browser: Inappropriate implementation in V8
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-843
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4455
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449392
Bugzilla Description: chromium-browser: Heap buffer overflow in PDFium
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4440
Severity: critical
Released on: 18/03/2026
Advisory:
Bugzilla: 2449394
Bugzilla Description: chromium-browser: Out of bounds read and write in WebGL
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4458
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449395
Bugzilla Description: chromium-browser: Use after free in Extensions
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4450
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449396
Bugzilla Description: chromium-browser: Out of bounds write in V8
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4449
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449397
Bugzilla Description: chromium-browser: Use after free in Blink
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-1341
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4444
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449398
Bugzilla Description: chromium-browser: Stack buffer overflow in WebRTC
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-120
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4461
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449399
Bugzilla Description: chromium-browser: Inappropriate implementation in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4443
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449401
Bugzilla Description: chromium-browser: Heap buffer overflow in WebAudio
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-120
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4459
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449402
Bugzilla Description: chromium-browser: Out of bounds read and write in WebAudio
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4446
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449405
Bugzilla Description: chromium-browser: Use after free in WebRTC
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4448
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449406
Bugzilla Description: chromium-browser: Heap buffer overflow in ANGLE
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-120
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4456
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449407
Bugzilla Description: chromium-browser: Use after free in Digital Credentials API
CVSS Score:
CVSSv3 Score: 9.0
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4457
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449409
Bugzilla Description: chromium-browser: Type Confusion in V8
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-843
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4460
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449412
Bugzilla Description: chromium-browser: Out of bounds read in Skia
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4463
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449413
Bugzilla Description: chromium-browser: Heap buffer overflow in WebRTC
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-131
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4454
Severity: important
Released on: 18/03/2026
Advisory:
Bugzilla: 2449414
Bugzilla Description: chromium-browser: Use after free in Network
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4441
Severity: critical
Released on: 18/03/2026
Advisory:
Bugzilla: 2449415
Bugzilla Description: chromium-browser: Use after free in Base
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-27978
Severity: moderate
Released on: 17/03/2026
Advisory:
Bugzilla: 2448513
Bugzilla Description: next.js: Next.js: null origin can bypass Server Actions CSRF checks
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-346
Affected Packages:
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Trusted Artifact Signer,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27977
Severity: moderate
Released on: 17/03/2026
Advisory:
Bugzilla: 2448514
Bugzilla Description: next.js: Next.js: null origin can bypass dev HMR websocket CSRF checks
CVSS Score:
CVSSv3 Score: 4.2
Vector:
CWE: CWE-346
Affected Packages:
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Trusted Artifact Signer,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27459
Severity: important
Released on: 17/03/2026
Advisory:
Bugzilla: 2448503
Bugzilla Description: pyOpenSSL: DTLS cookie callback buffer overflow
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Red Hat Update Infrastructure 4 for Cloud Providers,
Full Details
CVE document


CVE-2026-27448
Severity: moderate
Released on: 17/03/2026
Advisory:
Bugzilla: 2448508
Bugzilla Description: pyOpenSSL: TLS connection bypass via unhandled callback exception in set_tlsext_servername_callback
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-636
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Red Hat Update Infrastructure 4 for Cloud Providers,
Full Details
CVE document


CVE-2026-4645
Severity: important
Released on: 17/03/2026
Advisory:
Bugzilla: 2450214
Bugzilla Description: github.com/antchfx/xpath: xpath: Denial of Service via crafted Boolean XPath expressions
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: Compliance Operator,Compliance Operator,File Integrity Operator,File Integrity Operator,File Integrity Operator,File Integrity Operator,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,
Full Details
CVE document


CVE-2026-4359
Severity: moderate
Released on: 17/03/2026
Advisory:
Bugzilla: 2448447
Bugzilla Description: mongo-c-driver: mongo-c-driver: Denial of Service via malformed HTTP response
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-170
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-32981
Severity: important
Released on: 17/03/2026
Advisory:
Bugzilla: 2448440
Bugzilla Description: ray: Ray Dashboard Path Traversal Leading to Local File Disclosure
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-32837
Severity: moderate
Released on: 17/03/2026
Advisory:
Bugzilla: 2448445
Bugzilla Description: miniaudio: miniaudio: Denial of Service via crafted WAV files due to heap out-of-bounds read
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-170
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4324
Severity: moderate
Released on: 17/03/2026
Advisory:
Bugzilla: 2448349
Bugzilla Description: rubygem-katello: Katello: Denial of Service and potential information disclosure via SQL injection
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-89
Affected Packages:
Package States: Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-23241
Severity: moderate
Released on: 17/03/2026
Advisory:
Bugzilla: 2448335
Bugzilla Description: kernel: audit: add missing syscalls to read class
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE: CWE-693
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71239
Severity: moderate
Released on: 17/03/2026
Advisory:
Bugzilla: 2448336
Bugzilla Description: kernel: audit: add fchmodat2() to change attributes class
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE: CWE-693
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4177
Severity: important
Released on: 16/03/2026
Advisory:
Bugzilla: 2448277
Bugzilla Description: perl-YAML-Syck: YAML::Syck versions through 1.36 for Perl has several potential security vulnerabilities including a high-severity heap buffer overflow in the YAML emitter
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2026-32829
Severity: important
Released on: 16/03/2026
Advisory:
Bugzilla: 2448271
Bugzilla Description: lz4_flex: lz4_flex's decompression can leak information from uninitialized memory or reused output buffer
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-823
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2025-69196
Severity: important
Released on: 16/03/2026
Advisory:
Bugzilla: 2448179
Bugzilla Description: fastmcp: FastMCP: Improper token issuance due to incorrect resource parameter handling
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-1220
Affected Packages:
Package States: Red Hat Developer Hub,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-28498
Severity: important
Released on: 16/03/2026
Advisory:
Bugzilla: 2448182
Bugzilla Description: authlib: Authlib: Authentication bypass via forged OpenID Connect ID Tokens
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-325
Affected Packages:
Package States: Lightspeed Core,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-4224
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2448181
Bugzilla Description: cpython: Stack overflow parsing XML with deeply nested DTD content models
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-805
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document


CVE-2026-28490
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2448162
Bugzilla Description: authlib: Authlib: Information disclosure due to cryptographic padding oracle in JWE RSA1_5
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-325
Affected Packages:
Package States: Lightspeed Core,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-3644
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2448168
Bugzilla Description: cpython: Incomplete control character validation in http.cookies
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-791
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document


CVE-2026-27962
Severity: critical
Released on: 16/03/2026
Advisory: RHSA-2026:4942, RHSA-2026:5665,
Bugzilla: 2448164
Bugzilla Description: authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-347
Affected Packages: quay/quay-rhel8:sha256:56bcc55b01c76a1eb7ad8b265cf9dfdd488fc62bc353e3822864a0f6c4f98ffb,quay/quay-rhel8:sha256:c0d00643c4ac6f84e5327192a29c6353b5dcac34d483d0a3e5f39d366127fcc2,
Package States: Lightspeed Core,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-32778
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2447885
Bugzilla Description: libexpat: libexpat: Denial of Service via NULL pointer dereference after out-of-memory condition
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-32777
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2447890
Bugzilla Description: libexpat: libexpat: Denial of Service via infinite loop in DTD content parsing
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-32776
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2447888
Bugzilla Description: libexpat: libexpat: Denial of Service due to NULL pointer dereference
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-32775
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2447881
Bugzilla Description: libexif: libexif: Buffer overwrite via integer underflow in MakerNotes decoding
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-191
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-4271
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2448044
Bugzilla Description: libsoup: libsoup: Denial of Service via Use-After-Free in HTTP/2 server
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-69693
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2448195
Bugzilla Description: FFmpeg: out-of-bounds read in RV60 video decoder
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Lightspeed Core,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2025-68971
Severity: moderate
Released on: 16/03/2026
Advisory:
Bugzilla: 2448387
Bugzilla Description: forgejo: Forgejo: Denial of Service via large file attachment upload
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4174
Severity: moderate
Released on: 15/03/2026
Advisory:
Bugzilla: 2447696
Bugzilla Description: Radare2: Radare2: Local resource consumption via Mach-O File Parser
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-1050
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-14287
Severity: important
Released on: 15/03/2026
Advisory:
Bugzilla: 2447690
Bugzilla Description: mlflow: MLflow: Arbitrary command execution via unsanitized container image names
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-78
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2025-54920
Severity: moderate
Released on: 14/03/2026
Advisory:
Bugzilla: 2447599
Bugzilla Description: org.apache.spark/spark-core: Apache Spark: Spark History Server Code Execution Vulnerability
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat Fuse 7,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-32640
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447529
Bugzilla Description: simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-915
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-32635
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2447515
Bugzilla Description: @angular/core: @angular/compiler: Angular has XSS in i18n attribute bindings
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-32630
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2447514
Bugzilla Description: file-type: file-type: Denial of Service via excessive memory growth from crafted ZIP files
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-409
Affected Packages:
Package States: Cryostat 4,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat build of Apicurio Registry 2,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Satellite 6,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-3084
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447483
Bugzilla Description: GStreamer: GStreamer: Remote Code Execution via integer underflow in H.266 Codec Parser
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-191
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2921
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447496
Bugzilla Description: GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3083
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447498
Bugzilla Description: GStreamer: GStreamer: Remote Code Execution via Out-Of-Bounds Write in rtpqdm2depay
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3086
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447493
Bugzilla Description: GStreamer: GStreamer: Remote Code Execution via Out-Of-Bounds Write in H.266 Codec Parser
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3085
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447495
Bugzilla Description: GStreamer: GStreamer: Remote Code Execution via Heap-based Buffer Overflow in rtpqdm2depay
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-1284
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3082
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447492
Bugzilla Description: GStreamer: GStreamer: Remote Code Execution via heap-based buffer overflow in JPEG parser
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3081
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447494
Bugzilla Description: GStreamer: GStreamer: Arbitrary code execution via H.266 codec parsing stack-based buffer overflow
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2923
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447503
Bugzilla Description: GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in DVB Subtitles handling
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2922
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447500
Bugzilla Description: GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in RealMedia Demuxer
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2920
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447490
Bugzilla Description: GStreamer: GStreamer: Arbitrary code execution via ASF file processing
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-31899
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447447
Bugzilla Description: CairoSVG: CairoSVG: Denial of Service via recursive element amplification
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-776
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-30853
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2447437
Bugzilla Description: calibre: Calibre: Arbitrary file write via crafted RocketBook (.rb) file
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-22
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-31897
Severity: low
Released on: 13/03/2026
Advisory:
Bugzilla: 2447380
Bugzilla Description: freerdp: FreeRDP has an out-of-bounds read in `freerdp_bitmap_decompress_planar`
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-31806
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2447376
Bugzilla Description: freerdp: FreeRDP: Arbitrary code execution via crafted Remote Desktop Protocol (RDP) server messages
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-31885
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2447383
Bugzilla Description: freerdp: FreeRDP has an out-of-bounds read in ADPCM decoders due to missing predictor/step_index bounds checks
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-31884
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2447385
Bugzilla Description: freerdp: FreeRDP has a division-by-zero in ADPCM decoders when `nBlockAlign` is 0
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-369
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-31883
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2447386
Bugzilla Description: freerdp: FreeRDP has a `size_t` underflow in ADPCM decoder leads to heap-buffer-overflow write
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-29776
Severity: low
Released on: 13/03/2026
Advisory:
Bugzilla: 2447381
Bugzilla Description: freerdp: FreeRDP has an Integer Underflow in update_read_cache_bitmap_order Function of FreeRDP's Core Library
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-29775
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2447379
Bugzilla Description: freerdp: FreeRDP has a heap-buffer-overflow in bitmap_cache_put via OOB cacheId
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-29774
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2447382
Bugzilla Description: freerdp: FreeRDP has a heap-buffer-overflow in avc420_yuv_to_rgb via OOB regionRects
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2673
Severity: low
Released on: 13/03/2026
Advisory:
Bugzilla: 2447327
Bugzilla Description: openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-325
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Hardened Images,Red Hat JBoss Core Services,
Full Details
CVE document


CVE-2025-57849
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2391100
Bugzilla Description: fuse: privilege escalation via excessive /etc/passwd permissions
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-276
Affected Packages:
Package States: Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,
Full Details
CVE document


CVE-2025-8766
Severity: important
Released on: 13/03/2026
Advisory:
Bugzilla: 2387265
Bugzilla Description: noobaa-core: Excessive permissions of /etc could lead to escalation of privilege in the noobaa-core container
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-276
Affected Packages:
Package States: Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,
Full Details
CVE document


CVE-2026-3312
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2443259
Bugzilla Description: pagure: Pagure: Information disclosure via unrestricted reStructuredText include directive
CVSS Score:
CVSSv3 Score: 7.7
Vector:
CWE: CWE-22
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-4105
Severity: moderate
Released on: 13/03/2026
Advisory:
Bugzilla: 2447262
Bugzilla Description: systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-284
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-32597
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447194
Bugzilla Description: pyjwt: PyJWT accepts unknown `crit` header extensions (RFC 7515 §4.1.11 MUST violation)
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-347
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-32304
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447200
Bugzilla Description: locutusjs: Locutus: Arbitrary code execution via unsanitized parameters in create_function
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-88
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document


CVE-2026-2229
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447143
Bugzilla Description: undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-248
Affected Packages:
Package States: Cryostat 4,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Pipelines,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-1528
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447145
Bugzilla Description: undici: undici: Denial of Service via crafted WebSocket frame with large length
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-248
Affected Packages:
Package States: Cryostat 4,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Pipelines,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-1527
Severity: moderate
Released on: 12/03/2026
Advisory:
Bugzilla: 2447141
Bugzilla Description: undici: Undici: HTTP header injection and request smuggling vulnerability
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-93
Affected Packages:
Package States: Cryostat 4,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Pipelines,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-2581
Severity: moderate
Released on: 12/03/2026
Advisory:
Bugzilla: 2447140
Bugzilla Description: undici: Undici: Denial of Service due to uncontrolled resource consumption
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-770
Affected Packages:
Package States: Cryostat 4,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Pipelines,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-1526
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447142
Bugzilla Description: undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Cryostat 4,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Pipelines,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-1525
Severity: moderate
Released on: 12/03/2026
Advisory:
Bugzilla: 2447144
Bugzilla Description: undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-444
Affected Packages:
Package States: Cryostat 4,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Pipelines,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-32274
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447111
Bugzilla Description: black: Black: Arbitrary file writes from unsanitized user input in cache file name
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Virtualization 4,
Full Details
CVE document


CVE-2026-32259
Severity: moderate
Released on: 12/03/2026
Advisory:
Bugzilla: 2447112
Bugzilla Description: ImageMagick: stack-based buffer overflow in sixel encoder
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-121
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-32240
Severity: moderate
Released on: 12/03/2026
Advisory:
Bugzilla: 2447117
Bugzilla Description: capnproto: Cap'n Proto: Integer overflow in KJ-HTTP chunk size
CVSS Score:
CVSSv3 Score: 4.8
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,
Full Details
CVE document


CVE-2026-32239
Severity: moderate
Released on: 12/03/2026
Advisory:
Bugzilla: 2447106
Bugzilla Description: capnproto: Cap'n Proto has an integer overflow in KJ-HTTP
CVSS Score:
CVSSv3 Score: 4.8
Vector:
CWE: CWE-681
Affected Packages:
Package States: Red Hat Enterprise Linux 10,
Full Details
CVE document


CVE-2026-32249
Severity: low
Released on: 12/03/2026
Advisory:
Bugzilla: 2447110
Bugzilla Description: vim: NFA regex engine NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-32237
Severity: moderate
Released on: 12/03/2026
Advisory:
Bugzilla: 2447080
Bugzilla Description: @backstage/plugin-scaffolder-backend: @backstage/plugin-scaffolder-backend: Possible exposure of defaultEnvironment secrets using dry-run endpoint
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-497
Affected Packages:
Package States: Red Hat Developer Hub,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-32236
Severity:
Released on: 12/03/2026
Advisory:
Bugzilla: 2447090
Bugzilla Description: @backstage/plugin-auth-backend: @backstage/plugin-auth-backend: SSRF in experimental CIMD metadata fetch
CVSS Score:
Vector:
CWE: CWE-918
Affected Packages:
Package States: Red Hat Developer Hub,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-32235
Severity: moderate
Released on: 12/03/2026
Advisory:
Bugzilla: 2447075
Bugzilla Description: @backstage/plugin-auth-backend: @backstage/plugin-auth-backend: OAuth redirect URI allowlist bypass
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-601
Affected Packages:
Package States: Red Hat Developer Hub,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-3497
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447085
Bugzilla Description: openssh: OpenSSH GSSAPI: Information disclosure or denial of service due to uninitialized variables
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-32141
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447083
Bugzilla Description: flatted: flatted: Unbounded recursion DoS in parse() revive phase
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Cryostat 4,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat AMQ Broker 7,Red Hat Ansible Automation Platform 2,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Directory Server 11,Red Hat Directory Server 12,Red Hat Directory Server 13,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Single Sign-On 7,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-28356
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447059
Bugzilla Description: multipart: denial of service via maliciously crafted HTTP or multipart segment headers
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1333
Affected Packages:
Package States: Lightspeed Core,Lightspeed Core,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2025-70873
Severity: low
Released on: 12/03/2026
Advisory:
Bugzilla: 2447086
Bugzilla Description: sqlite: SQLite: Information Disclosure via Crafted ZIP File
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3909
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447195
Bugzilla Description: chromium-browser: Out of bounds write in Skia
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3910
Severity: important
Released on: 12/03/2026
Advisory:
Bugzilla: 2447199
Bugzilla Description: chromium-browser: Inappropriate implementation in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2808
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446879
Bugzilla Description: github.com/hashicorp/consul: HashiCorp Consul: Arbitrary file read via Kubernetes authentication configuration
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-59
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Multicluster Global Hub,OpenShift Serverless,OpenShift Service Mesh 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Ansible Automation Platform 2,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenStack Platform 18.0,
Full Details
CVE document


CVE-2026-31958
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446765
Bugzilla Description: tornado-python: Tornado: Denial of Service via large multipart bodies
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3950
Severity: low
Released on: 11/03/2026
Advisory:
Bugzilla: 2446751
Bugzilla Description: libheif: libheif: Denial of Service via out-of-bounds read in Track::load function
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,
Full Details
CVE document


CVE-2026-3949
Severity: low
Released on: 11/03/2026
Advisory:
Bugzilla: 2446725
Bugzilla Description: libheif: libheif: Out-of-bounds read via local argument manipulation
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-805
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-31870
Severity: important
Released on: 11/03/2026
Advisory:
Bugzilla: 2446713
Bugzilla Description: cpp-httplib: cpp-httplib: Denial of Service via malformed Content-Length header
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1287
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-30226
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446675
Bugzilla Description: devalue: Devalue: Denial of Service or type confusion via prototype pollution
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-843
Affected Packages:
Package States: Red Hat Build of Podman Desktop - Tech Preview,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-31853
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446690
Bugzilla Description: imagemagick: ImageMagick: Denial of Service via overflow in SFW decoder when processing large images on 32-bit systems
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-122
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-1471
Severity: low
Released on: 11/03/2026
Advisory:
Bugzilla: 2446566
Bugzilla Description: neo4j: Neo4j: Authentication context inheritance via excessive caching in SSO UserInfo endpoint
CVSS Score:
CVSSv3 Score: 4.2
Vector:
CWE: CWE-488
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-29777
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446584
Bugzilla Description: github.com/traefik/traefik: Traefik: Traffic redirection and hostname bypass via unsanitized input in router rules
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-31892
Severity: important
Released on: 11/03/2026
Advisory:
Bugzilla: 2446551
Bugzilla Description: github.com/argoproj/argo-workflows: Argo Workflows: Security bypass allows privilege escalation via podSpecPatch field
CVSS Score:
CVSSv3 Score: 9.9
Vector:
CWE: CWE-807
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-28229
Severity: important
Released on: 11/03/2026
Advisory:
Bugzilla: 2446549
Bugzilla Description: argo-workflows: Argo Workflows has unauthorized access to Argo Workflows Template
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-306
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-3904
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446533
Bugzilla Description: glibc: nscd client crash on x86_64 under high nscd load
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-366
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3805
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446451
Bugzilla Description: curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-3784
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446449
Bugzilla Description: curl: curl: Unauthorized access due to improper HTTP proxy connection reuse
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-305
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-3783
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446450
Bugzilla Description: curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-201
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-1965
Severity: moderate
Released on: 11/03/2026
Advisory:
Bugzilla: 2446448
Bugzilla Description: curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-303
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-3911
Severity: low
Released on: 11/03/2026
Advisory:
Bugzilla: 2446392
Bugzilla Description: org.keycloak.services.resources.admin.UserResource: Keycloak: Information disclosure of disabled user attributes via administrative endpoint
CVSS Score:
CVSSv3 Score: 2.7
Vector:
CWE: CWE-359
Affected Packages:
Package States: Red Hat Build of Keycloak,
Full Details
CVE document


CVE-2026-4111
Severity: important
Released on: 11/03/2026
Advisory: RHSA-2026:5063, RHSA-2026:5080,
Bugzilla: 2446453
Bugzilla Description: libarchive: Infinite Loop Denial of Service in RAR5 Decompression via archive_read_data() in libarchive
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-835
Affected Packages: libarchive-0:3.7.7-5.el10_1,libarchive-0:3.5.3-7.el9_7,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-31838
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446342
Bugzilla Description: istio: Istio: Authorization policy bypass via Envoy RBAC header matching with multiple header values
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-551
Affected Packages:
Package States: cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,ExternalDNS Operator,ExternalDNS Operator,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-31837
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446344
Bugzilla Description: istio: Istio: Information disclosure and authentication bypass via JWKS resolver unavailability
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1392
Affected Packages:
Package States: cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,ExternalDNS Operator,ExternalDNS Operator,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-31826
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446336
Bugzilla Description: pypdf: pypdf: Denial of Service due to excessive memory consumption via crafted PDF
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-31812
Severity: important
Released on: 10/03/2026
Advisory: RHSA-2026:5459,
Bugzilla: 2446330
Bugzilla Description: quinn-proto: quinn-proto: Denial of Service via crafted QUIC Initial packet
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-248
Affected Packages: rhtas/tuffer-rhel9:sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292,rhtas/tuftool-rhel9:sha256:cc2676a9d70599503faf8ca413e7bbc29cd523782a3d1e81bfc8f9e6323b4a28,
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Update Service,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-31808
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446309
Bugzilla Description: file-type: file-type: Denial of Service due to infinite loop in ASF file parsing
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-835
Affected Packages:
Package States: Cryostat 4,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat build of Apicurio Registry 2,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Satellite 6,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-30951
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446250
Bugzilla Description: sequelize: Sequelize: Data exfiltration via SQL injection in JSON/JSONB where clause processing
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-89
Affected Packages:
Package States: Confidential Compute Attestation,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-23868
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446207
Bugzilla Description: giflib: Giflib: Double-free vulnerability leading to memory corruption
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-28292
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446162
Bugzilla Description: simple-git: simple-git: Remote Code Execution via bypass of prior security fixes
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-76
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,
Full Details
CVE document


CVE-2026-26130
Severity: important
Released on: 10/03/2026
Advisory: RHSA-2026:4458, RHSA-2026:4453, RHSA-2026:4443, RHSA-2026:4454, RHSA-2026:4455, RHSA-2026:4445, RHSA-2026:4456, RHSA-2026:4450, RHSA-2026:4451,
Bugzilla: 2446134
Bugzilla Description: asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages: dotnet8.0-0:8.0.125-1.el10_1,dotnet8.0-0:8.0.125-1.el9_7,dotnet9.0-0:9.0.115-1.el10_1,dotnet9.0-0:9.0.115-1.el9_7,dotnet10.0-0:10.0.104-1.el10_1,dotnet9.0-0:9.0.115-1.el8_10,dotnet8.0-0:8.0.125-1.el8_10,dotnet10.0-0:10.0.104-1.el8_10,dotnet10.0-0:10.0.104-1.el9_7,
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26127
Severity: moderate
Released on: 10/03/2026
Advisory: RHSA-2026:4458, RHSA-2026:4453, RHSA-2026:4443, RHSA-2026:4445, RHSA-2026:4456, RHSA-2026:4450,
Bugzilla: 2446098
Bugzilla Description: .net: .NET: Denial of Service via out-of-bounds read
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-125
Affected Packages: dotnet9.0-0:9.0.115-1.el10_1,dotnet9.0-0:9.0.115-1.el9_7,dotnet10.0-0:10.0.104-1.el10_1,dotnet9.0-0:9.0.115-1.el8_10,dotnet10.0-0:10.0.104-1.el8_10,dotnet10.0-0:10.0.104-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26131
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446069
Bugzilla Description: dotnet: .NET: Privilege escalation via incorrect default permissions
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-276
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-30942
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446087
Bugzilla Description: flare: Flare: Information disclosure via authenticated path traversal
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-22
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2742
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446005
Bugzilla Description: com.vaadin/flow-server: Vaadin flow-server: Authentication bypass due to inconsistent path matching allows unauthorized session creation.
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-551
Affected Packages:
Package States: Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-2741
Severity: low
Released on: 10/03/2026
Advisory:
Bugzilla: 2446008
Bugzilla Description: Vaadin-Flow: Vaadin: Arbitrary file write via path traversal during Node.js download
CVSS Score:
CVSSv3 Score: 2.6
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-23907
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2445994
Bugzilla Description: org.apache.pdfbox:pdfbox-examples: Apache PDFBox Example: Path Traversal via specially crafted filenames allows arbitrary file write
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat AMQ Broker 7,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-23239
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446109
Bugzilla Description: kernel: Kernel: Race condition in espintcp can lead to denial of service
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-366
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23240
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446139
Bugzilla Description: kernel: Linux kernel: Denial of service due to a race condition in the TLS subsystem
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-366
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3918
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446844
Bugzilla Description: chromium-browser: Use after free in WebMCP
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3921
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446845
Bugzilla Description: chromium-browser: Use after free in TextEncoding
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3913
Severity: critical
Released on: 10/03/2026
Advisory:
Bugzilla: 2446846
Bugzilla Description: chromium-browser: Heap buffer overflow in WebML
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3923
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446847
Bugzilla Description: chromium-browser: Use after free in WebMIDI
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3914
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446848
Bugzilla Description: chromium-browser: Integer overflow in WebML
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3938
Severity: low
Released on: 10/03/2026
Advisory:
Bugzilla: 2446849
Bugzilla Description: chromium-browser: Insufficient policy enforcement in Clipboard
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3934
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446850
Bugzilla Description: chromium-browser: Insufficient policy enforcement in ChromeDriver
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3942
Severity: low
Released on: 10/03/2026
Advisory:
Bugzilla: 2446852
Bugzilla Description: chromium-browser: Incorrect security UI in PictureInPicture
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3919
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446853
Bugzilla Description: chromium-browser: Use after free in Extensions
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3916
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446854
Bugzilla Description: chromium-browser: Out of bounds read in Web Speech
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3915
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446856
Bugzilla Description: chromium-browser: Heap buffer overflow in WebML
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3927
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446857
Bugzilla Description: chromium-browser: Incorrect security UI in PictureInPicture
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3926
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446859
Bugzilla Description: chromium-browser: Out of bounds read in V8
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3940
Severity: low
Released on: 10/03/2026
Advisory:
Bugzilla: 2446860
Bugzilla Description: chromium-browser: Insufficient policy enforcement in DevTools
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3917
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446861
Bugzilla Description: chromium-browser: Use after free in Agents
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3941
Severity: low
Released on: 10/03/2026
Advisory:
Bugzilla: 2446863
Bugzilla Description: chromium-browser: Insufficient policy enforcement in DevTools
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3920
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446864
Bugzilla Description: chromium-browser: Out of bounds memory access in WebML
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3928
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446865
Bugzilla Description: chromium-browser: Insufficient policy enforcement in Extensions
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3922
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446866
Bugzilla Description: chromium-browser: Use after free in MediaStream
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3931
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446868
Bugzilla Description: chromium-browser: Heap buffer overflow in Skia
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3929
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446870
Bugzilla Description: chromium-browser: Side-channel information leakage in ResourceTiming
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3924
Severity: important
Released on: 10/03/2026
Advisory:
Bugzilla: 2446871
Bugzilla Description: chromium-browser: Use after free in WindowDialog
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3935
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2446872
Bugzilla Description: chromium-browser: Incorrect security UI in WebAppInstalls
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3939
Severity: low
Released on: 10/03/2026
Advisory:
Bugzilla: 2446873
Bugzilla Description: chromium-browser: Insufficient policy enforcement in PDF
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3930
Severity: moderate
Released on: 10/03/2026
Advisory:
Bugzilla: 2447256
Bugzilla Description: chromium-browser: Unsafe navigation in Navigation
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-30937
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445882
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via integer overflow in XWD encoder
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-30936
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445880
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via crafted image processing
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-30935
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445899
Bugzilla Description: ImageMagick: heap-based buffer over-read in BilateralBlurImage
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-30931
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445900
Bugzilla Description: ImageMagick: ImageMagick: Heap-based buffer overflow leading to out-of-bounds write
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-30929
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445896
Bugzilla Description: ImageMagick: stack-based buffer overflow in MagnifyImage
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-121
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-30883
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445878
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service due to heap overflow when processing large image profiles
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28693
Severity: important
Released on: 09/03/2026
Advisory:
Bugzilla: 2445888
Bugzilla Description: ImageMagick: ImageMagick: Out-of-bounds read or write due to integer overflow in DIB coder
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28692
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445890
Bugzilla Description: ImageMagick: ImageMagick: Information disclosure and denial of service via heap over-read in MAT decoder
CVSS Score:
CVSSv3 Score: 4.8
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28691
Severity: important
Released on: 09/03/2026
Advisory:
Bugzilla: 2445902
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via uninitialized pointer dereference in JBIG decoder
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28690
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445887
Bugzilla Description: ImageMagick: stack-based buffer overflow in MNG encoder
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-121
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28689
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445891
Bugzilla Description: ImageMagick: ImageMagick: Information disclosure and unauthorized modification via symlink TOCTOU vulnerability
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28688
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445877
Bugzilla Description: ImageMagick: use-after-free in the MSL encoder
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28687
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445897
Bugzilla Description: ImageMagick: ImageMagick: Heap use-after-free vulnerability allows denial of service via crafted MSL file
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28686
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445889
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via heap-buffer-overflow in PCL encode
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28494
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445901
Bugzilla Description: ImageMagick: ImageMagick: Arbitrary code execution or denial of service via maliciously crafted kernel strings
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-28493
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445883
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service and information disclosure via integer overflow in SIXEL decoder
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-31802
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445881
Bugzilla Description: tar: tar: File overwrite via drive-relative symlink traversal
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-22
Affected Packages:
Package States: Cryostat 4,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Network Observability Operator,Network Observability Operator,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat AMQ Broker 7,Red Hat build of Apache Camel - HawtIO 4,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Single Sign-On 7,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-25960
Severity: important
Released on: 09/03/2026
Advisory:
Bugzilla: 2445892
Bugzilla Description: vLLM: vLLM: Server-Side Request Forgery bypass via inconsistent URL parsing
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-474
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-0846
Severity: important
Released on: 09/03/2026
Advisory:
Bugzilla: 2445826
Bugzilla Description: nltk: NLTK: Arbitrary file read via improper path validation in `filestring()` function
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Lightspeed Core,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-3836
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445770
Bugzilla Description: dnf5: dnf5: Denial of Service via path traversal in D-Bus locale configuration
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-22
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-69647
Severity: low
Released on: 09/03/2026
Advisory:
Bugzilla: 2445773
Bugzilla Description: binutils: infinite loop in readelf via crafted binary with malformed DWARF loclists data
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-69648
Severity: low
Released on: 09/03/2026
Advisory:
Bugzilla: 2445774
Bugzilla Description: binutils: infinite loop in readelf via crafted binary with malformed DWARF .debug_rnglists data
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2024-14027
Severity: low
Released on: 09/03/2026
Advisory:
Bugzilla: 2445789
Bugzilla Description: kernel: xattr: switch to CLASS(fd)
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-70034
Severity: moderate
Released on: 09/03/2026
Advisory:
Bugzilla: 2445801
Bugzilla Description: ssh2: ssh2: Denial of Service due to inefficient regular expression complexity
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1333
Affected Packages:
Package States: Red Hat Build of Podman Desktop - Tech Preview,Red Hat Build of Podman Desktop - Tech Preview,Red Hat Developer Hub,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Self-service automation portal 2,
Full Details
CVE document


CVE-2026-3731
Severity: moderate
Released on: 08/03/2026
Advisory:
Bugzilla: 2445579
Bugzilla Description: libssh: libssh: Denial of Service via out-of-bounds read in SFTP extension name handler
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3713
Severity: moderate
Released on: 08/03/2026
Advisory:
Bugzilla: 2445566
Bugzilla Description: libpng: libpng: Heap-based buffer overflow in pnm2png allows information disclosure and denial of service
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 1.8,Red Hat build of OpenJDK 21,Red Hat build of OpenJDK 25,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-29076
Severity: moderate
Released on: 07/03/2026
Advisory:
Bugzilla: 2445491
Bugzilla Description: cpp-httplib: cpp-httplib: Denial of Service via crafted HTTP POST request
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-1333
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-29786
Severity: important
Released on: 07/03/2026
Advisory:
Bugzilla: 2445476
Bugzilla Description: node-tar: hardlink path traversal via drive-relative linkpath
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-22
Affected Packages:
Package States: Cryostat 4,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Network Observability Operator,Network Observability Operator,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat AMQ Broker 7,Red Hat build of Apache Camel - HawtIO 4,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Single Sign-On 7,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-29186
Severity: important
Released on: 07/03/2026
Advisory:
Bugzilla: 2445480
Bugzilla Description: backstage/plugin-techdocs-node: TechDocs Mkdocs configuration key enables arbitrary code execution
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-791
Affected Packages:
Package States: Red Hat Developer Hub,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-29184
Severity: low
Released on: 07/03/2026
Advisory:
Bugzilla: 2445468
Bugzilla Description: @backstage/plugin-scaffolder-backend: Backstage Scaffolder Backend: Information disclosure via malicious template bypassing log redaction
CVSS Score:
CVSSv3 Score: 2.0
Vector:
CWE: CWE-117
Affected Packages:
Package States: Red Hat Developer Hub,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-29185
Severity: low
Released on: 07/03/2026
Advisory:
Bugzilla: 2445484
Bugzilla Description: @backstage/integration: Backstage SCM Integration: Unauthorized access to SCM APIs via path traversal
CVSS Score:
CVSSv3 Score: 2.7
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Developer Hub,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-24308
Severity: moderate
Released on: 07/03/2026
Advisory:
Bugzilla: 2445451
Bugzilla Description: Apache ZooKeeper: Apache ZooKeeper: Information disclosure via improper handling of configuration values
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-117
Affected Packages:
Package States: Red Hat AMQ Broker 7,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Offline Knowledge Portal,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-24281
Severity: moderate
Released on: 07/03/2026
Advisory:
Bugzilla: 2445449
Bugzilla Description: Apache ZooKeeper: Apache ZooKeeper: Impersonation of servers or clients via reverse DNS spoofing
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-295
Affected Packages:
Package States: Red Hat AMQ Broker 7,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Offline Knowledge Portal,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-30827
Severity: moderate
Released on: 07/03/2026
Advisory:
Bugzilla: 2445429
Bugzilla Description: express-rate-limit: express-rate-limit: Denial of Service for IPv4 clients due to incorrect IPv6 subnet masking
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1389
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Developer Hub,Red Hat OpenShift Dev Spaces,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-27139
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445335
Bugzilla Description: os: FileInfo can escape from a Root in golang os module
CVSS Score:
CVSSv3 Score: 2.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: OpenShift Service Mesh 2,OpenShift Service Mesh 3,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Hardened Images,Red Hat Hardened Images,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Virtualization 4,
Full Details
CVE document


CVE-2026-27138
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445344
Bugzilla Description: crypto/x509: Panic in name constraint checking for malformed certificates in crypto/x509
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-295
Affected Packages:
Package States: OpenShift Service Mesh 2,OpenShift Service Mesh 3,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Hardened Images,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Virtualization 4,
Full Details
CVE document


CVE-2026-27142
Severity: moderate
Released on: 06/03/2026
Advisory: RHSA-2026:5192,
Bugzilla: 2445351
Bugzilla Description: html/template: URLs in meta content attribute actions are not escaped in html/template
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-79
Affected Packages: golang1-25-main-1.25.8-1.1.hum1,
Package States: OpenShift Service Mesh 2,OpenShift Service Mesh 3,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Hardened Images,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Virtualization 4,
Full Details
CVE document


CVE-2026-25679
Severity: important
Released on: 06/03/2026
Advisory: RHSA-2026:5549, RHSA-2026:5110,
Bugzilla: 2445356
Bugzilla Description: net/url: Incorrect parsing of IPv6 host literals in net/url
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1286
Affected Packages: openshift-builds/openshift-builds-waiters-rhel9:sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30,multicluster-globalhub/multicluster-globalhub-agent-rhel9:sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1,
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,cert-manager Operator for Red Hat OpenShift,Compliance Operator,Confidential Compute Attestation,Confidential Compute Attestation,Cryostat 4,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,ExternalDNS Operator,ExternalDNS Operator,External Secrets Operator for Red Hat OpenShift,Fence Agents Remediation Operator,File Integrity Operator,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Migration Toolkit for Applications 8,Migration Toolkit for Containers,mirror registry for Red Hat OpenShift,mirror registry for Red Hat OpenShift 2,Multicluster Engine for Kubernetes,Network Observability Operator,Node HealthCheck Operator,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat AMQ Clients,Red Hat AMQ Clients,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Hardened Images,Red Hat Hardened Images,Red Hat Lightspeed for Runtimes Operator,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Service Interconnect 1,Red Hat Service Interconnect 1,Red Hat Service Interconnect 2,Red Hat Service Interconnect 2,Red Hat Service Interconnect 2,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Security Profiles Operator,Service Telemetry Framework 1.5,streams for Apache Kafka 3,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2026-27137
Severity: important
Released on: 06/03/2026
Advisory: RHSA-2026:5549, RHSA-2026:5110,
Bugzilla: 2445345
Bugzilla Description: crypto/x509: Incorrect enforcement of email constraints in crypto/x509
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-295
Affected Packages: openshift-builds/openshift-builds-waiters-rhel9:sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30,multicluster-globalhub/multicluster-globalhub-agent-rhel9:sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1,
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,cert-manager Operator for Red Hat OpenShift,Compliance Operator,Confidential Compute Attestation,Confidential Compute Attestation,Cryostat 4,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,ExternalDNS Operator,ExternalDNS Operator,External Secrets Operator for Red Hat OpenShift,Fence Agents Remediation Operator,File Integrity Operator,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Migration Toolkit for Applications 8,Migration Toolkit for Containers,mirror registry for Red Hat OpenShift,mirror registry for Red Hat OpenShift 2,Multicluster Engine for Kubernetes,Network Observability Operator,Node HealthCheck Operator,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Hardened Images,Red Hat Lightspeed for Runtimes Operator,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Service Interconnect 1,Red Hat Service Interconnect 2,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Security Profiles Operator,Service Telemetry Framework 1.5,streams for Apache Kafka 3,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2026-30231
Severity: moderate
Released on: 06/03/2026
Advisory:
Bugzilla: 2445348
Bugzilla Description: flare: Flare: Information disclosure via inconsistent access checks for private files
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-639
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-30230
Severity: moderate
Released on: 06/03/2026
Advisory:
Bugzilla: 2445349
Bugzilla Description: flare: Flare: Unauthorized information disclosure due to improper access control in the thumbnail endpoint.
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-306
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3419
Severity: moderate
Released on: 06/03/2026
Advisory:
Bugzilla: 2445295
Bugzilla Description: fastify: Fastify: Bypass of Content-Type validation via malformed Content-Type headers
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-625
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-29091
Severity: important
Released on: 06/03/2026
Advisory:
Bugzilla: 2445262
Bugzilla Description: locutus: Locutus: Remote Code Execution via insecure callback function implementation
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-94
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document


CVE-2026-29089
Severity: important
Released on: 06/03/2026
Advisory:
Bugzilla: 2445265
Bugzilla Description: timescaledb: TimescaleDB: Arbitrary code execution via malicious functions in user-writable schemas during extension upgrade
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-427
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-26017
Severity: important
Released on: 06/03/2026
Advisory:
Bugzilla: 2445244
Bugzilla Description: github.com/coredns/coredns: CoreDNS: DNS access control bypass due to plugin execution order flaw
CVSS Score:
CVSSv3 Score: 7.7
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Connectivity Link 1,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-26018
Severity: important
Released on: 06/03/2026
Advisory:
Bugzilla: 2445242
Bugzilla Description: github.com/coredns/coredns: CoreDNS: Denial of Service vulnerability due to predictable pseudo-random number generation
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1241
Affected Packages:
Package States: Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Connectivity Link 1,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-23925
Severity: moderate
Released on: 06/03/2026
Advisory:
Bugzilla: 2445155
Bugzilla Description: zabbix: Zabbix: Confidentiality loss via improper access control in configuration.import API
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-266
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-29074
Severity: important
Released on: 06/03/2026
Advisory:
Bugzilla: 2445132
Bugzilla Description: svgo: SVGO: Denial of Service via XML entity expansion
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-776
Affected Packages:
Package States: Cryostat 4,Gatekeeper 3,Multicluster Engine for Kubernetes,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift distributed tracing 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Single Sign-On 7,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-29062
Severity: important
Released on: 06/03/2026
Advisory:
Bugzilla: 2445135
Bugzilla Description: jackson-core: jackson-core: Denial of Service via excessive JSON nesting
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1284
Affected Packages:
Package States: Red Hat Certificate System 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-28804
Severity: moderate
Released on: 06/03/2026
Advisory:
Bugzilla: 2445118
Bugzilla Description: pypdf: pypdf: Denial of Service via crafted PDF with ASCIIHexDecode filter
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-28802
Severity: important
Released on: 06/03/2026
Advisory: RHSA-2026:4942, RHSA-2026:5168, RHSA-2026:5665,
Bugzilla: 2445120
Bugzilla Description: authlib: Authlib: Signature verification bypass via malicious JWT allows unauthorized access
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-347
Affected Packages: quay/quay-rhel8:sha256:56bcc55b01c76a1eb7ad8b265cf9dfdd488fc62bc353e3822864a0f6c4f98ffb,quay/quay-rhel8:sha256:c0d00643c4ac6f84e5327192a29c6353b5dcac34d483d0a3e5f39d366127fcc2,quay/quay-rhel8:sha256:3e5ce0a56241c9804249dfb302cde02d2ffe30ba8fcd8aef8f1bce916d2324ad,
Package States: Red Hat Ansible Automation Platform 2,Red Hat Quay 3,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-28799
Severity: important
Released on: 06/03/2026
Advisory:
Bugzilla: 2445116
Bugzilla Description: PJSIP: PJSIP: Denial of Service via heap use-after-free in event subscription
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-29068
Severity: important
Released on: 06/03/2026
Advisory:
Bugzilla: 2445115
Bugzilla Description: PJSIP: PJSIP: Denial of Service via malformed RTP payload processing
CVSS Score:
CVSSv3 Score: 9.8
Vector:
CWE: CWE-120
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3632
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445127
Bugzilla Description: libsoup: libsoup: HTTP Smuggling and Server-Side Request Forgery via Malformed Hostnames
CVSS Score:
CVSSv3 Score: 3.9
Vector:
CWE: CWE-1286
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3633
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445128
Bugzilla Description: libsoup: libsoup: Header and HTTP request injection via CRLF injection
CVSS Score:
CVSSv3 Score: 3.9
Vector:
CWE: CWE-93
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3634
Severity: moderate
Released on: 06/03/2026
Advisory:
Bugzilla: 2445129
Bugzilla Description: libsoup: libsoup: HTTP header injection and response splitting via CRLF injection in Content-Type header
CVSS Score:
CVSSv3 Score: 3.9
Vector:
CWE: CWE-93
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-69645
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445261
Bugzilla Description: binutils: Binutils objdump: Denial of Service via crafted DWARF debug information
CVSS Score:
CVSSv3 Score: 2.8
Vector:
CWE: CWE-1285
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-69644
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445263
Bugzilla Description: binutils: Binutils: Denial of Service via crafted binary with malformed DWARF debug information
CVSS Score:
CVSSv3 Score: 2.8
Vector:
CWE: CWE-606
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-69646
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445264
Bugzilla Description: binutils: Binutils: Denial of Service via malformed DWARF debug_rnglists data
CVSS Score:
CVSSv3 Score: 2.8
Vector:
CWE: CWE-606
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-69650
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445293
Bugzilla Description: binutils: double free in readelf via crafted ELF binary with malformed relocation data
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-415
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-69652
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445296
Bugzilla Description: binutils: abort in readelf via crafted ELF binary with malformed DWARF abbrev or debug information
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-617
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-69649
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445298
Bugzilla Description: binutils: NULL pointer dereference in readelf via crafted ELF binary with malformed header fields
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-69651
Severity: low
Released on: 06/03/2026
Advisory:
Bugzilla: 2445299
Bugzilla Description: binutils: Binutils: Denial of Service via crafted ELF binary processing
CVSS Score:
CVSSv3 Score: 2.8
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3606
Severity: moderate
Released on: 05/03/2026
Advisory:
Bugzilla: 2445008
Bugzilla Description: Ettercap: Ettercap: Denial of Service via out-of-bounds read in etterfilter
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-0848
Severity:
Released on: 05/03/2026
Advisory:
Bugzilla: 2444957
Bugzilla Description: nltk: NLTK: Arbitrary code execution via unvalidated Java Archive (JAR) file loading
CVSS Score:
CVSSv3 Score: 10.0
Vector:
CWE: CWE-829
Affected Packages:
Package States: Lightspeed Core,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-29054
Severity: important
Released on: 05/03/2026
Advisory:
Bugzilla: 2444872
Bugzilla Description: github.com/traefik/traefik: Traefik: Information disclosure due to case-insensitive Connection header processing
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-178
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-26999
Severity: important
Released on: 05/03/2026
Advisory:
Bugzilla: 2444874
Bugzilla Description: github.com/traefik/traefik: Traefik: Denial of Service due to incomplete TLS handshake
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-26998
Severity: moderate
Released on: 05/03/2026
Advisory:
Bugzilla: 2444876
Bugzilla Description: github.com/traefik/traefik: Traefik: Denial of Service due to unbounded ForwardAuth middleware response processing
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-25048
Severity: important
Released on: 05/03/2026
Advisory:
Bugzilla: 2444840
Bugzilla Description: xgrammar: xgrammar: Denial of Service via multi-level nested syntax
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-674
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-2092
Severity: important
Released on: 05/03/2026
Advisory: RHSA-2026:3925, RHSA-2026:3947, RHSA-2026:3926, RHSA-2026:3948,
Bugzilla: 2437296
Bugzilla Description: keycloak-services: Keycloak: Unauthorized access via improper validation of encrypted SAML assertions
CVSS Score:
CVSSv3 Score: 7.7
Vector:
CWE: CWE-1287
Affected Packages: rhbk/keycloak-rhel9-operator:26.2-16,rhbk/keycloak-rhel9,rhbk/keycloak-operator-bundle:26.2.14-1,rhbk/keycloak-operator-bundle:26.4.10-1,rhbk/keycloak-rhel9:26.2-16,rhbk/keycloak-rhel9-operator:26.4-12,rhbk/keycloak-rhel9:26.4-12,
Package States:
Full Details
CVE document


CVE-2026-3047
Severity: important
Released on: 05/03/2026
Advisory: RHSA-2026:3925, RHSA-2026:3947, RHSA-2026:3926, RHSA-2026:3948,
Bugzilla: 2441966
Bugzilla Description: org.keycloak.broker.saml: Keycloak SAML broker: Authentication bypass due to disabled SAML client completing IdP-initiated login
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-305
Affected Packages: rhbk/keycloak-rhel9-operator:26.2-16,rhbk/keycloak-rhel9,rhbk/keycloak-operator-bundle:26.2.14-1,rhbk/keycloak-operator-bundle:26.4.10-1,rhbk/keycloak-rhel9:26.2-16,rhbk/keycloak-rhel9-operator:26.4-12,rhbk/keycloak-rhel9:26.4-12,
Package States:
Full Details
CVE document


CVE-2026-2603
Severity: important
Released on: 05/03/2026
Advisory: RHSA-2026:3925, RHSA-2026:3947, RHSA-2026:3926, RHSA-2026:3948,
Bugzilla: 2440300
Bugzilla Description: keycloak: Keycloak: Unauthorized authentication via disabled SAML Identity Provider
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-306
Affected Packages: rhbk/keycloak-rhel9-operator:26.2-16,rhbk/keycloak-rhel9,rhbk/keycloak-operator-bundle:26.2.14-1,rhbk/keycloak-operator-bundle:26.4.10-1,rhbk/keycloak-rhel9:26.2-16,rhbk/keycloak-rhel9-operator:26.4-12,rhbk/keycloak-rhel9:26.4-12,
Package States:
Full Details
CVE document


CVE-2026-3009
Severity: important
Released on: 05/03/2026
Advisory: RHSA-2026:3947, RHSA-2026:3948,
Bugzilla: 2441867
Bugzilla Description: org.keycloak/keycloak-services: Improper Enforcement of Disabled Identity Provider in IdentityBrokerService (Authentication Bypass)
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-863
Affected Packages: rhbk/keycloak-rhel9,rhbk/keycloak-operator-bundle:26.4.10-1,rhbk/keycloak-rhel9-operator:26.4-12,rhbk/keycloak-rhel9:26.4-12,
Package States: Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-1605
Severity: important
Released on: 05/03/2026
Advisory:
Bugzilla: 2444815
Bugzilla Description: org.eclipse.jetty/jetty-server: Eclipse Jetty: Denial of Service due to unreleased JDK Inflater from compressed HTTP requests
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,Red Hat AMQ Broker 7,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of Apicurio Registry 3,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat Data Grid 8,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Web Server 6,Red Hat Offline Knowledge Portal,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2025-11143
Severity: low
Released on: 05/03/2026
Advisory:
Bugzilla: 2444808
Bugzilla Description: org.eclipse.jetty/jetty-http: org.eclipse.jetty: Security bypass due to differential URI parsing
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-444
Affected Packages:
Package States: OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,Red Hat AMQ Broker 7,Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of Apicurio Registry 3,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat Data Grid 8,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Web Server 6,Red Hat Offline Knowledge Portal,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27982
Severity: moderate
Released on: 05/03/2026
Advisory:
Bugzilla: 2444764
Bugzilla Description: django-allauth: django-allauth: Open redirect via crafted URL in SAML IdP initiated SSO
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-601
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3381
Severity: moderate
Released on: 05/03/2026
Advisory:
Bugzilla: 2444733
Bugzilla Description: compress-raw-zlib: Compress::Raw::Zlib: Vulnerabilities due to outdated zlib library
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-1104
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-69534
Severity: important
Released on: 05/03/2026
Advisory:
Bugzilla: 2444839
Bugzilla Description: python-markdown: denial of service via malformed HTML-like sequences
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-617
Affected Packages:
Package States: External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2025-45691
Severity: important
Released on: 05/03/2026
Advisory:
Bugzilla: 2444875
Bugzilla Description: ragas: arbitrary file read via improper URL validation in multimodal inputs
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-918
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-2297
Severity: low
Released on: 04/03/2026
Advisory:
Bugzilla: 2444691
Bugzilla Description: cpython: CPython: Logging Bypass in Legacy .pyc File Handling
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-778
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Hardened Images,Red Hat Hardened Images,Red Hat Hardened Images,Red Hat Hardened Images,Red Hat Hardened Images,
Full Details
CVE document


CVE-2026-27898
Severity: moderate
Released on: 04/03/2026
Advisory:
Bugzilla: 2444681
Bugzilla Description: vaultwarden: Vaultwarden: Information disclosure via API partial update
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-639
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-27803
Severity: important
Released on: 04/03/2026
Advisory:
Bugzilla: 2444678
Bugzilla Description: vaultwarden: Vaultwarden: Unauthorized collection management operations due to improper access control
CVSS Score:
CVSSv3 Score: 8.3
Vector:
CWE: CWE-266
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-27802
Severity: important
Released on: 04/03/2026
Advisory:
Bugzilla: 2444676
Bugzilla Description: vaultwarden: Vaultwarden: Privilege Escalation via Unauthorized Bulk Permission Update
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-266
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-27801
Severity: moderate
Released on: 04/03/2026
Advisory:
Bugzilla: 2444677
Bugzilla Description: vaultwarden: Vaultwarden: Two-factor authentication bypass allows unauthorized access and data deletion.
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-307
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-0847
Severity: important
Released on: 04/03/2026
Advisory:
Bugzilla: 2444608
Bugzilla Description: nltk: NLTK: Arbitrary file read via path traversal vulnerability
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Lightspeed Core,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-3520
Severity: important
Released on: 04/03/2026
Advisory:
Bugzilla: 2444584
Bugzilla Description: multer: Multer: Denial of Service via malformed requests
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Developer Hub,Self-service automation portal 2,
Full Details
CVE document


CVE-2025-15558
Severity: important
Released on: 04/03/2026
Advisory:
Bugzilla: 2444574
Bugzilla Description: docker/cli: Docker CLI for Windows: Privilege escalation via malicious plugin binaries
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-427
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Gatekeeper 3,Kernel Module Management Operator for Red Hat Openshift,Kernel Module Management Operator for Red Hat Openshift,Kernel Module Management Operator for Red Hat Openshift,Kernel Module Management Operator for Red Hat Openshift,Kernel Module Management Operator for Red Hat Openshift,Kernel Module Management Operator for Red Hat Openshift,Kernel Module Management Operator for Red Hat Openshift,Kernel Module Management Operator for Red Hat Openshift,Machine Deletion Remediation Operator,Machine Deletion Remediation Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Security Profiles Operator,Security Profiles Operator,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2025-12801
Severity: moderate
Released on: 04/03/2026
Advisory: RHSA-2026:5606, RHSA-2026:3940, RHSA-2026:3941, RHSA-2026:3942, RHSA-2026:5127, RHSA-2026:3938, RHSA-2026:3939,
Bugzilla: 2413081
Bugzilla Description: nfs-utils: rpc.mountd in the nfs-utils privilege escalation
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-279
Affected Packages: nfs-utils-1:2.3.3-68.el8_10,nfs-utils-1:2.5.4-26.el9_4.3,nfs-utils-1:2.5.4-34.el9_6.3,rhceph/rhceph-8-rhel9:sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1,rhcos-418.94.202603181125-0,nfs-utils-1:2.8.3-0.el10_1.3,nfs-utils-1:2.5.4-38.el9_7.3,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2025-66168
Severity: moderate
Released on: 04/03/2026
Advisory:
Bugzilla: 2444356
Bugzilla Description: org.apache.activemq/apache-activemq: org.apache.activemq/activemq-all: org.apache.activemq/activemq-mqtt: Apache ActiveMQ: Unexpected behavior due to integer overflow in MQTT packet decoding
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-130
Affected Packages:
Package States: Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-27446
Severity: important
Released on: 04/03/2026
Advisory: RHSA-2026:3955, RHSA-2026:3957,
Bugzilla: 2444320
Bugzilla Description: org.apache.artemis:artemis-server: org.apache.activemq:artemis-server: Apache Artemis, Apache ActiveMQ Artemis: Message injection and exfiltration due to missing authentication
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-306
Affected Packages: artemis-server,
Package States: Red Hat AMQ Clients,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of OptaPlanner 8,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-23231
Severity: moderate
Released on: 04/03/2026
Advisory:
Bugzilla: 2444376
Bugzilla Description: kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23236
Severity:
Released on: 04/03/2026
Advisory:
Bugzilla: 2444387
Bugzilla Description: kernel: fbdev: smscufx: properly copy ioctl memory to kernelspace
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23232
Severity:
Released on: 04/03/2026
Advisory:
Bugzilla: 2444388
Bugzilla Description: kernel: Revert "f2fs: block cache/dio write during f2fs_enable_checkpoint()"
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23238
Severity: moderate
Released on: 04/03/2026
Advisory:
Bugzilla: 2444389
Bugzilla Description: kernel: romfs: check sb_set_blocksize() return value
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-252
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23234
Severity:
Released on: 04/03/2026
Advisory:
Bugzilla: 2444390
Bugzilla Description: kernel: f2fs: fix to avoid UAF in f2fs_write_end_io()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23235
Severity:
Released on: 04/03/2026
Advisory:
Bugzilla: 2444392
Bugzilla Description: kernel: f2fs: fix out-of-bounds access in sysfs attribute read/write
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23237
Severity: low
Released on: 04/03/2026
Advisory:
Bugzilla: 2444395
Bugzilla Description: kernel: platform/x86: classmate-laptop: Add missing NULL pointer checks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23233
Severity:
Released on: 04/03/2026
Advisory:
Bugzilla: 2444397
Bugzilla Description: kernel: f2fs: fix to avoid mapping wrong physical block for swapfile
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71238
Severity: moderate
Released on: 04/03/2026
Advisory:
Bugzilla: 2444398
Bugzilla Description: kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation.
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-672
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27622
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444251
Bugzilla Description: openexr: OpenEXR: Arbitrary code execution via integer overflow in EXR file processing
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27601
Severity: moderate
Released on: 03/03/2026
Advisory:
Bugzilla: 2444247
Bugzilla Description: Underscore.js: Underscore.js: Denial of Service via recursive data structures in flatten and isEqual functions
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-606
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-2376
Severity: moderate
Released on: 03/03/2026
Advisory:
Bugzilla: 2439117
Bugzilla Description: mirror-registry: quay: quay: Server-side Request Forgery via open redirect vulnerability in web interface
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-601
Affected Packages:
Package States: mirror registry for Red Hat OpenShift,mirror registry for Red Hat OpenShift 2,Red Hat Quay 3,Red Hat Quay 3,
Full Details
CVE document


CVE-2026-3494
Severity: moderate
Released on: 03/03/2026
Advisory:
Bugzilla: 2444155
Bugzilla Description: MariaDB: MariaDB: Information disclosure due to unlogged SQL statements with comments
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-1286
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-0540
Severity: moderate
Released on: 03/03/2026
Advisory:
Bugzilla: 2444135
Bugzilla Description: DOMPurify: DOMPurify: Cross-site scripting vulnerability
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-79
Affected Packages:
Package States: Cryostat 4,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Multicluster Engine for Kubernetes,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Process Automation 7,Self-service automation portal 2,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2025-15599
Severity: moderate
Released on: 03/03/2026
Advisory:
Bugzilla: 2444138
Bugzilla Description: DOMPurify: DOMPurify: Cross-site scripting
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-79
Affected Packages:
Package States: Cryostat 4,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Multicluster Engine for Kubernetes,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Process Automation 7,Self-service automation portal 2,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-25674
Severity: low
Released on: 03/03/2026
Advisory:
Bugzilla: 2444111
Bugzilla Description: django: Django: Incorrect file permissions due to race condition
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Discovery 2,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-25673
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444115
Bugzilla Description: django: Django: Denial of Service via slow URL normalization on Windows
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Discovery 2,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-3449
Severity: moderate
Released on: 03/03/2026
Advisory:
Bugzilla: 2444057
Bugzilla Description: @tootallnate/once: @tootallnate/once: Denial of Service due to incorrect control flow scoping with AbortSignal
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-1322
Affected Packages:
Package States: Confidential Compute Attestation,Cryostat 4,Migration Toolkit for Containers,Network Observability Operator,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat AMQ Broker 7,Red Hat Ansible Automation Platform 2,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat OpenShift AI (RHOAI),Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat Quay 3,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-3540
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444612
Bugzilla Description: chromium-browser: Inappropriate implementation in WebAudio
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3536
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444613
Bugzilla Description: chromium-browser: Integer overflow in ANGLE
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3545
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444615
Bugzilla Description: chromium-browser: Insufficient data validation in Navigation
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3542
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444616
Bugzilla Description: chromium-browser: Inappropriate implementation in WebAssembly
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3538
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444617
Bugzilla Description: chromium-browser: Integer overflow in Skia
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3541
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444619
Bugzilla Description: chromium-browser: Inappropriate implementation in CSS
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3539
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444620
Bugzilla Description: chromium-browser: Object lifecycle issue in DevTools
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3543
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444622
Bugzilla Description: chromium-browser: Inappropriate implementation in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3544
Severity: important
Released on: 03/03/2026
Advisory:
Bugzilla: 2444623
Bugzilla Description: chromium-browser: Heap buffer overflow in WebCodecs
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3338
Severity: important
Released on: 02/03/2026
Advisory: RHSA-2026:5459,
Bugzilla: 2444025
Bugzilla Description: aws-lc: AWS-LC: Signature bypass due to improper validation in PKCS7_verify()
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-347
Affected Packages: rhtas/tuffer-rhel9:sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292,rhtas/tuftool-rhel9:sha256:cc2676a9d70599503faf8ca413e7bbc29cd523782a3d1e81bfc8f9e6323b4a28,
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Update Service,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-3337
Severity: moderate
Released on: 02/03/2026
Advisory:
Bugzilla: 2444024
Bugzilla Description: aws-lc: AWS-LC: Information disclosure via timing discrepancy in AES-CCM decryption
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-208
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Update Service,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-3336
Severity: important
Released on: 02/03/2026
Advisory: RHSA-2026:5459,
Bugzilla: 2444026
Bugzilla Description: aws-lc: aws-lc: Certificate validation bypass via improper handling of PKCS7 objects
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-295
Affected Packages: rhtas/tuffer-rhel9:sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292,rhtas/tuftool-rhel9:sha256:cc2676a9d70599503faf8ca413e7bbc29cd523782a3d1e81bfc8f9e6323b4a28,
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Update Service,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-2256
Severity: moderate
Released on: 02/03/2026
Advisory:
Bugzilla: 2444016
Bugzilla Description: ModelScope: ModelScope, Red Hat AI Inference Server, Red Hat OpenShift AI: Arbitrary code execution via crafted prompt input
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-25884
Severity: low
Released on: 02/03/2026
Advisory:
Bugzilla: 2443992
Bugzilla Description: Exiv2: Exiv2: Denial of service via out-of-bounds read in CRW image parser
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27596
Severity: low
Released on: 02/03/2026
Advisory:
Bugzilla: 2443991
Bugzilla Description: exiv2: Exiv2: Denial of Service via out-of-bounds read in preview component
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27631
Severity: low
Released on: 02/03/2026
Advisory:
Bugzilla: 2443986
Bugzilla Description: Exiv2: Exiv2: Denial of Service via integer overflow in preview component
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23865
Severity: moderate
Released on: 02/03/2026
Advisory:
Bugzilla: 2443891
Bugzilla Description: Freetype: Freetype: Information disclosure or denial of service via specially crafted font files
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE:
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 21,Red Hat build of OpenJDK 25,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3441
Severity: moderate
Released on: 02/03/2026
Advisory:
Bugzilla: 2443826
Bugzilla Description: binutils: GNU Binutils: Information disclosure via specially crafted XCOFF object file
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3442
Severity: moderate
Released on: 02/03/2026
Advisory:
Bugzilla: 2443828
Bugzilla Description: binutils: GNU Binutils: Information disclosure or denial of service via out-of-bounds read in bfd linker
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3429
Severity: moderate
Released on: 02/03/2026
Advisory:
Bugzilla: 2443771
Bugzilla Description: org.keycloak.services.resources.account: Improper Access Control Leading to MFA Deletion and Account Takeover in Keycloak Account REST API
CVSS Score:
CVSSv3 Score: 4.2
Vector:
CWE: CWE-284
Affected Packages:
Package States: Red Hat Build of Keycloak,Red Hat Build of Keycloak,Red Hat Build of Keycloak,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-28422
Severity: low
Released on: 27/02/2026
Advisory:
Bugzilla: 2443475
Bugzilla Description: vim: Vim: Integrity impact due to stack-buffer-overflow via wide terminal statusline rendering
CVSS Score:
CVSSv3 Score: 2.2
Vector:
CWE: CWE-135
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-28421
Severity: moderate
Released on: 27/02/2026
Advisory:
Bugzilla: 2443474
Bugzilla Description: vim: Vim: Denial of service and information disclosure via crafted swap file
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-28420
Severity: moderate
Released on: 27/02/2026
Advisory:
Bugzilla: 2443484
Bugzilla Description: vim: Vim: Information disclosure and denial of service via crafted Unicode characters in terminal emulator
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-28419
Severity: moderate
Released on: 27/02/2026
Advisory:
Bugzilla: 2443482
Bugzilla Description: vim: Vim: Information disclosure and denial of service via malformed tags file
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-124
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-28418
Severity: moderate
Released on: 27/02/2026
Advisory:
Bugzilla: 2443481
Bugzilla Description: vim: Vim: Information disclosure via heap-based buffer overflow in Emacs-style tags file parsing
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-28417
Severity: moderate
Released on: 27/02/2026
Advisory:
Bugzilla: 2443455
Bugzilla Description: vim: Vim: Arbitrary code execution via OS command injection in the netrw plugin
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-78
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-28416
Severity: important
Released on: 27/02/2026
Advisory:
Bugzilla: 2443453
Bugzilla Description: Gradio: Gradio: Server-Side Request Forgery allows access to internal services via malicious Space loading
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-918
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-28415
Severity: moderate
Released on: 27/02/2026
Advisory:
Bugzilla: 2443449
Bugzilla Description: Gradio: Gradio: Open Redirect vulnerability allows redirection to arbitrary external URLs.
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-601
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-27167
Severity: low
Released on: 27/02/2026
Advisory:
Bugzilla: 2443454
Bugzilla Description: Gradio: Gradio: Information disclosure due to hardcoded secret in session cookie signing, allowing remote attackers to steal Hugging Face tokens.
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-798
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-28406
Severity: important
Released on: 27/02/2026
Advisory:
Bugzilla: 2443462
Bugzilla Description: kaniko: kaniko: Arbitrary code execution via path traversal in build context archive unpacking
CVSS Score:
CVSSv3 Score: 8.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,
Full Details
CVE document


CVE-2026-28351
Severity: moderate
Released on: 27/02/2026
Advisory:
Bugzilla: 2443450
Bugzilla Description: pypdf: pypdf: Denial of Service via crafted PDF with RunLengthDecode filter
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,Red Hat Quay 3,
Full Details
CVE document


CVE-2026-2293
Severity: important
Released on: 27/02/2026
Advisory:
Bugzilla: 2443367
Bugzilla Description: nestjs: NestJS: Authentication bypass via Fastify path-normalization
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-551
Affected Packages:
Package States: Red Hat Developer Hub,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3304
Severity: important
Released on: 27/02/2026
Advisory:
Bugzilla: 2443353
Bugzilla Description: multer: Multer: Denial of Service via malformed requests
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-459
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Trusted Profile Analyzer,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-2359
Severity: important
Released on: 27/02/2026
Advisory:
Bugzilla: 2443350
Bugzilla Description: multer: Multer: Denial of Service via dropped file upload connections
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Trusted Profile Analyzer,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-3293
Severity: low
Released on: 27/02/2026
Advisory:
Bugzilla: 2443274
Bugzilla Description: snowflake-jdbc: snowflake-jdbc: Denial of Service via inefficient regular expression processing
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-1333
Affected Packages:
Package States: Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-28364
Severity: important
Released on: 27/02/2026
Advisory:
Bugzilla: 2443348
Bugzilla Description: ocaml: OCaml: Remote code execution via buffer over-read in Marshal deserialization
CVSS Score:
CVSSv3 Score: 7.9
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-28208
Severity: moderate
Released on: 26/02/2026
Advisory:
Bugzilla: 2443166
Bugzilla Description: com.github.junrar/junrar: Junrar: Remote code execution via path traversal when extracting crafted RAR archives
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-27141
Severity: moderate
Released on: 26/02/2026
Advisory:
Bugzilla: 2443104
Bugzilla Description: golang.org/x/net/http2: golang.org/x/net/http2: Denial of Service due to malformed HTTP/2 frames
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Compliance Operator,Confidential Compute Attestation,Confidential Compute Attestation,Cryostat 4,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,ExternalDNS Operator,ExternalDNS Operator,External Secrets Operator for Red Hat OpenShift,Fence Agents Remediation Operator,File Integrity Operator,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Multicluster Engine for Kubernetes,Multicluster Global Hub,Network Observability Operator,Node HealthCheck Operator,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Lightspeed for Runtimes Operator,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Service Interconnect 1,Red Hat Service Interconnect 2,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Security Profiles Operator,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2026-27970
Severity: important
Released on: 26/02/2026
Advisory:
Bugzilla: 2442934
Bugzilla Description: @angular/core: Angular: Cross-site scripting via compromised translation files
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-27959
Severity: important
Released on: 26/02/2026
Advisory:
Bugzilla: 2442928
Bugzilla Description: koa: Koa: Host header injection vulnerability due to malformed HTTP Host header parsing
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Developer Hub,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-27942
Severity: moderate
Released on: 26/02/2026
Advisory:
Bugzilla: 2442938
Bugzilla Description: fast-xml-parser: fast-xml-parser: Stack overflow leads to Denial of Service
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-776
Affected Packages:
Package States: Migration Toolkit for Applications 8,Red Hat Advanced Cluster Security 4,Red Hat Developer Hub,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Satellite 6,Red Hat Satellite 6,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-27904
Severity: moderate
Released on: 26/02/2026
Advisory: RHSA-2026:4942, RHSA-2026:5168, RHSA-2026:5665,
Bugzilla: 2442922
Bugzilla Description: minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1333
Affected Packages: quay/quay-rhel8:sha256:f6a231ebb14c74e194a8091822fe6a981e1cec92d223e04e6d0f12b60206259a,quay/quay-rhel8:sha256:4076a739c16c0567def8339bff5e8adca2f995217ae55428061cd0136a7e7a21,quay/quay-rhel8:sha256:d64bb14bf73ef1bc222525bffb67a3dfab0ba3ceef4770beb8138699609d4b41,
Package States: Cryostat 4,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 8,Node HealthCheck Operator,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat AMQ Broker 7,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Directory Server 11,Red Hat Directory Server 12,Red Hat Directory Server 13,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift distributed tracing 3,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,Self-service automation portal 2,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27903
Severity: moderate
Released on: 26/02/2026
Advisory:
Bugzilla: 2442919
Bugzilla Description: minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-1333
Affected Packages:
Package States: Cryostat 4,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 8,Node HealthCheck Operator,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat AMQ Broker 7,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Directory Server 11,Red Hat Directory Server 12,Red Hat Directory Server 13,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift distributed tracing 3,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,Self-service automation portal 2,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27902
Severity: moderate
Released on: 26/02/2026
Advisory:
Bugzilla: 2442917
Bugzilla Description: svelte: Svelte: Cross-Site Scripting via unsanitized error output
CVSS Score:
CVSSv3 Score: 4.2
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat Build of Podman Desktop - Tech Preview,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-27901
Severity: moderate
Released on: 26/02/2026
Advisory:
Bugzilla: 2442918
Bugzilla Description: svelte: Svelte: Cross-Site Scripting and HTML injection via improper escaping of bind:innerText and bind:textContent
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat Build of Podman Desktop - Tech Preview,
Full Details
CVE document


CVE-2026-27896
Severity: important
Released on: 26/02/2026
Advisory:
Bugzilla: 2442903
Bugzilla Description: modelcontextprotocol/go-sdk: improper handling of case sensitivity
CVSS Score:
CVSSv3 Score: 7.2
Vector:
CWE: CWE-178
Affected Packages:
Package States: Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,OpenShift Lightspeed,OpenShift Serverless,OpenShift Serverless,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-27830
Severity: important
Released on: 26/02/2026
Advisory: RHSA-2026:4285, RHSA-2026:3890,
Bugzilla: 2442908
Bugzilla Description: c3p0: c3p0: Arbitrary Code Execution via deserialization of crafted objects
CVSS Score:
CVSSv3 Score: 8.0
Vector:
CWE: CWE-502
Affected Packages: com.mchange/c3p0,
Package States: Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Debezium 2,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27888
Severity: moderate
Released on: 26/02/2026
Advisory:
Bugzilla: 2442899
Bugzilla Description: pypdf: pypdf: Denial of Service via crafted PDF
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-1050
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-27837
Severity: moderate
Released on: 26/02/2026
Advisory:
Bugzilla: 2442905
Bugzilla Description: dottie.js: dottie.js: Unauthorized object modification via prototype pollution bypass
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-915
Affected Packages:
Package States: Confidential Compute Attestation,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-3234
Severity: low
Released on: 26/02/2026
Advisory:
Bugzilla: 2442889
Bugzilla Description: mod_proxy_cluster: mod_proxy_cluster: Response body corruption via CRLF injection
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-93
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat JBoss Core Services,Red Hat JBoss Core Services,
Full Details
CVE document


CVE-2026-28296
Severity: moderate
Released on: 26/02/2026
Advisory:
Bugzilla: 2443003
Bugzilla Description: gvfs: FTP GVfs backend: Arbitrary FTP command injection via CRLF sequences in file paths
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-93
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-28295
Severity: low
Released on: 26/02/2026
Advisory:
Bugzilla: 2443004
Bugzilla Description: gvfs: GVfs FTP backend: Information disclosure via untrusted PASV responses
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-918
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27799
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442879
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service and data corruption due to crafted DJVU image processing
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-27798
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442872
Bugzilla Description: ImageMagick: ImageMagick: Information disclosure via heap buffer over-read when processing images
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-27148
Severity: important
Released on: 25/02/2026
Advisory:
Bugzilla: 2442784
Bugzilla Description: storybook: Storybook: Remote Code Execution via WebSocket Hijacking
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-346
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27951
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442783
Bugzilla Description: freerdp: FreeRDP: Denial of Service via endless blocking loop in Stream_EnsureCapacity
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27950
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442780
Bugzilla Description: freerdp: FreeRDP: Denial of service due to incomplete fix for heap-use-after-free vulnerability
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26986
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442782
Bugzilla Description: freerdp: FreeRDP: Denial of Service via double free vulnerability during disconnect
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26965
Severity: important
Released on: 25/02/2026
Advisory:
Bugzilla: 2442959
Bugzilla Description: freerdp: FreeRDP: Arbitrary code execution via heap out-of-bounds write in RLE planar decode path
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3172
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2443037
Bugzilla Description: pgvector: pgvector: Information disclosure or denial of service via buffer overflow in parallel HNSW index build
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-26955
Severity: important
Released on: 25/02/2026
Advisory:
Bugzilla: 2443132
Bugzilla Description: freerdp: FreeRDP: Arbitrary code execution via heap buffer overflow in GDI surface pipeline
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-805
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27015
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442748
Bugzilla Description: freerdp: FreeRDP: Denial of Service via missing bounds check in smartcard redirection
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26271
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442758
Bugzilla Description: freerdp: FreeRDP: Denial of Service via crafted RDP Window Icon data
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-805
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25997
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442764
Bugzilla Description: freerdp: FreeRDP: Denial of service via heap use-after-free during auto-reconnect
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25959
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442767
Bugzilla Description: freerdp: FreeRDP: Denial of Service via heap use-after-free in clipboard handling
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25955
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442754
Bugzilla Description: freerdp: FreeRDP: Denial of Service via use-after-free in xf_AppUpdateWindowFromSurface
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25954
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442751
Bugzilla Description: freerdp: FreeRDP: Use-after-free vulnerability leading to denial of service
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25953
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442757
Bugzilla Description: freerdp: FreeRDP: Denial of Service due to use-after-free vulnerability in window handling
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25952
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442768
Bugzilla Description: freerdp: FreeRDP: Denial of service due to use-after-free vulnerability
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25942
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442756
Bugzilla Description: freerdp: FreeRDP: Denial of Service via out-of-bounds read from malicious server input
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25941
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442761
Bugzilla Description: freerdp: FreeRDP: Information disclosure or client crash via out-of-bounds read in RDPGFX channel
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-130
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27795
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442693
Bugzilla Description: langchain-core: @langchain/community: Server-Side Request Forgery (SSRF) bypass via redirect manipulation
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-918
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-25554
Severity: important
Released on: 25/02/2026
Advisory:
Bugzilla: 2442687
Bugzilla Description: opensips: OpenSIPS: Authentication bypass due to SQL injection in JWT processing
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-89
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-27794
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442692
Bugzilla Description: langgraph-checkpoint: LangGraph Checkpoint: Remote Code Execution via insecure deserialization in caching layer
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-502
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-27727
Severity: important
Released on: 25/02/2026
Advisory: RHSA-2026:4285, RHSA-2026:3890,
Bugzilla: 2442671
Bugzilla Description: com.mchange/mchange-commons-java: mchange-commons-java: Arbitrary code execution via JNDI dereferencing of crafted objects
CVSS Score:
CVSSv3 Score: 8.3
Vector:
CWE: CWE-502
Affected Packages: mchange-commons-java,
Package States: Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Debezium 2,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Satellite 6,Red Hat Satellite 6,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27699
Severity: important
Released on: 25/02/2026
Advisory:
Bugzilla: 2442644
Bugzilla Description: basic-ftp: basic-ftp: File overwrite due to path traversal
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-22
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3203
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442639
Bugzilla Description: wireshark: Buffer Over-read in Wireshark
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-126
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3202
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442640
Bugzilla Description: wireshark: NULL Pointer Dereference in Wireshark
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3201
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442641
Bugzilla Description: wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-1325
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-21725
Severity: low
Released on: 25/02/2026
Advisory:
Bugzilla: 2442609
Bugzilla Description: grafana: Grafana: Unauthorized data source deletion via time-of-create-to-time-of-use (TOCTOU) vulnerability
CVSS Score:
CVSSv3 Score: 2.6
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-11563
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442571
Bugzilla Description: wcurl: wcurl: Arbitrary file placement via crafted URLs
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-22
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3190
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2442572
Bugzilla Description: keycloak: Keycloak: Information Disclosure via improper role enforcement in UMA 2.0 Protection API
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-280
Affected Packages:
Package States: Red Hat Build of Keycloak,
Full Details
CVE document


CVE-2026-26104
Severity: moderate
Released on: 25/02/2026
Advisory: RHSA-2026:3476,
Bugzilla: 2433717
Bugzilla Description: udisks: Missing Authorization Check Allows Unprivileged Users to Back Up LUKS Headers via udisks D-Bus API
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-862
Affected Packages: udisks2-0:2.10.90-6.el10_1.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26103
Severity: important
Released on: 25/02/2026
Advisory: RHSA-2026:3476,
Bugzilla: 2433719
Bugzilla Description: udisks: Missing Authorization Check Allows Unprivileged Users to Restore LUKS Headers via udisks D-Bus API
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-862
Affected Packages: udisks2-0:2.10.90-6.el10_1.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3184
Severity: low
Released on: 25/02/2026
Advisory:
Bugzilla: 2442570
Bugzilla Description: util-linux: util-linux: Access control bypass due to improper hostname canonicalization
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-289
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-27628
Severity: moderate
Released on: 25/02/2026
Advisory: RHSA-2026:4942, RHSA-2026:5168, RHSA-2026:5665,
Bugzilla: 2442543
Bugzilla Description: pypdf: possible infinite loop when loading circular /Prev entries in cross-reference streams
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-835
Affected Packages: quay/quay-rhel8:sha256:56bcc55b01c76a1eb7ad8b265cf9dfdd488fc62bc353e3822864a0f6c4f98ffb,quay/quay-rhel8:sha256:c0d00643c4ac6f84e5327192a29c6353b5dcac34d483d0a3e5f39d366127fcc2,quay/quay-rhel8:sha256:3e5ce0a56241c9804249dfb302cde02d2ffe30ba8fcd8aef8f1bce916d2324ad,
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,
Full Details
CVE document


CVE-2026-27606
Severity: important
Released on: 25/02/2026
Advisory: RHSA-2026:5649, RHSA-2026:5665, RHSA-2026:5132,
Bugzilla: 2442530
Bugzilla Description: rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-22
Affected Packages: quay/quay-rhel8:sha256:6e13793ca8f309ec0b69ae609b840ff0f41989d88cd4bba127e1b0040631367e,rhtas/rhtas-console-ui-rhel9:sha256:d23bf73126fb5c18ff24369bb05c7adb03e9f3fefdbb49795b8aeb3d7c223cdb,openshift-service-mesh/kiali-rhel8:sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771,
Package States: OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Advanced Cluster Security 4,Red Hat AMQ Broker 7,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of OptaPlanner 8,Red Hat Build of Podman Desktop - Tech Preview,Red Hat Build of Podman Desktop - Tech Preview,Red Hat Build of Podman Desktop - Tech Preview,Red Hat Build of Podman Desktop - Tech Preview,Red Hat Build of Podman Desktop - Tech Preview,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift distributed tracing 3,Red Hat Single Sign-On 7,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-1940
Severity: moderate
Released on: 25/02/2026
Advisory:
Bugzilla: 2436932
Bugzilla Description: gstreamer: incomplete fix of CVE-2026-1940
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-27572
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442485
Bugzilla Description: wasmtime: Wasmtime: Denial of Service via excessive HTTP header fields
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Connectivity Link 1,
Full Details
CVE document


CVE-2026-27204
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442480
Bugzilla Description: wasmtime: Wasmtime: Denial of Service via guest-controlled resource exhaustion in WASI host interfaces
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Connectivity Link 1,
Full Details
CVE document


CVE-2026-27195
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442481
Bugzilla Description: wasmtime: Wasmtime: Denial of Service via repeated async function calls
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-248
Affected Packages:
Package States: Red Hat Connectivity Link 1,
Full Details
CVE document


CVE-2026-27571
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:5110,
Bugzilla: 2442401
Bugzilla Description: nats-server: WebSockets pre-auth memory DoS
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages: multicluster-globalhub/multicluster-globalhub-grafana-rhel9:sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062,
Package States: Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-2807
Severity: important
Released on: 24/02/2026
Advisory:
Bugzilla: 2442296
Bugzilla Description: firefox: thunderbird: Memory safety bugs fixed in Firefox 148 and Thunderbird 148
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2806
Severity: low
Released on: 24/02/2026
Advisory:
Bugzilla: 2442306
Bugzilla Description: firefox: thunderbird: Uninitialized memory in the Graphics: Text component
CVSS Score:
CVSSv3 Score: 3.4
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2805
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442285
Bugzilla Description: firefox: thunderbird: Invalid pointer in the DOM: Core & HTML component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2804
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442332
Bugzilla Description: firefox: thunderbird: Use-after-free in the JavaScript: WebAssembly component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2803
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442338
Bugzilla Description: firefox: thunderbird: Information disclosure, mitigation bypass in the Settings UI component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2802
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442344
Bugzilla Description: firefox: thunderbird: Race condition in the JavaScript: GC component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2801
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442289
Bugzilla Description: firefox: thunderbird: Incorrect boundary conditions in the JavaScript: WebAssembly component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2800
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442299
Bugzilla Description: firefox: thunderbird: Spoofing issue in the WebAuthn component in Firefox for Android
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2799
Severity: important
Released on: 24/02/2026
Advisory:
Bugzilla: 2442303
Bugzilla Description: firefox: thunderbird: Use-after-free in the DOM: Core & HTML component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2798
Severity: important
Released on: 24/02/2026
Advisory:
Bugzilla: 2442315
Bugzilla Description: firefox: thunderbird: Use-after-free in the DOM: Core & HTML component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2797
Severity: important
Released on: 24/02/2026
Advisory:
Bugzilla: 2442330
Bugzilla Description: firefox: thunderbird: Use-after-free in the JavaScript: GC component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2796
Severity: important
Released on: 24/02/2026
Advisory:
Bugzilla: 2442301
Bugzilla Description: firefox: thunderbird: JIT miscompilation in the JavaScript: WebAssembly component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2795
Severity: important
Released on: 24/02/2026
Advisory:
Bugzilla: 2442305
Bugzilla Description: firefox: Use-after-free in the JavaScript: GC component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2794
Severity: important
Released on: 24/02/2026
Advisory:
Bugzilla: 2442286
Bugzilla Description: firefox: Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2793
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442287
Bugzilla Description: firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2792
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442318
Bugzilla Description: firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2791
Severity: low
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442342
Bugzilla Description: firefox: thunderbird: Mitigation bypass in the Networking: Cache component
CVSS Score:
CVSSv3 Score: 3.4
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2790
Severity: low
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442313
Bugzilla Description: firefox: thunderbird: Same-origin policy bypass in the Networking: JAR component
CVSS Score:
CVSSv3 Score: 3.4
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2788
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442302
Bugzilla Description: firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2789
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442322
Bugzilla Description: firefox: thunderbird: Use-after-free in the Graphics: ImageLib component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2787
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442297
Bugzilla Description: firefox: thunderbird: Use-after-free in the DOM: Window and Location component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2785
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442284
Bugzilla Description: firefox: thunderbird: Invalid pointer in the JavaScript Engine component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2786
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442320
Bugzilla Description: firefox: thunderbird: Use-after-free in the JavaScript Engine component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2784
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442304
Bugzilla Description: firefox: thunderbird: Mitigation bypass in the DOM: Security component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2783
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442300
Bugzilla Description: firefox: thunderbird: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2782
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442331
Bugzilla Description: firefox: thunderbird: Privilege escalation in the Netmonitor component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2781
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442292
Bugzilla Description: firefox: thunderbird: Integer overflow in the Libraries component in NSS
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2779
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442327
Bugzilla Description: firefox: thunderbird: Incorrect boundary conditions in the Networking: JAR component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2780
Severity: moderate
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442334
Bugzilla Description: firefox: thunderbird: Privilege escalation in the Netmonitor component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2778
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442335
Bugzilla Description: firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2776
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442291
Bugzilla Description: firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2777
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442312
Bugzilla Description: firefox: thunderbird: Privilege escalation in the Messaging System component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2775
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442314
Bugzilla Description: firefox: thunderbird: Mitigation bypass in the DOM: HTML Parser component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2774
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442290
Bugzilla Description: firefox: thunderbird: Integer overflow in the Audio/Video component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2773
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442319
Bugzilla Description: firefox: thunderbird: Incorrect boundary conditions in the Web Audio component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2772
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442326
Bugzilla Description: firefox: thunderbird: Use-after-free in the Audio/Video: Playback component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2771
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442288
Bugzilla Description: firefox: thunderbird: Undefined behavior in the DOM: Core & HTML component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2770
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442343
Bugzilla Description: firefox: thunderbird: Use-after-free in the DOM: Bindings (WebIDL) component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2769
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442295
Bugzilla Description: firefox: thunderbird: Use-after-free in the Storage: IndexedDB component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2768
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442298
Bugzilla Description: firefox: thunderbird: Sandbox escape in the Storage: IndexedDB component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2767
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442328
Bugzilla Description: firefox: thunderbird: Use-after-free in the JavaScript: WebAssembly component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2766
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442294
Bugzilla Description: firefox: thunderbird: Use-after-free in the JavaScript Engine: JIT component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2764
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442329
Bugzilla Description: firefox: thunderbird: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2765
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442333
Bugzilla Description: firefox: thunderbird: Use-after-free in the JavaScript Engine component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2763
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442316
Bugzilla Description: firefox: thunderbird: Use-after-free in the JavaScript Engine component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2762
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442308
Bugzilla Description: firefox: thunderbird: Integer overflow in the JavaScript: Standard Library component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2761
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442309
Bugzilla Description: firefox: thunderbird: Sandbox escape in the Graphics: WebRender component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2760
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442325
Bugzilla Description: firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2759
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442307
Bugzilla Description: firefox: thunderbird: Incorrect boundary conditions in the Graphics: ImageLib component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2758
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442337
Bugzilla Description: firefox: thunderbird: Use-after-free in the JavaScript: GC component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2757
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:3984, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:3338, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:3517, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2442324
Bugzilla Description: firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Audio/Video component
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE:
Affected Packages: thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,thunderbird-0:140.8.0-1.el9_4,thunderbird-0:140.8.0-1.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,firefox-0:140.8.0-2.el9_2,firefox-0:140.8.0-2.el8_6,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-3121
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442277
Bugzilla Description: keycloak: org.keycloak/keycloak-services: Keycloak: Privilege escalation via manage-clients permission
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-266
Affected Packages:
Package States: Red Hat Build of Keycloak,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-26981
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442135
Bugzilla Description: openexr: OpenEXR: Denial of Service via heap-buffer-overflow when parsing a malformed EXR file
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-191
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26331
Severity: important
Released on: 24/02/2026
Advisory:
Bugzilla: 2442143
Bugzilla Description: yt-dlp: yt-dlp: Arbitrary command injection via maliciously crafted URL when --netrc-cmd is used
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-78
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-26983
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442134
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via invalid MSL map element processing
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-26284
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442137
Bugzilla Description: ImageMagick: ImageMagick: Out-of-bounds read via crafted Photo CD (PCD) files
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-26283
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442140
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via crafted image leading to an infinite loop
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-26066
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442142
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via crafted IPTC data
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25989
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442136
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via crafted SVG file
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-193
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25988
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442101
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service due to memory leak in image processing
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25987
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442115
Bugzilla Description: ImageMagick: ImageMagick: Memory disclosure and denial of service via crafted MAP files
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25986
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442111
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via malicious YUV image processing
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-805
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25985
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:5573,
Bugzilla: 2442127
Bugzilla Description: ImageMagick: Memory allocation with excessive without limits in the internal SVG decoder
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages: ImageMagick-0:6.9.10.68-13.el7_9,
Package States: Red Hat Enterprise Linux 6,
Full Details
CVE document


CVE-2026-25983
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442113
Bugzilla Description: ImageMagick: ImageMagick: Denial of service via crafted MSL script
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25982
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442124
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service or Information Disclosure via heap out-of-bounds read in DICOM file processing
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25971
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442117
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via circular references in MSL files
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-606
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25970
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442108
Bugzilla Description: ImageMagick: ImageMagick: Memory corruption and denial of service via signed integer overflow in SIXEL decoder.
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25969
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442116
Bugzilla Description: ImageMagick: ImageMagick: Memory leak leading to denial of service via image processing
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25968
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442125
Bugzilla Description: ImageMagick: ImageMagick: Memory corruption via stack buffer overflow when processing an attribute
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25967
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442126
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via crafted FTXT file
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25966
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442122
Bugzilla Description: ImageMagick: ImageMagick: Policy bypass allows unauthorized access to standard streams via fd: pseudo-filenames
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-184
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25965
Severity: important
Released on: 24/02/2026
Advisory: RHSA-2026:5573,
Bugzilla: 2442118
Bugzilla Description: ImageMagick: ImageMagick: Local File Disclosure via Path Traversal
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-22
Affected Packages: ImageMagick-0:6.9.10.68-13.el7_9,
Package States: Red Hat Enterprise Linux 6,
Full Details
CVE document


CVE-2026-25898
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442102
Bugzilla Description: ImageMagick: ImageMagick: Information disclosure or denial of service via crafted image with invalid pixel index
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25897
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442098
Bugzilla Description: ImageMagick: ImageMagick: Out-of-bounds heap write via integer overflow in sun decoder
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25799
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442120
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via YUV sampling factor validation error
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-369
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25798
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442119
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via crafted image file
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25797
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442106
Bugzilla Description: ImageMagick: ImageMagick: Arbitrary code execution via crafted PostScript files
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-3099
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442232
Bugzilla Description: libsoup: Libsoup: Authentication bypass via digest authentication replay attack
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-323
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25796
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442112
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service Vulnerability
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25795
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442099
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service due to NULL pointer dereference during temporary file creation failure
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25794
Severity: important
Released on: 24/02/2026
Advisory:
Bugzilla: 2442110
Bugzilla Description: ImageMagick: ImageMagick: Denial of service and potential arbitrary code execution via integer overflow in image processing
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25638
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442105
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service due to memory leak in image processing
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25637
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442114
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via crafted image due to memory leak
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-25576
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442093
Bugzilla Description: ImageMagick: ImageMagick: Information disclosure due to heap buffer over-read when processing malformed images
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-24485
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442091
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service via malformed PCD file processing
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-24484
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442085
Bugzilla Description: ImageMagick: ImageMagick: Denial of Service vulnerability via multi-layer nested MVG to SVG conversion
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-1284
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-3118
Severity: moderate
Released on: 24/02/2026
Advisory:
Bugzilla: 2442273
Bugzilla Description: rhdh: GraphQL Injection Leading to Platform-Wide Denial of Service (DoS) in RH Developer Hub Orchestrator Plugin
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-89
Affected Packages:
Package States: Red Hat Developer Hub,
Full Details
CVE document


CVE-2026-27623
Severity: important
Released on: 23/02/2026
Advisory:
Bugzilla: 2442021
Bugzilla Description: Valkey: Valkey: Denial of Service via specially crafted network requests
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-617
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-21863
Severity: important
Released on: 23/02/2026
Advisory: RHSA-2026:3507, RHSA-2026:5445, RHSA-2026:3443,
Bugzilla: 2442026
Bugzilla Description: valkey: Valkey: Denial of Service via invalid clusterbus packet
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-125
Affected Packages: valkey-0:8.0.7-1.el9_7,valkey-0:8.0.7-1.el10_0,valkey-0:8.0.7-1.el10_1,
Package States:
Full Details
CVE document


CVE-2025-67733
Severity: important
Released on: 23/02/2026
Advisory: RHSA-2026:3507, RHSA-2026:5445, RHSA-2026:3443,
Bugzilla: 2442025
Bugzilla Description: Valkey: Valkey: Data tampering and denial of service via improper null character handling in Lua scripts
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-170
Affected Packages: valkey-0:8.0.7-1.el9_7,valkey-0:8.0.7-1.el10_0,valkey-0:8.0.7-1.el10_1,
Package States:
Full Details
CVE document


CVE-2026-25747
Severity: important
Released on: 23/02/2026
Advisory:
Bugzilla: 2441910
Bugzilla Description: org.apache.camel/camel-leveldb: Apache Camel LevelDB: Arbitrary code execution via deserialization of untrusted data
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-502
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2025-14905
Severity: moderate
Released on: 23/02/2026
Advisory: RHSA-2026:3379, RHSA-2026:5568, RHSA-2026:5513, RHSA-2026:5514, RHSA-2026:5569, RHSA-2026:3208, RHSA-2026:3504, RHSA-2026:4207, RHSA-2026:5196, RHSA-2026:5597, RHSA-2026:5576, RHSA-2026:5598, RHSA-2026:5511, RHSA-2026:5512, RHSA-2026:4720, RHSA-2026:3189, RHSA-2026:4661,
Bugzilla: 2423624
Bugzilla Description: 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow
CVSS Score:
CVSSv3 Score: 7.2
Vector:
CWE: CWE-122
Affected Packages: 389-ds:1.4-8080020260227183930.6dbb3803,redhat-ds:11-8060020260303152239.0ca98e7e,389-ds:1.4-8100020260312103235.25e700aa,389-ds-base-0:2.4.5-24.el9_4,389-ds-base-0:3.1.3-7.el10_1,389-ds-base-0:2.7.0-10.el9_7,389-ds-base-0:3.0.6-17.el10_0,389-ds:1.4-8020020260303204738.dbc46ba7,redhat-ds:12-9040020260225135630.1674d574,389-ds-base-0:2.0.14-5.el9_0,dirsrv/dirsrv-container-rhel10:sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5,389-ds-base-0:2.2.4-17.el9_2,389-ds:1.4-8060020260303144613.824efc52,redhat-ds:11-8080020260227193008.f969626e,redhat-ds:11-8100020260312105752.37ed7c03,redhat-ds:12-9020020260304180546.1674d574,389-ds-base-0:2.6.1-20.el9_6,
Package States: Red Hat Directory Server 12,Red Hat Directory Server 13,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2025-61145
Severity: moderate
Released on: 23/02/2026
Advisory:
Bugzilla: 2441975
Bugzilla Description: libtiff: libtiff: Denial of service via double free in tiffcrop.c
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-1341
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-61144
Severity: moderate
Released on: 23/02/2026
Advisory:
Bugzilla: 2441977
Bugzilla Description: libtiff: libtiff: Denial of Service via buffer overflow
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-805
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-61143
Severity: moderate
Released on: 23/02/2026
Advisory:
Bugzilla: 2441978
Bugzilla Description: libtiff: libtiff: Denial of Service via NULL pointer dereference in tif_open.c
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-3062
Severity: important
Released on: 23/02/2026
Advisory:
Bugzilla: 2442071
Bugzilla Description: chromium-browser: Out of bounds read and write in Tint
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3061
Severity: important
Released on: 23/02/2026
Advisory:
Bugzilla: 2442073
Bugzilla Description: chromium-browser: Out of bounds read in Media
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3063
Severity: important
Released on: 23/02/2026
Advisory:
Bugzilla: 2442074
Bugzilla Description: chromium-browser: Inappropriate implementation in DevTools
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2913
Severity: low
Released on: 22/02/2026
Advisory:
Bugzilla: 2441715
Bugzilla Description: libvips: libvips: Denial of Service via heap-based buffer overflow in vips_source_read_to_memory
CVSS Score:
CVSSv3 Score: 2.5
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-2903
Severity: low
Released on: 22/02/2026
Advisory:
Bugzilla: 2441707
Bugzilla Description: re2c: re2c: Denial of Service via null pointer dereference
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2026-27205
Severity: moderate
Released on: 21/02/2026
Advisory:
Bugzilla: 2441596
Bugzilla Description: flask: Flask: Information disclosure via improper caching of session data
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-524
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2026-27134
Severity: important
Released on: 20/02/2026
Advisory:
Bugzilla: 2441564
Bugzilla Description: strimzi-kafka-operator: Strimzi: Unauthorized authentication via misconfigured mTLS CA chain
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-295
Affected Packages:
Package States: streams for Apache Kafka 2,streams for Apache Kafka 2,streams for Apache Kafka 3,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27133
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441519
Bugzilla Description: strimzi-kafka-operator: Strimzi: Improper certificate validation allows unauthorized access via CA chain misconfiguration
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-295
Affected Packages:
Package States: streams for Apache Kafka 2,streams for Apache Kafka 2,streams for Apache Kafka 3,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-27125
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441511
Bugzilla Description: svelte: Svelte SSR attribute spreading includes inherited properties from prototype chain
CVSS Score:
CVSSv3 Score: 5.6
Vector:
CWE: CWE-915
Affected Packages:
Package States: Red Hat Build of Podman Desktop - Tech Preview,
Full Details
CVE document


CVE-2026-27122
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441520
Bugzilla Description: svelte: Svelte SSR does not validate dynamic element tag names in ``
CVSS Score:
CVSSv3 Score: 5.6
Vector:
CWE: CWE-1286
Affected Packages:
Package States: Red Hat Build of Podman Desktop - Tech Preview,
Full Details
CVE document


CVE-2026-27121
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441532
Bugzilla Description: svelte: Svelte affected by cross-site scripting via spread attributes in Svelte SSR
CVSS Score:
CVSSv3 Score: 5.6
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat Build of Podman Desktop - Tech Preview,
Full Details
CVE document


CVE-2026-27119
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441526
Bugzilla Description: svelte: Svelte affected by XSS in SSR `


CVE-2026-2048
Severity: important
Released on: 20/02/2026
Advisory: RHSA-2026:5391, RHSA-2026:4173, RHSA-2026:5436, RHSA-2026:5437, RHSA-2026:5390, RHSA-2026:5113, RHSA-2026:5388, RHSA-2026:5389, RHSA-2026:5434, RHSA-2026:5435,
Bugzilla: 2441527
Bugzilla Description: gimp: GIMP: Remote Code Execution via XWD file parsing vulnerability
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-787
Affected Packages: gimp-2:2.99.8-3.el9_0.5,gimp-2:2.99.8-4.el9_2.5,gimp:2.8-8020020260319131243.c3a0935b,gimp:2.8-8040020260320114321.70584597,gimp:2.8-8080020260319123205.0621e4ee,gimp-2:2.99.8-4.el9_6.6,gimp-2:3.0.4-1.el9_7.4,gimp-2:2.99.8-4.el9_4.5,gimp:2.8-8100020260312152017.4c9c024f,gimp:2.8-8060020260319125557.6af1eaf0,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2047
Severity: important
Released on: 20/02/2026
Advisory: RHSA-2026:4173,
Bugzilla: 2441517
Bugzilla Description: gimp: GIMP: Remote code execution via heap-based buffer overflow in ICNS file parsing
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-131
Affected Packages: gimp-2:3.0.4-1.el9_7.4,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2026-2045
Severity: important
Released on: 20/02/2026
Advisory: RHSA-2026:5391, RHSA-2026:4173, RHSA-2026:5436, RHSA-2026:5437, RHSA-2026:5390, RHSA-2026:5113, RHSA-2026:5388, RHSA-2026:5389, RHSA-2026:5434, RHSA-2026:5435,
Bugzilla: 2441522
Bugzilla Description: gimp: GIMP: Remote Code Execution via out-of-bounds write in XWD file parsing
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-787
Affected Packages: gimp-2:2.99.8-3.el9_0.5,gimp-2:2.99.8-4.el9_2.5,gimp:2.8-8020020260319131243.c3a0935b,gimp:2.8-8040020260320114321.70584597,gimp:2.8-8080020260319123205.0621e4ee,gimp-2:2.99.8-4.el9_6.6,gimp-2:3.0.4-1.el9_7.4,gimp-2:2.99.8-4.el9_4.5,gimp:2.8-8100020260312152017.4c9c024f,gimp:2.8-8060020260319125557.6af1eaf0,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2044
Severity: important
Released on: 20/02/2026
Advisory: RHSA-2026:5391, RHSA-2026:4173, RHSA-2026:5436, RHSA-2026:5437, RHSA-2026:5390, RHSA-2026:5113, RHSA-2026:5388, RHSA-2026:5389, RHSA-2026:5434, RHSA-2026:5435,
Bugzilla: 2441521
Bugzilla Description: gimp: GIMP: Remote Code Execution via uninitialized memory in PGM file parsing
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-908
Affected Packages: gimp-2:2.99.8-3.el9_0.5,gimp-2:2.99.8-4.el9_2.5,gimp:2.8-8020020260319131243.c3a0935b,gimp:2.8-8040020260320114321.70584597,gimp:2.8-8080020260319123205.0621e4ee,gimp-2:2.99.8-4.el9_6.6,gimp-2:3.0.4-1.el9_7.4,gimp-2:2.99.8-4.el9_4.5,gimp:2.8-8100020260312152017.4c9c024f,gimp:2.8-8060020260319125557.6af1eaf0,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2492
Severity: important
Released on: 20/02/2026
Advisory:
Bugzilla: 2441510
Bugzilla Description: tensorflow: TensorFlow: Local privilege escalation via uncontrolled search path for plugins
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-427
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-0797
Severity: important
Released on: 20/02/2026
Advisory: RHSA-2026:5391, RHSA-2026:4173, RHSA-2026:5436, RHSA-2026:5437, RHSA-2026:5390, RHSA-2026:5113, RHSA-2026:5388, RHSA-2026:5389, RHSA-2026:5434, RHSA-2026:5435,
Bugzilla: 2441524
Bugzilla Description: gimp: GIMP: Remote Code Execution via ICO File Parsing Vulnerability
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages: gimp-2:2.99.8-3.el9_0.5,gimp-2:2.99.8-4.el9_2.5,gimp:2.8-8020020260319131243.c3a0935b,gimp:2.8-8040020260320114321.70584597,gimp:2.8-8080020260319123205.0621e4ee,gimp-2:2.99.8-4.el9_6.6,gimp-2:3.0.4-1.el9_7.4,gimp-2:2.99.8-4.el9_4.5,gimp:2.8-8100020260312152017.4c9c024f,gimp:2.8-8060020260319125557.6af1eaf0,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-27026
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441495
Bugzilla Description: pypdf: pypdf: Denial of Service via malformed PDF /FlateDecode stream
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1050
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-27025
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441494
Bugzilla Description: pypdf: pypdf: Denial of Service via crafted PDF with large font values
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1050
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-27024
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441490
Bugzilla Description: pypdf: pypdf: Denial of Service via crafted PDF with TreeObject outlines
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-25896
Severity: important
Released on: 20/02/2026
Advisory:
Bugzilla: 2441501
Bugzilla Description: fast-xml-parser: fast-xml-parser: Cross-Site Scripting (XSS) due to improper DOCTYPE entity handling
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-79
Affected Packages:
Package States: Migration Toolkit for Applications 8,Red Hat Advanced Cluster Security 4,Red Hat Developer Hub,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Satellite 6,Red Hat Satellite 6,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-2472
Severity: important
Released on: 20/02/2026
Advisory:
Bugzilla: 2441472
Bugzilla Description: google-cloud-aiplatform: google-cloud-aiplatform: Arbitrary code execution via Stored Cross-Site Scripting (XSS)
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-2818
Severity: important
Released on: 20/02/2026
Advisory:
Bugzilla: 2441384
Bugzilla Description: org.springframework.data/spring-data-geode: Spring Data Geode: Path traversal vulnerability allows arbitrary file write via import snapshot functionality.
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Fuse 7,
Full Details
CVE document


CVE-2026-21620
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441326
Bugzilla Description: erlang: Erlang OTP tftp_file modules: Information disclosure via relative path traversal
CVSS Score:
CVSSv3 Score: 4.2
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,
Full Details
CVE document


CVE-2026-2739
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2441279
Bugzilla Description: bn.js: bn.js: Denial of Service via calling maskn(0)
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-835
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat build of Apicurio Registry 2,Red Hat Developer Hub,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Quay 3,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-26996
Severity: moderate
Released on: 20/02/2026
Advisory: RHSA-2026:4942, RHSA-2026:5168, RHSA-2026:5665,
Bugzilla: 2441268
Bugzilla Description: minimatch: minimatch: Denial of Service via specially crafted glob patterns
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1333
Affected Packages: quay/quay-rhel8:sha256:56bcc55b01c76a1eb7ad8b265cf9dfdd488fc62bc353e3822864a0f6c4f98ffb,quay/quay-rhel8:sha256:c0d00643c4ac6f84e5327192a29c6353b5dcac34d483d0a3e5f39d366127fcc2,quay/quay-rhel8:sha256:3e5ce0a56241c9804249dfb302cde02d2ffe30ba8fcd8aef8f1bce916d2324ad,
Package States: Cryostat 4,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 8,Node HealthCheck Operator,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat AMQ Broker 7,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Directory Server 11,Red Hat Directory Server 12,Red Hat Directory Server 13,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift distributed tracing 3,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,Self-service automation portal 2,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-26960
Severity: moderate
Released on: 20/02/2026
Advisory: RHSA-2026:5447,
Bugzilla: 2441253
Bugzilla Description: tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-22
Affected Packages: rhtas/rekor-search-ui-rhel9:sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0,
Package States: Cryostat 4,Logging Subsystem for Red Hat OpenShift,Network Observability Operator,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat AMQ Broker 7,Red Hat build of Apache Camel - HawtIO 4,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2026-26967
Severity: important
Released on: 20/02/2026
Advisory:
Bugzilla: 2441242
Bugzilla Description: pjsip: PJSIP: Arbitrary code execution via H.264 unpacketizer heap-based buffer overflow
CVSS Score:
CVSSv3 Score: 8.4
Vector:
CWE: CWE-120
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-3196
Severity: moderate
Released on: 20/02/2026
Advisory:
Bugzilla: 2443789
Bugzilla Description: qemu-kvm: virtio-snd: integer overflow leading to unbounded memory allocation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-3195
Severity: important
Released on: 20/02/2026
Advisory:
Bugzilla: 2443817
Bugzilla Description: qemu-kvm: virtio-snd: heap buffer overflow in virtio_snd_pcm_in_cb (incomplete fix for CVE-2024-7730)
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-122
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-26963
Severity: moderate
Released on: 19/02/2026
Advisory:
Bugzilla: 2441217
Bugzilla Description: cilium: Cilium: Information disclosure via incorrect traffic permitting with specific network configurations
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-266
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Multicluster Global Hub,Network Observability Operator,Network Observability Operator,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,
Full Details
CVE document


CVE-2026-26958
Severity: low
Released on: 19/02/2026
Advisory:
Bugzilla: 2441221
Bugzilla Description: filippo.io/edwards25519: filippo.io/edwards25519: Cryptographic integrity bypass due to incorrect MultiScalarMult results
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-824
Affected Packages:
Package States: Cryostat 4,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift GitOps,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Security Profiles Operator,Security Profiles Operator,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2026-24122
Severity: low
Released on: 19/02/2026
Advisory:
Bugzilla: 2441194
Bugzilla Description: sigstore/cosign: sigstore/cosign: Incorrect signature validation due to expired issuing certificate bypass
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-295
Affected Packages:
Package States: External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Security Profiles Operator,Security Profiles Operator,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2026-26318
Severity: important
Released on: 19/02/2026
Advisory:
Bugzilla: 2441124
Bugzilla Description: systeminformation: systeminformation: Arbitrary code execution via unsanitized `locate` output
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-78
Affected Packages:
Package States: Red Hat Developer Hub,
Full Details
CVE document


CVE-2026-26280
Severity: important
Released on: 19/02/2026
Advisory:
Bugzilla: 2441121
Bugzilla Description: systeminformation: systeminformation: Arbitrary command execution via unsanitized network interface parameter
CVSS Score:
CVSSv3 Score: 8.4
Vector:
CWE: CWE-78
Affected Packages:
Package States: Red Hat Developer Hub,
Full Details
CVE document


CVE-2026-26278
Severity: important
Released on: 19/02/2026
Advisory:
Bugzilla: 2441120
Bugzilla Description: fast-xml-parser: fast-xml-parser: Denial of Service via unlimited XML entity expansion
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-776
Affected Packages:
Package States: Migration Toolkit for Applications 8,Red Hat Advanced Cluster Security 4,Red Hat Developer Hub,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Satellite 6,Red Hat Satellite 6,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-26200
Severity: important
Released on: 19/02/2026
Advisory:
Bugzilla: 2441088
Bugzilla Description: hdf5: HDF5: Denial of Service due to heap buffer overflow when parsing a crafted h5 file
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document


CVE-2026-2817
Severity: moderate
Released on: 19/02/2026
Advisory:
Bugzilla: 2441042
Bugzilla Description: org.springframework.data/spring-data-geode: Spring Data Geode: Information disclosure via insecure temporary directory for snapshot imports
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-379
Affected Packages:
Package States: Red Hat Fuse 7,
Full Details
CVE document


CVE-2026-24834
Severity: important
Released on: 19/02/2026
Advisory:
Bugzilla: 2441025
Bugzilla Description: containerd-shim-kata-v2: Kata Containers: Arbitrary code execution in guest virtual machine via file system modification
CVSS Score:
CVSSv3 Score: 9.3
Vector:
CWE: CWE-281
Affected Packages:
Package States: Confidential Compute Attestation,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-25940
Severity: important
Released on: 19/02/2026
Advisory:
Bugzilla: 2441016
Bugzilla Description: jsPDF: PDF injection in AcroForm module allows arbitrary JavaScript execution (RadioButton children)
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-116
Affected Packages:
Package States: Red Hat Advanced Cluster Security 4,
Full Details
CVE document


CVE-2026-25755
Severity: important
Released on: 19/02/2026
Advisory:
Bugzilla: 2440993
Bugzilla Description: jsPDF: PDF object injection via unsanitized input in addJS method
CVSS Score:
CVSSv3 Score: 9.6
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat Advanced Cluster Security 4,
Full Details
CVE document


CVE-2026-25535
Severity: important
Released on: 19/02/2026
Advisory:
Bugzilla: 2440992
Bugzilla Description: jsPDF: denial of service via malicious GIF dimensions
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Advanced Cluster Security 4,
Full Details
CVE document


CVE-2026-2733
Severity: low
Released on: 19/02/2026
Advisory: RHSA-2026:3947, RHSA-2026:3948,
Bugzilla: 2440895
Bugzilla Description: org.keycloak/keycloak-services: Keycloak: Missing Check on Disabled Client for Docker Registry Protocol
CVSS Score:
CVSSv3 Score: 3.8
Vector:
CWE: CWE-285
Affected Packages: rhbk/keycloak-rhel9,rhbk/keycloak-operator-bundle:26.4.10-1,rhbk/keycloak-rhel9-operator:26.4-12,rhbk/keycloak-rhel9:26.4-12,
Package States: Red Hat Build of Keycloak,Red Hat Build of Keycloak,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2025-69725
Severity: moderate
Released on: 19/02/2026
Advisory:
Bugzilla: 2441027
Bugzilla Description: go-chi/chi: Go-chi/chi: Open Redirect vulnerability allows redirection to malicious websites
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-601
Affected Packages:
Package States: External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 8,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Security Profiles Operator,Security Profiles Operator,Security Profiles Operator,Security Profiles Operator,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2026-2708
Severity: low
Released on: 18/02/2026
Advisory:
Bugzilla: 2440743
Bugzilla Description: libsoup: libsoup: HTTP Request Smuggling via Duplicate Content-Length Headers
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-444
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-25500
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440738
Bugzilla Description: rubygem-rack: Rack stored XSS in Rack::Directory
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-79
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-22860
Severity: important
Released on: 18/02/2026
Advisory:
Bugzilla: 2440737
Bugzilla Description: rubygem-rack: Rack Directory Traversal via Rack:Directory
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-14009
Severity: important
Released on: 18/02/2026
Advisory:
Bugzilla: 2440724
Bugzilla Description: nltk: Zip Slip Vulnerability in nltk Leading to Code Execution
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-94
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-27100
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440637
Bugzilla Description: org.jenkins-ci.main/jenkins-core: Jenkins: Information disclosure via unauthorized access to build parameters
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-551
Affected Packages:
Package States: OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,
Full Details
CVE document


CVE-2026-27099
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440638
Bugzilla Description: org.jenkins-ci.main/jenkins-core: Jenkins: Stored Cross-site Scripting (XSS) via unescaped user-provided offline cause description
CVSS Score:
CVSSv3 Score: 4.6
Vector:
CWE: CWE-79
Affected Packages:
Package States: OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,
Full Details
CVE document


CVE-2026-2641
Severity: low
Released on: 18/02/2026
Advisory:
Bugzilla: 2440536
Bugzilla Description: ctags: ctags: Denial of Service due to uncontrolled recursion
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2026-27171
Severity: low
Released on: 18/02/2026
Advisory:
Bugzilla: 2440530
Bugzilla Description: zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-835
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 1.8,Red Hat build of OpenJDK 21,Red Hat build of OpenJDK 25,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-2681
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440580
Bugzilla Description: github.com/supranational/blst: blst cryptographic library: Denial of Service via out-of-bounds stack write in key generation
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-23211
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440614
Bugzilla Description: kernel: mm, swap: restore swap_space attr aviod kernel panic
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-280
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71228
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440615
Bugzilla Description: kernel: LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23218
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440618
Bugzilla Description: kernel: gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23219
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440620
Bugzilla Description: kernel: mm/slab: Add alloc_tagging_slab_free_hook for memcg_alloc_abort_single
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23215
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440621
Bugzilla Description: kernel: x86/vmware: Fix hypercall clobbers
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71225
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440627
Bugzilla Description: kernel: md: suspend array while updating raid_disks via sysfs
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23216
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440630
Bugzilla Description: kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-413
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23214
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440631
Bugzilla Description: kernel: btrfs: reject new transactions if the fs is fully read-only
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23212
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440633
Bugzilla Description: kernel: bonding: annotate data-races around slave->last_rx
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23217
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440634
Bugzilla Description: kernel: riscv: trace: fix snapshot deadlock with sbi ecall
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71227
Severity: low
Released on: 18/02/2026
Advisory:
Bugzilla: 2440641
Bugzilla Description: kernel: wifi: mac80211: don't WARN for connections on invalid channels
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-393
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23213
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440642
Bugzilla Description: kernel: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71226
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440647
Bugzilla Description: kernel: wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71230
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440655
Bugzilla Description: kernel: hfs: ensure sb->s_fs_info is always cleaned up
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71235
Severity: low
Released on: 18/02/2026
Advisory:
Bugzilla: 2440656
Bugzilla Description: kernel: scsi: qla2xxx: Delay module unload while fabric scan in progress
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-364
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23228
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440657
Bugzilla Description: kernel: smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23230
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440658
Bugzilla Description: kernel: Linux kernel: Denial of Service in SMB client due to race condition
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-821
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23220
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440659
Bugzilla Description: kernel: ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71231
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440660
Bugzilla Description: kernel: Linux kernel: Denial of Service due to out-of-bounds index in IAA crypto module
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23224
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440661
Bugzilla Description: kernel: Linux kernel erofs: Denial of Service via Use-After-Free in file-backed directio mounts
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23221
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440662
Bugzilla Description: kernel: bus: fsl-mc: fix use-after-free in driver_override_show()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-663
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71236
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440663
Bugzilla Description: kernel: Linux kernel qla2xxx driver: Denial of Service via NULL pointer dereference during fabric async scan cleanup
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23229
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440664
Bugzilla Description: kernel: Kernel: Denial of Service in virtio-crypto due to missing spinlock protection
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-820
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23222
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440665
Bugzilla Description: kernel: crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71229
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440666
Bugzilla Description: kernel: wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-805
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71233
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440667
Bugzilla Description: kernel: Linux kernel: Denial of Service via NULL pointer dereference in PCI endpoint configfs during asynchronous sub-group creation
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71232
Severity: low
Released on: 18/02/2026
Advisory:
Bugzilla: 2440668
Bugzilla Description: kernel: scsi: qla2xxx: Free sp in error path to fix system crash
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71234
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440669
Bugzilla Description: kernel: wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71237
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440671
Bugzilla Description: kernel: nilfs2: Fix potential block overflow that cause system hang
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23227
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440672
Bugzilla Description: kernel: drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23223
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440674
Bugzilla Description: kernel: xfs: fix UAF in xchk_btree_check_block_owner
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-366
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23226
Severity:
Released on: 18/02/2026
Advisory:
Bugzilla: 2440675
Bugzilla Description: kernel: ksmbd: add chann_lock to protect ksmbd_chann_list xarray
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23225
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440676
Bugzilla Description: kernel: Kernel: Denial of Service and potential memory corruption via mmcid mode switch race condition
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2648
Severity: important
Released on: 18/02/2026
Advisory:
Bugzilla: 2440791
Bugzilla Description: chromium-browser: Heap buffer overflow in PDFium
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2649
Severity: important
Released on: 18/02/2026
Advisory:
Bugzilla: 2440795
Bugzilla Description: chromium-browser: Integer overflow in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2650
Severity: moderate
Released on: 18/02/2026
Advisory:
Bugzilla: 2440808
Bugzilla Description: chromium-browser: Heap buffer overflow in Media
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-24734
Severity: important
Released on: 17/02/2026
Advisory:
Bugzilla: 2440426
Bugzilla Description: tomcat: Apache Tomcat: Certificate revocation bypass due to improper OCSP response validation
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-295
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 6,
Full Details
CVE document


CVE-2026-24733
Severity: low
Released on: 17/02/2026
Advisory:
Bugzilla: 2440437
Bugzilla Description: tomcat: security constraint bypass with HTTP/0.9
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 6,
Full Details
CVE document


CVE-2025-66614
Severity: moderate
Released on: 17/02/2026
Advisory:
Bugzilla: 2440430
Bugzilla Description: tomcat: Client certificate verification bypass due to virtual host mapping
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-1289
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 6,
Full Details
CVE document


CVE-2026-24708
Severity: important
Released on: 17/02/2026
Advisory:
Bugzilla: 2430312
Bugzilla Description: openstack-nova-compute: Arbitrary Host File Overwrite via Unconstrained qemu-img Format Handling in OpenStack Nova
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-73
Affected Packages:
Package States: Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,
Full Details
CVE document


CVE-2026-25087
Severity: moderate
Released on: 17/02/2026
Advisory:
Bugzilla: 2440366
Bugzilla Description: apache-arrow: Apache Arrow C++: Denial of Service via Use After Free vulnerability when reading IPC files
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-2625
Severity: moderate
Released on: 17/02/2026
Advisory:
Bugzilla: 2440357
Bugzilla Description: rust-rpm-sequoia: rust-rpm-sequoia: Denial of Service via crafted RPM file during signature verification
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-347
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2447
Severity: important
Released on: 16/02/2026
Advisory: RHSA-2026:3967, RHSA-2026:5227, RHSA-2026:3984, RHSA-2026:5326, RHSA-2026:5228, RHSA-2026:5229, RHSA-2026:3980, RHSA-2026:4432, RHSA-2026:5323, RHSA-2026:3981, RHSA-2026:3361, RHSA-2026:5324, RHSA-2026:3982, RHSA-2026:3983, RHSA-2026:4152, RHSA-2026:5320, RHSA-2026:3338, RHSA-2026:5319, RHSA-2026:3978, RHSA-2026:3979, RHSA-2026:4629, RHSA-2026:3517, RHSA-2026:4447, RHSA-2026:3516, RHSA-2026:3976, RHSA-2026:3515, RHSA-2026:3339, RHSA-2026:4260, RHSA-2026:3491, RHSA-2026:3495, RHSA-2026:3494, RHSA-2026:3493, RHSA-2026:3492, RHSA-2026:5230, RHSA-2026:5231, RHSA-2026:4022, RHSA-2026:3497, RHSA-2026:3496,
Bugzilla: 2440219
Bugzilla Description: libvpx: Heap buffer overflow in libvpx
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages: libvpx-0:1.14.1-6.el10_1,thunderbird-0:140.8.0-1.el9_0,thunderbird-0:140.8.0-1.el8_6,thunderbird-0:140.8.0-1.el9_6,thunderbird-0:140.8.0-1.el8_8,thunderbird-0:140.8.0-1.el9_7,thunderbird-0:140.8.0-1.el8_2,thunderbird-0:140.8.0-1.el9_2,libvpx-0:1.9.0-9.el9_6.1,thunderbird-0:140.8.0-1.el9_4,libvpx-0:1.3.0-8.el7_9.3,thunderbird-0:140.8.0-1.el8_10,libvpx-0:1.7.0-13.el8_10,firefox-0:140.8.0-2.el8_2,firefox-0:140.8.0-2.el9_0,firefox-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el8_10,libvpx-0:1.7.0-10.el8_8.2,firefox-0:140.8.0-2.el9_2,libvpx-0:1.7.0-10.el8_6.2,libvpx-0:1.7.0-10.el8_4.2,firefox-0:140.8.0-2.el8_6,libvpx-0:1.9.0-10.el9_7,firefox-0:140.8.0-2.el9_4,firefox-0:140.8.0-2.el7_9,firefox-0:140.8.0-2.el8_8,firefox-0:140.8.0-2.el9_7,firefox-0:140.8.0-2.el9_6,firefox-0:140.8.0-2.el10_1,thunderbird-0:140.8.0-2.el8_4,firefox-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_0,thunderbird-0:140.8.0-2.el10_1,libvpx-0:1.7.0-8.el8_2.2,libvpx-0:1.14.1-3.el10_0.1,libvpx-0:1.9.0-7.el9_4.3,libvpx-0:1.9.0-7.el9_2.3,libvpx-0:1.9.0-7.el9_0.3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,
Full Details
CVE document


CVE-2026-2604
Severity: moderate
Released on: 16/02/2026
Advisory:
Bugzilla: 2440301
Bugzilla Description: evolution-data-server: Evolution Data Server: Arbitrary file deletion via inconsistent URI handling
CVSS Score:
CVSSv3 Score: 5.6
Vector:
CWE: CWE-73
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2575
Severity: moderate
Released on: 16/02/2026
Advisory: RHSA-2026:3947, RHSA-2026:3948,
Bugzilla: 2440149
Bugzilla Description: keycloak: Keycloak: Denial of Service due to excessive SAMLRequest decompression
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-409
Affected Packages: rhbk/keycloak-rhel9,rhbk/keycloak-operator-bundle:26.4.10-1,rhbk/keycloak-rhel9-operator:26.4-12,rhbk/keycloak-rhel9:26.4-12,
Package States:
Full Details
CVE document


CVE-2026-2574
Severity: low
Released on: 16/02/2026
Advisory:
Bugzilla: 2440139
Bugzilla Description: glib-networking: glib-networking: Denial of Service and information disclosure via crafted TLS client-CA list
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23114
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439841
Bugzilla Description: kernel: arm64/fpsimd: ptrace: Fix SVE writes on !SME systems
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-371
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23145
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439842
Bugzilla Description: kernel: ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23124
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439843
Bugzilla Description: kernel: Linux kernel: Data race in IPv6 neighbor discovery leads to limited availability
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23137
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439844
Bugzilla Description: kernel: of: unittest: Fix memory leak in unittest_data_add()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23123
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439845
Bugzilla Description: kernel: Linux kernel: Local denial of service in interconnect debugfs due to uninitialized pointers
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-457
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23133
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439846
Bugzilla Description: kernel: Linux kernel: Memory management flaw in ath10k Wi-Fi driver can lead to denial of service
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-763
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23135
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439847
Bugzilla Description: kernel: Kernel: Denial of Service in ath12k wifi driver due to incorrect dma_free_coherent() pointer
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-763
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23121
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439848
Bugzilla Description: kernel: Linux kernel mISDN: Denial of Service via data race
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23127
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439849
Bugzilla Description: kernel: Linux kernel: Privilege escalation or denial of service in perf subsystem
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23120
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439850
Bugzilla Description: kernel: Linux kernel: Denial of Service in L2TP due to data-race during tunnel deletion
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-366
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23143
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439851
Bugzilla Description: kernel: virtio_net: Fix misalignment bug in struct virtnet_info
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-193
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23136
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439852
Bugzilla Description: kernel: Linux kernel: Denial of Service in libceph OSD client due to unreset sparse-read state
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-440
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23116
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439853
Bugzilla Description: kernel: Kernel: Local denial of service via incorrect VPU power management on i.MX8MQ
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23140
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439854
Bugzilla Description: kernel: bpf, test_run: Subtract size of xdp_frame from allowed metadata size
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-457
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23131
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439855
Bugzilla Description: kernel: platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71200
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439856
Bugzilla Description: kernel: mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23122
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439857
Bugzilla Description: kernel: igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23125
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439858
Bugzilla Description: kernel: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71202
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439859
Bugzilla Description: kernel: Linux kernel: Memory Corruption and Kernel Crashes via IOMMU SVA coherency issue
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-909
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23118
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439860
Bugzilla Description: kernel: rxrpc: Fix data-race warning and potential load/store tearing
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-820
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71201
Severity: moderate
Released on: 14/02/2026
Advisory: RHSA-2025:20095,
Bugzilla: 2439861
Bugzilla Description: kernel: netfs: Fix early read unlock of page with EOF in middle
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-826
Affected Packages: kernel-0:6.12.0-124.8.1.el10_1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23134
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439862
Bugzilla Description: kernel: slab: fix kmalloc_nolock() context check for PREEMPT_RT
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23141
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439863
Bugzilla Description: kernel: btrfs: send: check for inline extents in range_is_hole_in_parent()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23126
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439864
Bugzilla Description: kernel: Linux kernel: Denial of Service in netdevsim due to race condition in BPF program list operations
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-820
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23128
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439865
Bugzilla Description: kernel: arm64: Set __nocfi on swsusp_arch_resume()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-354
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23132
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439866
Bugzilla Description: kernel: drm/bridge: synopsys: dw-dp: fix error paths of dw_dp_bind
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23113
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439867
Bugzilla Description: kernel: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23138
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439868
Bugzilla Description: kernel: tracing: Add recursion protection in kernel stack trace recording
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23142
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439869
Bugzilla Description: kernel: mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23130
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439870
Bugzilla Description: kernel: wifi: ath12k: fix dead lock while flushing management frames
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23115
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439871
Bugzilla Description: kernel: serial: Fix not set tty->port race condition
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23144
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439872
Bugzilla Description: kernel: Linux kernel: Local denial of service and memory leak in DAMON sysfs via setup failure
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23119
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439873
Bugzilla Description: kernel: bonding: provide a net pointer to __skb_flow_dissect()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-166
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23139
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439874
Bugzilla Description: kernel: netfilter: nf_conncount: update last_gc only when GC has been performed
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-400
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23117
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439875
Bugzilla Description: kernel: ice: add missing ice_deinit_hw() in devlink reinit path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23129
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439876
Bugzilla Description: kernel: Linux kernel: Denial of Service in DPLL framework due to duplicate pin registrations
CVSS Score:
CVSSv3 Score: 5.6
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23176
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439881
Bugzilla Description: kernel: platform/x86: toshiba_haps: Fix memory leaks in add/remove routines
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23146
Severity: moderate
Released on: 14/02/2026
Advisory: RHSA-2025:20095, RHSA-2025:20518,
Bugzilla: 2439882
Bugzilla Description: kernel: Linux kernel: Denial of Service in Bluetooth HCI UART driver via null pointer dereference
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages: kernel-0:6.12.0-124.8.1.el10_1,kernel-0:5.14.0-611.5.1.el9_7,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23152
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439883
Bugzilla Description: kernel: wifi: mac80211: correctly decode TTLM with default link map
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23180
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439884
Bugzilla Description: kernel: Linux kernel (dpaa2-switch): Out-of-bounds read in IRQ handler due to improper if_id validation
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-1285
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23169
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439885
Bugzilla Description: kernel: Linux kernel: Denial of Service in MPTCP due to a race condition
CVSS Score:
CVSSv3 Score: 5.6
Vector:
CWE: CWE-366
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23171
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439886
Bugzilla Description: kernel: Linux kernel: Use-after-free in bonding module can cause system crash or arbitrary code execution
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23193
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439887
Bugzilla Description: kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-364
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23189
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439888
Bugzilla Description: kernel: ceph: fix NULL pointer dereference in ceph_mds_auth_match()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71222
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439889
Bugzilla Description: kernel: Linux kernel: Denial of Service in wlcore due to insufficient skb headroom
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-124
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23183
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439890
Bugzilla Description: kernel: cgroup/dmem: fix NULL pointer dereference when setting max
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23166
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439891
Bugzilla Description: kernel: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23164
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439892
Bugzilla Description: kernel: Kernel: Memory leak in rocker component leads to denial of service
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23150
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439893
Bugzilla Description: kernel: nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23188
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439894
Bugzilla Description: kernel: Linux kernel: Denial of Service in r8152 USB network adapter driver
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23210
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439895
Bugzilla Description: kernel: Linux kernel: Denial of Service in ice driver due to race condition during VSI rebuild
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23197
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439896
Bugzilla Description: kernel: Linux kernel i2c-imx driver: Denial of Service via invalid I2C block data length handling
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23207
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439897
Bugzilla Description: kernel: spi: tegra210-quad: Protect curr_xfer check in IRQ handler
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23155
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439898
Bugzilla Description: kernel: can: gs_usb: gs_usb_receive_bulk_callback(): fix error message
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23160
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439899
Bugzilla Description: kernel: octeon_ep: Fix memory leak in octep_device_setup()
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23209
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439900
Bugzilla Description: kernel: macvlan: fix error recovery in macvlan_common_newlink()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23194
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439901
Bugzilla Description: kernel: rust_binder: correctly handle FDA objects of length zero
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23200
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439902
Bugzilla Description: kernel: ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-617
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23157
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439903
Bugzilla Description: kernel: btrfs: do not strictly require dirty metadata threshold for metadata writepages
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23148
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439904
Bugzilla Description: kernel: nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23203
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439905
Bugzilla Description: kernel: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23208
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439906
Bugzilla Description: kernel: ALSA: usb-audio: Prevent excessive number of frames
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-805
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23196
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439907
Bugzilla Description: kernel: HID: Intel-thc-hid: Intel-thc: Add safety check for reading DMA buffer
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23202
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439908
Bugzilla Description: kernel: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-364
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71221
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439909
Bugzilla Description: kernel: dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23158
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439910
Bugzilla Description: kernel: gpio: virtuser: fix UAF in configfs release path
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23198
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439911
Bugzilla Description: kernel: KVM: Don't clobber irqfd routing type when deassigning irqfd
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23170
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439912
Bugzilla Description: kernel: drm/imx/tve: fix probe device leak
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23205
Severity: low
Released on: 14/02/2026
Advisory: RHSA-2025:20095, RHSA-2025:20518,
Bugzilla: 2439913
Bugzilla Description: kernel: smb/client: fix memory leak in smb2_open_file()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:6.12.0-124.8.1.el10_1,kernel-0:5.14.0-611.5.1.el9_7,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23178
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439914
Bugzilla Description: kernel: HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23174
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439915
Bugzilla Description: kernel: nvme-pci: handle changing device dma map requirements
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71223
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439916
Bugzilla Description: kernel: smb/server: fix refcount leak in smb2_open()
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23190
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439917
Bugzilla Description: kernel: ASoC: amd: fix memory leak in acp3x pdm dma ops
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23192
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439918
Bugzilla Description: kernel: linkwatch: use __dev_put() in callers to prevent UAF
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23199
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439919
Bugzilla Description: kernel: procfs: avoid fetching build ID while holding VMA lock
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23184
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439920
Bugzilla Description: kernel: binder: fix UAF in binder_netlink_report()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23161
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439921
Bugzilla Description: kernel: mm/shmem, swap: fix race of truncate and swap entry split
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23165
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439922
Bugzilla Description: kernel: sfc: fix deadlock in RSS config read
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-764
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23195
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439923
Bugzilla Description: kernel: cgroup/dmem: avoid pool UAF
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23172
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439924
Bugzilla Description: kernel: net: wwan: t7xx: fix potential skb->frags overflow in RX path
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23185
Severity: important
Released on: 14/02/2026
Advisory:
Bugzilla: 2439925
Bugzilla Description: kernel: wifi: iwlwifi: mld: cancel mlo_scan_start_wk
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23151
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439926
Bugzilla Description: kernel: Linux kernel: Memory leak in Bluetooth MGMT can lead to denial of service
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71204
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439927
Bugzilla Description: kernel: smb/server: fix refcount leak in parse_durable_handle_context()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71224
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439928
Bugzilla Description: kernel: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-166
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23177
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439929
Bugzilla Description: kernel: mm, shmem: prevent infinite loop on truncate race
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71203
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439930
Bugzilla Description: kernel: riscv: Sanitize syscall table indexing under speculation
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23204
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439931
Bugzilla Description: kernel: net/sched: cls_u32: use skb_header_pointer_careful()
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-1285
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23187
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439932
Bugzilla Description: kernel: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-805
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23154
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439933
Bugzilla Description: kernel: net: fix segmentation of forwarding fraglist GRO
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-237
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23181
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439934
Bugzilla Description: kernel: btrfs: sync read disk super and set block size
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23159
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439935
Bugzilla Description: kernel: perf: sched: Fix perf crash with new is_user_task() helper
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23162
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439936
Bugzilla Description: kernel: drm/xe/nvm: Fix double-free on aux add failure
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-1341
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23163
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439937
Bugzilla Description: kernel: drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23182
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439938
Bugzilla Description: kernel: spi: tegra: Fix a memory leak in tegra_slink_probe()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23201
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439939
Bugzilla Description: kernel: ceph: fix oops due to invalid pointer for kfree() in parse_longname()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23147
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439940
Bugzilla Description: kernel: btrfs: zlib: fix the folio leak on S390 hardware acceleration
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23168
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439941
Bugzilla Description: kernel: flex_proportions: make fprop_new_period() hardirq safe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23173
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439942
Bugzilla Description: kernel: net/mlx5e: TC, delete flows only for existing peers
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23206
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439943
Bugzilla Description: kernel: dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-839
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23167
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439944
Bugzilla Description: kernel: nfc: nci: Fix race between rfkill and nci_unregister_device()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23149
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439945
Bugzilla Description: kernel: drm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl()
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-681
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23175
Severity:
Released on: 14/02/2026
Advisory:
Bugzilla: 2439946
Bugzilla Description: kernel: net: cpsw: Execute ndo_set_rx_mode callback in a work queue
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23191
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439947
Bugzilla Description: kernel: ALSA: aloop: Fix racy access at PCM trigger
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23153
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439948
Bugzilla Description: kernel: firewire: core: fix race condition against transaction list
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-366
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23186
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439949
Bugzilla Description: kernel: hwmon: (acpi_power_meter) Fix deadlocks related to acpi_power_meter_notify()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71220
Severity: low
Released on: 14/02/2026
Advisory:
Bugzilla: 2439950
Bugzilla Description: kernel: smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23156
Severity: moderate
Released on: 14/02/2026
Advisory: RHSA-2026:4012,
Bugzilla: 2439951
Bugzilla Description: kernel: Linux kernel: Information disclosure in efivarfs via incorrect error propagation
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-390
Affected Packages: kernel-0:6.12.0-124.43.1.el10_1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23179
Severity: moderate
Released on: 14/02/2026
Advisory:
Bugzilla: 2439952
Bugzilla Description: kernel: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26269
Severity: low
Released on: 13/02/2026
Advisory:
Bugzilla: 2439755
Bugzilla Description: vim: Netbeans specialKeys stack buffer overflow
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-121
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-33042
Severity: moderate
Released on: 13/02/2026
Advisory:
Bugzilla: 2439675
Bugzilla Description: org.apache.avro/avro: Apache Avro Java SDK: Code injection on Java generated code
CVSS Score:
CVSSv3 Score: 5.6
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apicurio Registry 2,Red Hat build of Apicurio Registry 3,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat build of Quarkus,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Single Sign-On 7,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-2443
Severity: low
Released on: 13/02/2026
Advisory:
Bugzilla: 2439671
Bugzilla Description: libsoup: Out-of-Bounds Read in libsoup handle_partial_get() Leading to Heap Information Disclosure
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23112
Severity: moderate
Released on: 13/02/2026
Advisory:
Bugzilla: 2439683
Bugzilla Description: kernel: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23111
Severity: moderate
Released on: 13/02/2026
Advisory:
Bugzilla: 2439687
Bugzilla Description: kernel: Kernel: Privilege escalation or denial of service in nf_tables via inverted element activity check
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-672
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2441
Severity: important
Released on: 13/02/2026
Advisory:
Bugzilla: 2439743
Bugzilla Description: chromium-browser: Use after free in CSS
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-25949
Severity: important
Released on: 12/02/2026
Advisory:
Bugzilla: 2439522
Bugzilla Description: github.com/traefik/traefik: Traefik: Denial of Service via stalled STARTTLS requests
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-2007
Severity: important
Released on: 12/02/2026
Advisory:
Bugzilla: 2439320
Bugzilla Description: postgresql: PostgreSQL pg_trgm heap buffer overflow writes pattern onto server memory
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2006
Severity: important
Released on: 12/02/2026
Advisory: RHSA-2026:4516, RHSA-2026:4518, RHSA-2026:3887, RHSA-2026:4515, RHSA-2026:4074, RHSA-2026:4475, RHSA-2026:4059, RHSA-2026:4075, RHSA-2026:4110, RHSA-2026:4254, RHSA-2026:4505, RHSA-2026:4506, RHSA-2026:4528, RHSA-2026:3896, RHSA-2026:4524, RHSA-2026:4546, RHSA-2026:4547, RHSA-2026:4943, RHSA-2026:4504, RHSA-2026:4548, RHSA-2026:4509, RHSA-2026:4063, RHSA-2026:4024, RHSA-2026:4544, RHSA-2026:4064, RHSA-2026:3730, RHSA-2026:4441,
Bugzilla: 2439324
Bugzilla Description: postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-1285
Affected Packages: postgresql-0:13.23-1.el9_6.1,postgresql:16-9040020260306102041.rhel9,postgresql-0:13.23-1.el9_4.1,postgresql:15-9020020260309133405.rhel9,postgresql:16-8100020260227221401.489197e6,postgresql:13-8060020260309111524.ad008a3a,postgresql:16-9060020260305153549.rhel9,postgresql-0:13.23-1.el9_2.1,postgresql-0:13.23-1.el9_0.1,postgresql:15-9060020260309125703.rhel9,postgresql:13-8100020260227180702.489197e6,postgresql:15-9070020260227094950.rhel9,rhui5/rhua-rhel9:sha256:5f1fbf66fb349a7baf066a1216d39989c3b89f18ec5108b96d9643baf4856778,postgresql-0:13.23-2.el9_7,postgresql:12-8060020260306113941.ad008a3a,postgresql:12-8080020260302123049.63b34585,postgresql:12-8100020260302082007.489197e6,postgresql16-0:16.13-1.el10_1,postgresql:15-8100020260227221316.489197e6,postgresql:13-8080020260302123717.63b34585,postgresql16-0:16.13-1.el10_0,postgresql:12-8020020260309120440.4cda2c84,postgresql:15-9040020260305163703.rhel9,postgresql:13-8040020260305144728.522a0ee4,postgresql:12-8040020260306101701.522a0ee4,postgresql:15-8080020260306092921.63b34585,postgresql:16-9070020260227095951.rhel9,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2005
Severity: important
Released on: 12/02/2026
Advisory: RHSA-2026:4516, RHSA-2026:4518, RHSA-2026:3887, RHSA-2026:4515, RHSA-2026:4074, RHSA-2026:4475, RHSA-2026:4059, RHSA-2026:4075, RHSA-2026:4110, RHSA-2026:4254, RHSA-2026:4505, RHSA-2026:4506, RHSA-2026:4528, RHSA-2026:3896, RHSA-2026:4524, RHSA-2026:4546, RHSA-2026:4547, RHSA-2026:4943, RHSA-2026:4504, RHSA-2026:4548, RHSA-2026:4509, RHSA-2026:4063, RHSA-2026:4024, RHSA-2026:4544, RHSA-2026:4064, RHSA-2026:3730, RHSA-2026:4441,
Bugzilla: 2439326
Bugzilla Description: postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages: postgresql-0:13.23-1.el9_6.1,postgresql:16-9040020260306102041.rhel9,postgresql-0:13.23-1.el9_4.1,postgresql:15-9020020260309133405.rhel9,postgresql:16-8100020260227221401.489197e6,postgresql:13-8060020260309111524.ad008a3a,postgresql:16-9060020260305153549.rhel9,postgresql-0:13.23-1.el9_2.1,postgresql-0:13.23-1.el9_0.1,postgresql:15-9060020260309125703.rhel9,postgresql:13-8100020260227180702.489197e6,postgresql:15-9070020260227094950.rhel9,rhui5/rhua-rhel9:sha256:5f1fbf66fb349a7baf066a1216d39989c3b89f18ec5108b96d9643baf4856778,postgresql-0:13.23-2.el9_7,postgresql:12-8060020260306113941.ad008a3a,postgresql:12-8080020260302123049.63b34585,postgresql:12-8100020260302082007.489197e6,postgresql16-0:16.13-1.el10_1,postgresql:15-8100020260227221316.489197e6,postgresql:13-8080020260302123717.63b34585,postgresql16-0:16.13-1.el10_0,postgresql:12-8020020260309120440.4cda2c84,postgresql:15-9040020260305163703.rhel9,postgresql:13-8040020260305144728.522a0ee4,postgresql:12-8040020260306101701.522a0ee4,postgresql:15-8080020260306092921.63b34585,postgresql:16-9070020260227095951.rhel9,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2004
Severity: important
Released on: 12/02/2026
Advisory: RHSA-2026:4516, RHSA-2026:4518, RHSA-2026:3887, RHSA-2026:4515, RHSA-2026:4074, RHSA-2026:4475, RHSA-2026:4059, RHSA-2026:4075, RHSA-2026:4110, RHSA-2026:4254, RHSA-2026:4505, RHSA-2026:4506, RHSA-2026:4528, RHSA-2026:3896, RHSA-2026:4524, RHSA-2026:4546, RHSA-2026:4547, RHSA-2026:4943, RHSA-2026:4504, RHSA-2026:4548, RHSA-2026:4509, RHSA-2026:4063, RHSA-2026:4024, RHSA-2026:4544, RHSA-2026:4064, RHSA-2026:3730, RHSA-2026:4441,
Bugzilla: 2439325
Bugzilla Description: postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-1287
Affected Packages: postgresql-0:13.23-1.el9_6.1,postgresql:16-9040020260306102041.rhel9,postgresql-0:13.23-1.el9_4.1,postgresql:15-9020020260309133405.rhel9,postgresql:16-8100020260227221401.489197e6,postgresql:13-8060020260309111524.ad008a3a,postgresql:16-9060020260305153549.rhel9,postgresql-0:13.23-1.el9_2.1,postgresql-0:13.23-1.el9_0.1,postgresql:15-9060020260309125703.rhel9,postgresql:13-8100020260227180702.489197e6,postgresql:15-9070020260227094950.rhel9,rhui5/rhua-rhel9:sha256:5f1fbf66fb349a7baf066a1216d39989c3b89f18ec5108b96d9643baf4856778,postgresql-0:13.23-2.el9_7,postgresql:12-8060020260306113941.ad008a3a,postgresql:12-8080020260302123049.63b34585,postgresql:12-8100020260302082007.489197e6,postgresql16-0:16.13-1.el10_1,postgresql:15-8100020260227221316.489197e6,postgresql:13-8080020260302123717.63b34585,postgresql16-0:16.13-1.el10_0,postgresql:12-8020020260309120440.4cda2c84,postgresql:15-9040020260305163703.rhel9,postgresql:13-8040020260305144728.522a0ee4,postgresql:12-8040020260306101701.522a0ee4,postgresql:15-8080020260306092921.63b34585,postgresql:16-9070020260227095951.rhel9,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2026-2003
Severity: moderate
Released on: 12/02/2026
Advisory: RHSA-2026:3896, RHSA-2026:4546, RHSA-2026:3887, RHSA-2026:4547, RHSA-2026:4943, RHSA-2026:4515, RHSA-2026:4548, RHSA-2026:4063, RHSA-2026:4059, RHSA-2026:4544, RHSA-2026:3730, RHSA-2026:4110, RHSA-2026:4441, RHSA-2026:4254,
Bugzilla: 2439322
Bugzilla Description: postgresql: PostgreSQL oidvector discloses a few bytes of memory
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-1287
Affected Packages: rhui5/rhua-rhel9:sha256:5f1fbf66fb349a7baf066a1216d39989c3b89f18ec5108b96d9643baf4856778,postgresql:16-9040020260306102041.rhel9,postgresql-0:13.23-2.el9_7,postgresql:15-9020020260309133405.rhel9,postgresql:16-8100020260227221401.489197e6,postgresql:16-9060020260305153549.rhel9,postgresql:15-9060020260309125703.rhel9,postgresql16-0:16.13-1.el10_1,postgresql:15-8100020260227221316.489197e6,postgresql16-0:16.13-1.el10_0,postgresql:15-9040020260305163703.rhel9,postgresql:15-9070020260227094950.rhel9,postgresql:15-8080020260306092921.63b34585,postgresql:16-9070020260227095951.rhel9,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2025-41117
Severity: moderate
Released on: 12/02/2026
Advisory:
Bugzilla: 2439291
Bugzilla Description: github.com/grafana/grafana: Cross site scripting in Grafana Explore stack trace
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-79
Affected Packages:
Package States: Multicluster Global Hub,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-21722
Severity: moderate
Released on: 12/02/2026
Advisory:
Bugzilla: 2439292
Bugzilla Description: grafana: Public Dashboards time range restriction on annotations can be bypassed
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-200
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2327
Severity: moderate
Released on: 12/02/2026
Advisory:
Bugzilla: 2439272
Bugzilla Description: markdown-it: markdown-it: Denial of Service via Regular Expression Denial of Service in linkify function
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1333
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Developer Hub,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-2391
Severity: moderate
Released on: 12/02/2026
Advisory:
Bugzilla: 2439353
Bugzilla Description: qs: qs's arrayLimit bypass in comma parsing allows denial of service
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-179
Affected Packages:
Package States: Cryostat 4,Cryostat 4,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 8,Node HealthCheck Operator,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat AMQ Broker 7,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Discovery 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-1669
Severity: important
Released on: 11/02/2026
Advisory:
Bugzilla: 2439205
Bugzilla Description: keras: Keras: Information disclosure via arbitrary file read in model loading mechanism
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-73
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-26012
Severity: moderate
Released on: 11/02/2026
Advisory:
Bugzilla: 2439184
Bugzilla Description: vaultwarden: Vaultwarden: Information disclosure due to bypassed collection permissions
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1220
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-26019
Severity: moderate
Released on: 11/02/2026
Advisory:
Bugzilla: 2439181
Bugzilla Description: @langchain/community: @langchain/community SSRF Bypass in RecursiveUrlLoader
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-918
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document


CVE-2026-26014
Severity: moderate
Released on: 11/02/2026
Advisory:
Bugzilla: 2439178
Bugzilla Description: github.com/pion/dtls: Pion DTLS uses random nonce generation with AES GCM ciphers risks leaking the authentication key
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-323
Affected Packages:
Package States: Network Observability Operator,Network Observability Operator,
Full Details
CVE document


CVE-2026-25990
Severity: important
Released on: 11/02/2026
Advisory: RHSA-2026:4128, RHSA-2026:4942, RHSA-2026:3462, RHSA-2026:5168, RHSA-2026:3461, RHSA-2026:5665,
Bugzilla: 2439170
Bugzilla Description: pillow: Pillow: Out-of-bounds Write via Specially Crafted PSD Image
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-787
Affected Packages: rhaiis/vllm-cuda-rhel9:sha256:fa844e16d06e871f1a5dbc2fd5b3882d28112eee8d6bee601d94c96295c5e24f,rhaiis/vllm-rocm-rhel9:sha256:53007894763e03f609c35c727cb738db3c2130b19fa0e1069c24240e0870fb7a,quay/quay-rhel8:sha256:56bcc55b01c76a1eb7ad8b265cf9dfdd488fc62bc353e3822864a0f6c4f98ffb,quay/quay-rhel8:sha256:c0d00643c4ac6f84e5327192a29c6353b5dcac34d483d0a3e5f39d366127fcc2,quay/quay-rhel8:sha256:3e5ce0a56241c9804249dfb302cde02d2ffe30ba8fcd8aef8f1bce916d2324ad,rhaiis/model-opt-cuda-rhel9:sha256:2fd4f343235f7e896a70169fc4b856343d639c65bec77c1883cbd8210caf3a92,
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document


CVE-2020-37178
Severity: important
Released on: 11/02/2026
Advisory:
Bugzilla: 2439128
Bugzilla Description: KeePass: KeePass: Denial of Service via malicious HTML file drag and drop in help system
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-237
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-12474
Severity: low
Released on: 11/02/2026
Advisory:
Bugzilla: 2438978
Bugzilla Description: libjxl: libjxl: Uninitialized memory read in decoder due to incorrect optimization in patch handling
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-1837
Severity: important
Released on: 11/02/2026
Advisory:
Bugzilla: 2438974
Bugzilla Description: libjxl: libjxl: Out-of-bounds write in grayscale color transformation when using LCMS2
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2366
Severity: low
Released on: 11/02/2026
Advisory:
Bugzilla: 2439081
Bugzilla Description: keycloak: Keycloak: Information disclosure via authorization bypass in Admin API
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-639
Affected Packages:
Package States: Red Hat Build of Keycloak,
Full Details
CVE document


CVE-2026-2369
Severity: moderate
Released on: 11/02/2026
Advisory:
Bugzilla: 2439091
Bugzilla Description: libsoup: libsoup: Buffer overread due to integer underflow when handling zero-length resources
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-191
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26079
Severity: moderate
Released on: 11/02/2026
Advisory:
Bugzilla: 2438807
Bugzilla Description: roundcubemail: Roundcube Webmail: Cascading Style Sheets (CSS) injection via mishandled comments
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-79
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-26157
Severity: important
Released on: 11/02/2026
Advisory:
Bugzilla: 2439039
Bugzilla Description: busybox: BusyBox: Arbitrary file overwrite and potential code execution via incomplete path sanitization
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-73
Affected Packages:
Package States: Red Hat Enterprise Linux 6,
Full Details
CVE document


CVE-2026-26158
Severity: important
Released on: 11/02/2026
Advisory:
Bugzilla: 2439040
Bugzilla Description: busybox: BusyBox: Arbitrary file modification and privilege escalation via unvalidated tar archive entries
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-73
Affected Packages:
Package States: Red Hat Enterprise Linux 6,
Full Details
CVE document


CVE-2025-69872
Severity: important
Released on: 11/02/2026
Advisory: RHSA-2026:3713,
Bugzilla: 2439059
Bugzilla Description: python-diskcache: python-diskcache: Arbitrary code execution via insecure pickle deserialization
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-502
Affected Packages: rhoai/odh-kserve-agent-rhel9:sha256:1f2995ee9de8b0dd7e45fc26dcef5f5a7a2e38b2e564ab3e6460c4af76e22e82,
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Satellite 6,
Full Details
CVE document


CVE-2025-69873
Severity: important
Released on: 11/02/2026
Advisory: RHSA-2026:5168,
Bugzilla: 2439070
Bugzilla Description: ajv: ReDoS via $data reference
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1333
Affected Packages: quay/quay-rhel8:sha256:3e5ce0a56241c9804249dfb302cde02d2ffe30ba8fcd8aef8f1bce916d2324ad,
Package States: Confidential Compute Attestation,Cryostat 4,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Multicluster Engine for Kubernetes,Network Observability Operator,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat AMQ Broker 7,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Connectivity Link 1,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Directory Server 11,Red Hat Directory Server 12,Red Hat Directory Server 13,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-2436
Severity: moderate
Released on: 11/02/2026
Advisory:
Bugzilla: 2442909
Bugzilla Description: libsoup: libsoup: Denial of Service via use-after-free in SoupServer during TLS handshake
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-26013
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2438772
Bugzilla Description: langchain: SSRF via image_url token counting in ChatOpenAI.get_num_tokens_from_messages
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-918
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-26007
Severity: important
Released on: 10/02/2026
Advisory: RHSA-2026:5168, RHSA-2026:5665, RHSA-2026:2694,
Bugzilla: 2438762
Bugzilla Description: cryptography: cryptography Subgroup Attack Due to Missing Subgroup Validation for SECT Curves
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-354
Affected Packages: quay/quay-rhel8:sha256:c0d00643c4ac6f84e5327192a29c6353b5dcac34d483d0a3e5f39d366127fcc2,discovery/discovery-server-rhel9:sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8,quay/quay-rhel8:sha256:3e5ce0a56241c9804249dfb302cde02d2ffe30ba8fcd8aef8f1bce916d2324ad,
Package States: OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-25506
Severity: important
Released on: 10/02/2026
Advisory: RHSA-2026:2934, RHSA-2026:2923, RHSA-2026:2954, RHSA-2026:3033, RHSA-2026:3011, RHSA-2026:3032, RHSA-2026:3010, RHSA-2026:2949, RHSA-2026:3013, RHSA-2026:3012, RHSA-2026:3034, RHSA-2026:2918,
Bugzilla: 2438715
Bugzilla Description: MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery
CVSS Score:
CVSSv3 Score: 7.7
Vector:
CWE: CWE-120
Affected Packages: munge-0:0.5.13-14.el9_7,munge-0:0.5.13-13.el9_0.1,munge-0:0.5.13-13.el9_2.1,munge-0:0.5.15-10.el10_0.1,munge-0:0.5.13-13.el9_4.1,munge-0:0.5.13-3.el8_10,munge-0:0.5.13-1.el8_2.1,munge-0:0.5.13-2.el8_6.1,munge-0:0.5.13-13.el9_6.1,munge-0:0.5.15-11.el10_1,munge-0:0.5.13-2.el8_8.1,munge-0:0.5.13-2.el8_4.1,
Package States:
Full Details
CVE document


CVE-2025-14821
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2423148
Bugzilla Description: libssh: libssh: Insecure default configuration leads to local man-in-the-middle attacks on Windows
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-427
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-0965
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2436980
Bugzilla Description: libssh: libssh: Denial of Service via improper configuration file handling
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-73
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-0966
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2433121
Bugzilla Description: libssh: Buffer underflow in ssh_get_hexa() on invalid input
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-124
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-0967
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2436981
Bugzilla Description: libssh: libssh: Denial of Service via inefficient regular expression processing
CVSS Score:
CVSSv3 Score: 2.2
Vector:
CWE: CWE-1333
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-0968
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2436982
Bugzilla Description: libssh: libssh: Denial of Service due to malformed SFTP message
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-0964
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2436979
Bugzilla Description: libssh: Improper sanitation of paths received from SCP servers
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-25646
Severity: important
Released on: 10/02/2026
Advisory: RHSA-2026:5606, RHSA-2026:3968, RHSA-2026:3577, RHSA-2026:4728, RHSA-2026:3969, RHSA-2026:4732, RHSA-2026:4501, RHSA-2026:4756, RHSA-2026:4306, RHSA-2026:3405, RHSA-2026:4729, RHSA-2026:4222, RHSA-2026:4730, RHSA-2026:3031, RHSA-2026:4731, RHSA-2026:3576, RHSA-2026:3575, RHSA-2026:3574, RHSA-2026:3551, RHSA-2026:3573, RHSA-2026:4221,
Bugzilla: 2438542
Bugzilla Description: libpng: LIBPNG has a heap buffer overflow in png_set_quantize
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-125
Affected Packages: libpng-2:1.5.13-8.el7_9.2,libpng-2:1.6.37-12.el9_0.2,libpng-2:1.6.37-12.el9_2.2,libpng-2:1.6.34-8.el8_4.2,discovery/discovery-ui-rhel9:sha256:d167d7926b4a9e7bb51cab5108ad3e826a3ae826536924e8d4129f826c6c5de5,libpng-2:1.6.40-8.el10_0.2,libpng-2:1.6.34-8.el8_6.2,libpng-2:1.6.40-8.el10_1.2,libpng-2:1.6.34-8.el8_2.2,rhceph/rhceph-8-rhel9:sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414,mingw-libpng-0:1.6.34-2.el8_10,libpng-2:1.6.34-8.el8_8.2,libpng15-0:1.5.30-14.el9_0.1,libpng15-0:1.5.30-14.el9_2.1,libpng-2:1.6.37-12.el9_4.2,libpng15-0:1.5.30-14.el9_4.1,libpng-2:1.6.37-12.el9_7.2,libpng-2:1.6.37-12.el9_6.2,libpng15-0:1.5.30-14.el9_6.1,libpng15-0:1.5.30-14.el9_7.1,libpng-2:1.6.34-10.el8_10,
Package States: Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 1.8,Red Hat build of OpenJDK 21,Red Hat build of OpenJDK 25,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-35998
Severity: important
Released on: 10/02/2026
Advisory:
Bugzilla: 2438523
Bugzilla Description: Intel (R): From CVEorg collector
CVSS Score:
CVSSv3 Score: 7.9
Vector:
CWE: CWE-1220
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-31648
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2438510
Bugzilla Description: microcode_ctl: From CVEorg collector
CVSS Score:
CVSSv3 Score: 2.5
Vector:
CWE: CWE-229
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23901
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2438436
Bugzilla Description: org.apache.shiro/shiro-core: Apache Shiro: Brute force attack possible to determine valid user names
CVSS Score:
CVSSv3 Score: 2.9
Vector:
CWE: CWE-208
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-2272
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2438428
Bugzilla Description: gimp: GIMP: Memory corruption due to integer overflow in ICO file handling
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2271
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2438429
Bugzilla Description: gimp: GIMP: Denial of service via crafted PSP image file
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-2319
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2439055
Bugzilla Description: chromium-browser: Race in DevTools
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2320
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2439062
Bugzilla Description: chromium-browser: Inappropriate implementation in File input
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2322
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2439064
Bugzilla Description: chromium-browser: Inappropriate implementation in File input
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2318
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2439067
Bugzilla Description: chromium-browser: Inappropriate implementation in PictureInPicture
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2323
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2439068
Bugzilla Description: chromium-browser: Inappropriate implementation in Downloads
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2313
Severity: important
Released on: 10/02/2026
Advisory:
Bugzilla: 2439069
Bugzilla Description: chromium-browser: Use after free in CSS
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2315
Severity: important
Released on: 10/02/2026
Advisory:
Bugzilla: 2439071
Bugzilla Description: chromium-browser: Inappropriate implementation in WebGPU
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2316
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2439072
Bugzilla Description: chromium-browser: Insufficient policy enforcement in Frames
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2317
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2439073
Bugzilla Description: chromium-browser: Inappropriate implementation in Animation
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2321
Severity: moderate
Released on: 10/02/2026
Advisory:
Bugzilla: 2439074
Bugzilla Description: chromium-browser: Use after free in Ozone
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2314
Severity: important
Released on: 10/02/2026
Advisory:
Bugzilla: 2439076
Bugzilla Description: chromium-browser: Heap buffer overflow in Codecs
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2243
Severity: low
Released on: 10/02/2026
Advisory:
Bugzilla: 2440934
Bugzilla Description: qemu-kvm: Heap buffer out-of-bounds read in VMDK compressed grain parsing
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-25934
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438332
Bugzilla Description: go-git/go-git: go-git: Data integrity issue due to improper verification of pack and index files
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-354
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Confidential Compute Attestation,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Kernel Module Management Operator for Red Hat Openshift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Machine Deletion Remediation Operator,Machine Deletion Remediation Operator,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Network Observability Operator,Node HealthCheck Operator,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 3,Pen Drive Powered by Red Hat Lightspeed,Power monitoring for Red Hat OpenShift,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Build of Kueue,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2026-25765
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438241
Bugzilla Description: Faraday: Faraday: Server-Side Request Forgery via protocol-relative URLs
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-1289
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-25639
Severity: important
Released on: 09/02/2026
Advisory: RHSA-2026:3107, RHSA-2026:3106, RHSA-2026:3105, RHSA-2026:5174, RHSA-2026:4942, RHSA-2026:5636, RHSA-2026:3109, RHSA-2026:5168, RHSA-2026:3087, RHSA-2026:5665, RHSA-2026:5633, RHSA-2026:2694,
Bugzilla: 2438237
Bugzilla Description: axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1287
Affected Packages: openshift-service-mesh/kiali-ossmc-rhel9:sha256:8017912e8032510d47f667b8d17ddff6ff5a84576df2d484d09a6b0747454c4e,openshift-service-mesh/kiali-rhel8:sha256:e2f969be38741ff30e476e3a8f70eb60a3d030dcebcdb303269f39997c4acdf4,openshift4/ose-monitoring-plugin-rhel9:sha256:33db1ea4989248c3760120da28f516110c25bec461090bed2b200505b3357470,rhacm2/console-rhel9:sha256:0d6238ef864831d455a4a4b86d860469443079f6dcd26ce3b4fe546800565844,rhtas/rhtas-console-ui-rhel9:sha256:e7ee88dd498d337304db3d90f4f352e55114475dbc9d75c3b18a49a249492b1e,openshift-service-mesh/kiali-ossmc-rhel9:sha256:38243f02786d10064768d4355d8ba80eb5c0892c912730682c58c6b259629a98,quay/quay-rhel8:sha256:dd567423c854e8732542c41bfcda71948517762f8e91e31496e7dffa67b3c8c0,multicluster-engine/console-mce-rhel9:sha256:8aaa0f89e8e6ad810632240a7e032b6e673f69e1e4018ab6b36dd87de69ceeb8,discovery/discovery-ui-rhel9:sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4,quay/quay-rhel8:sha256:6e13793ca8f309ec0b69ae609b840ff0f41989d88cd4bba127e1b0040631367e,openshift-service-mesh/kiali-ossmc-rhel9:sha256:61a42cd27a26463b5ad014ad66b35e69b37c3d58fcaa2f5155dadee1e605e4bc,openshift-service-mesh/kiali-rhel9:sha256:5dc63a919b903103abba9331290438bb13864ae629078e0a698b23b57e0d7aa4,quay/quay-rhel8:sha256:56bcc55b01c76a1eb7ad8b265cf9dfdd488fc62bc353e3822864a0f6c4f98ffb,openshift-service-mesh/kiali-rhel9:sha256:b28e264e46083f9004963e1ccebe25c01d9084d1c8489f3333c0eed2ea64ca35,openshift-service-mesh/kiali-rhel9:sha256:8af3bb4095fbc3fbf144e27cc7cd77dc37fa018f72fd6b4fbaa0280cc468b93a,openshift-service-mesh/kiali-ossmc-rhel8:sha256:fcd8354b6a8282be890ab266e8ba84011f495f89f00a354e487cf09c73e4f6f5,
Package States: Cryostat 4,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Network Observability Operator,Network Observability Operator,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat Build of Kueue,Red Hat Build of Kueue,Red Hat Build of Kueue,Red Hat Build of Kueue,Red Hat Build of Podman Desktop - Tech Preview,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Profile Analyzer,Self-service automation portal 2,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-1609
Severity: important
Released on: 09/02/2026
Advisory:
Bugzilla: 2435257
Bugzilla Description: org.keycloak/keycloak-quarkus-server: Keycloak: Unauthorized Access via JWT authorization grant with disabled users
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-284
Affected Packages:
Package States: Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-25598
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438198
Bugzilla Description: harden-runner: Harden-Runner: Outbound network connections can evade audit logging via specific socket system calls.
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-778
Affected Packages:
Package States: External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Gatekeeper 3,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,
Full Details
CVE document


CVE-2025-14778
Severity: moderate
Released on: 09/02/2026
Advisory: RHSA-2026:2366, RHSA-2026:2365, RHSA-2026:2364, RHSA-2026:2363,
Bugzilla: 2422600
Bugzilla Description: keycloak: Incorrect ownership checks in /uma-policy/
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-266
Affected Packages: rhbk/keycloak-rhel9-operator,rhbk/keycloak-operator-bundle:26.2.13-1,rhbk/keycloak-operator-bundle:26.4.9-1,rhbk/keycloak-rhel9-operator:26.4-10,rhbk/keycloak-rhel9:26.2-15,rhbk/keycloak-rhel9:26.4-11,rhbk/keycloak-rhel9-operator:26.2-15,
Package States:
Full Details
CVE document


CVE-2026-24684
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438208
Bugzilla Description: freerdp: FreeRDP has a Heap-use-after-free in play_thread
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-1486
Severity: important
Released on: 09/02/2026
Advisory: RHSA-2026:2366, RHSA-2026:2365,
Bugzilla: 2433347
Bugzilla Description: org.keycloak.protocol.oidc.grants: Disabled identity providers are still accepted for JWT Authorization Grant
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-358
Affected Packages: rhbk/keycloak-rhel9,rhbk/keycloak-operator-bundle:26.4.9-1,rhbk/keycloak-rhel9-operator:26.4-10,rhbk/keycloak-rhel9:26.4-11,
Package States:
Full Details
CVE document


CVE-2026-24683
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438216
Bugzilla Description: freerdp: FreeRDP has a heap-use-after-free in ainput_send_input_event
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-24682
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438212
Bugzilla Description: freerdp: FreeRDP has a Heap-buffer-overflow in audio_formats_free
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-1529
Severity: important
Released on: 09/02/2026
Advisory: RHSA-2026:2366, RHSA-2026:2365, RHSA-2026:2364, RHSA-2026:2363,
Bugzilla: 2433783
Bugzilla Description: org.keycloak.services.resources.organizations: Keycloak: Unauthorized organization registration via improper invitation token validation
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-347
Affected Packages: rhbk/keycloak-rhel9,rhbk/keycloak-operator-bundle:26.2.13-1,rhbk/keycloak-operator-bundle:26.4.9-1,rhbk/keycloak-rhel9-operator:26.4-10,rhbk/keycloak-rhel9:26.2-15,rhbk/keycloak-rhel9:26.4-11,rhbk/keycloak-rhel9-operator:26.2-15,
Package States:
Full Details
CVE document


CVE-2026-24681
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438210
Bugzilla Description: freerdp: FreeRDP has a heap-use-after-free in urb_bulk_transfer_cb
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-24680
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438209
Bugzilla Description: freerdp: FreeRDP has a heap-use-after-free in update_pointer_new(SDL)
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-24679
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438217
Bugzilla Description: freerdp: FreeRDP has a heap-buffer-overflow in urb_select_interface
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-1285
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-24678
Severity: important
Released on: 09/02/2026
Advisory: RHSA-2026:3068, RHSA-2026:4121,
Bugzilla: 2438197
Bugzilla Description: freerdp: FreeRDP: Denial of Service via use after free in ecam_channel_write
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages: freerdp-2:3.10.3-5.el10_1.2,freerdp-2:3.10.3-3.el10_0.2,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-24677
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438206
Bugzilla Description: freerdp: FreeRDP has a heap-buffer-overflow in ecam_encoder_compress_h264
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-24676
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438201
Bugzilla Description: freerdp: FreeRDP: Denial of Service via use-after-free in AUDIN format renegotiation
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-24675
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438221
Bugzilla Description: freerdp: FreeRDP has a Heap-use-after-free in urb_select_interface
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-24491
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438202
Bugzilla Description: freerdp: FreeRDP has a heap-use-after-free in video_timer
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23948
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2438207
Bugzilla Description: freerdp: FreeRDP has a NULL Pointer Dereference in rdp_write_logon_info_v2()
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-66630
Severity: important
Released on: 09/02/2026
Advisory:
Bugzilla: 2438199
Bugzilla Description: github.com/gofiber/fiber/v2: Fiber: Predictable UUIDs from randomness source errors can lead to security bypasses
CVSS Score:
CVSSv3 Score: 7.7
Vector:
CWE: CWE-331
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-14831
Severity: moderate
Released on: 09/02/2026
Advisory: RHSA-2026:5606, RHSA-2026:4655, RHSA-2026:4943, RHSA-2026:3477, RHSA-2026:5585, RHSA-2026:4188,
Bugzilla: 2423177
Bugzilla Description: gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-407
Affected Packages: rhui5/rhua-rhel9:sha256:5f1fbf66fb349a7baf066a1216d39989c3b89f18ec5108b96d9643baf4856778,rhui5/installer-rhel9:sha256:2c50c87906a1abebf427a70f401c409f1258cb55d2096f517db870ec991cfd7f,insights-proxy/insights-proxy-container-rhel9:sha256:325c34e2506d715975171557d40afb449c79cf6e0c41b35760977d5cafb827b8,gnutls-0:3.8.3-10.el9_7,rhui5/haproxy-rhel9:sha256:d98fd3fe5f5f9acd0efae7db19b61b864be1eb2fbe2586a1b6be2429fa2cc7a3,rhui5/cds-rhel9:sha256:200c27e9b396276bd505c6b41127ac5eb1d94d620172cb818ae733f2a21ac524,rhceph/rhceph-8-rhel9:sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1,gnutls-0:3.8.10-3.el10_1,gnutls-0:3.6.16-8.el8_10.5,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-23903
Severity: moderate
Released on: 09/02/2026
Advisory:
Bugzilla: 2437850
Bugzilla Description: org.apache.shiro/shiro-web: Apache Shiro: Auth bypass when accessing static files only on case-insensitive filesystems
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-289
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2026-2239
Severity: low
Released on: 09/02/2026
Advisory:
Bugzilla: 2437675
Bugzilla Description: gimp: GIMP: Application crash (DoS) via crafted PSD file due to heap-buffer-overflow
CVSS Score:
CVSSv3 Score: 2.8
Vector:
CWE: CWE-170
Affected Packages:
Package States: Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-1615
Severity: important
Released on: 09/02/2026
Advisory:
Bugzilla: 2437875
Bugzilla Description: jsonpath: jsonpath: Arbitrary Code Execution via unsafe JSON Path expression evaluation
CVSS Score:
CVSSv3 Score: 9.8
Vector:
CWE: CWE-94
Affected Packages:
Package States: Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Developer Hub,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Quay 3,Self-service automation portal 2,
Full Details
CVE document


CVE-2026-1584
Severity: important
Released on: 09/02/2026
Advisory:
Bugzilla: 2435258
Bugzilla Description: gnutls: gnutls: Remote Denial of Service via crafted ClientHello with invalid PSK binder
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-25793
Severity: important
Released on: 06/02/2026
Advisory:
Bugzilla: 2437914
Bugzilla Description: nebula: Nebula: Blocklist evasion via ECDSA Signature Malleability
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-347
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-25749
Severity: moderate
Released on: 06/02/2026
Advisory: RHSA-2026:4715, RHSA-2026:5602, RHSA-2026:4442,
Bugzilla: 2437843
Bugzilla Description: vim: Vim: Arbitrary code execution via 'helpfile' option processing
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-120
Affected Packages: vim-2:8.0.1763-22.el8_10,vim-2:9.1.083-6.el10_1.1,vim-2:8.2.2637-23.el9_7.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-25580
Severity: important
Released on: 06/02/2026
Advisory:
Bugzilla: 2437781
Bugzilla Description: Pydantic AI: Pydantic AI: Information disclosure via Server-Side Request Forgery (SSRF) through malicious URLs in message history.
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-918
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document


CVE-2026-25731
Severity: important
Released on: 06/02/2026
Advisory:
Bugzilla: 2437917
Bugzilla Description: calibre: Calibre: Arbitrary Code Execution via malicious custom template file during ebook conversion
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-917
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-25635
Severity: important
Released on: 06/02/2026
Advisory:
Bugzilla: 2437936
Bugzilla Description: calibre: Calibre: Remote Code Execution via path traversal in CHM reader
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-25636
Severity: important
Released on: 06/02/2026
Advisory:
Bugzilla: 2437730
Bugzilla Description: calibre: Calibre: Arbitrary file corruption via path traversal in EPUB conversion
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-25640
Severity: important
Released on: 06/02/2026
Advisory:
Bugzilla: 2437753
Bugzilla Description: Pydantic AI: Pydantic AI: Arbitrary code execution and information disclosure via path traversal in web UI
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document


CVE-2026-25727
Severity: moderate
Released on: 06/02/2026
Advisory:
Bugzilla: 2437727
Bugzilla Description: time: time affected by a stack exhaustion denial of service attack
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-770
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Lightspeed Core,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,OpenShift Lightspeed,Pen Drive Powered by Red Hat Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Ansible Automation Platform Ansible Core 2,Red Hat Connectivity Link 1,Red Hat Discovery 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Update Service,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2026-24851
Severity: moderate
Released on: 06/02/2026
Advisory:
Bugzilla: 2437860
Bugzilla Description: github.com/openfga/openfga: OpenFGA Improper Policy Enforcement
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-1220
Affected Packages:
Package States: Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,
Full Details
CVE document


CVE-2026-1709
Severity: critical
Released on: 06/02/2026
Advisory: RHSA-2026:2225, RHSA-2026:2224, RHSA-2026:2298,
Bugzilla: 2435514
Bugzilla Description: keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication
CVSS Score:
CVSSv3 Score: 9.4
Vector:
CWE: CWE-322
Affected Packages: keylime-0:7.12.1-11.el10_1.4,keylime-0:7.12.1-11.el9_7.4,keylime-0:7.12.1-2.el10_0.5,
Package States:
Full Details
CVE document


CVE-2026-23740
Severity: important
Released on: 06/02/2026
Advisory:
Bugzilla: 2437723
Bugzilla Description: Asterisk: Asterisk: Arbitrary code execution and file overwrite as root via insecure ast_coredumper file handling
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-379
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-23739
Severity: low
Released on: 06/02/2026
Advisory:
Bugzilla: 2437909
Bugzilla Description: Asterisk: Asterisk: Local file disclosure via unsafe XML parsing
CVSS Score:
CVSSv3 Score: 2.0
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-25556
Severity: moderate
Released on: 06/02/2026
Advisory:
Bugzilla: 2437835
Bugzilla Description: MuPDF: MuPDF: Denial of Service via crafted input during barcode decoding
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-763
Affected Packages:
Package States:
Full Details
CVE document


CVE-2026-2100
Severity: moderate
Released on: 06/02/2026
Advisory:
Bugzilla: 2437308
Bugzilla Description: p11-kit: p11-kit: NULL dereference via C_DeriveKey with specific NULL parameters
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2026-0598
Severity: moderate
Released on: 06/02/2026
Advisory:
Bugzilla: 2427094
Bugzilla Description: ansible-lightspeed: Broken Object Level Authorization Leading to Cross-User AI Conversation Context Injection in Ansible Lightspeed API
CVSS Score:
CVSSv3 Score: 4.2
Vector:
CWE: CWE-283
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2025-68157
Severity: low
Released on: 05/02/2026
Advisory:
Bugzilla: 2437210
Bugzilla Description: webpack: webpack buildHttp HttpUriPlugin allowedUris bypass via HTTP redirects
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-918
Affected Packages:
Package States: Cryostat 4,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Self-service automation portal 2,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2025-68458
Severity: low
Released on: 05/02/2026
Advisory:
Bugzilla: 2437209
Bugzilla Description: webpack: webpack buildHttp: allowedUris allow-list bypass via URL userinfo (@) leading to build-time SSRF behavior
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-918
Affected Packages:
Package States: Cryostat 4,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node HealthCheck Operator,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Self-service automation portal 2,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2025-47911
Severity: moderate
Released on: 05/02/2026
Advisory:
Bugzilla: 2437109
Bugzilla Description: golang.org/x/net/html: Quadratic parsing complexity in golang.org/x/net/html
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-400
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Compliance Operator,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Cryostat 4,Cryostat 4,Cryostat 4,Cryostat 4,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,External Secrets Operator for Red Hat OpenShift,Fence Agents Remediation Operator,Fence Agents Remediation Operator,File Integrity Operator,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Developer Hub,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Lightspeed for Runtimes Operator,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Satellite 6,Red Hat Service Interconnect 2,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2025-58190
Severity: moderate
Released on: 05/02/2026
Advisory: RHSA-2026:2571,
Bugzilla: 2437110
Bugzilla Description: golang.org/x/net/html: Infinite parsing loop in golang.org/x/net
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-835
Affected Packages: multicluster-engine/hive-rhel9:sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb,
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Compliance Operator,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,External Secrets Operator for Red Hat OpenShift,File Integrity Operator,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Containers,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Serverless,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Developer Hub,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Lightspeed for Runtimes Operator,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Satellite 6,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2025-68121
Severity: moderate
Released on: 05/02/2026
Advisory: RHSA-2026:4952, RHSA-2026:5645, RHSA-2026:3864, RHSA-2026:3506, RHSA-2026:3985, RHSA-2026:5129, RHSA-2026:4270, RHSA-2026:3187, RHSA-2026:3341, RHSA-2026:3782, RHSA-2026:5168, RHSA-2026:3186, RHSA-2026:3340, RHSA-2026:3343, RHSA-2026:3188, RHSA-2026:4672, RHSA-2026:3977, RHSA-2026:2920, RHSA-2026:4901, RHSA-2026:3459, RHSA-2026:3337, RHSA-2026:3336, RHSA-2026:4942, RHSA-2026:3898, RHSA-2026:5636, RHSA-2026:3855, RHSA-2026:3816, RHSA-2026:3817, RHSA-2026:4907, RHSA-2026:5394, RHSA-2026:3291, RHSA-2026:3092, RHSA-2026:3297, RHSA-2026:3970, RHSA-2026:4267, RHSA-2026:3971, RHSA-2026:4466, RHSA-2026:4500, RHSA-2026:5077, RHSA-2026:5110, RHSA-2026:4264, RHSA-2026:4220, RHSA-2026:3298, RHSA-2026:3842, RHSA-2026:3843, RHSA-2026:5549, RHSA-2026:2914, RHSA-2026:3928, RHSA-2026:3929, RHSA-2026:4170, RHSA-2026:3040, RHSA-2026:5146, RHSA-2026:4256, RHSA-2026:4498, RHSA-2026:5665, RHSA-2026:3840, RHSA-2026:3884, RHSA-2026:4174, RHSA-2026:4892, RHSA-2026:4177, RHSA-2026:3089, RHSA-2026:3556, RHSA-2026:3753, RHSA-2026:3874, RHSA-2026:3831, RHSA-2026:3833, RHSA-2026:3559, RHSA-2026:2708, RHSA-2026:2706, RHSA-2026:3839, RHSA-2026:2709, RHSA-2026:5130, RHSA-2026:3193, RHSA-2026:3192, RHSA-2026:3752, RHSA-2026:5131, RHSA-2026:4164, RHSA-2026:5132, RHSA-2026:3035, RHSA-2026:5133, RHSA-2026:5452, RHSA-2026:4166,
Bugzilla: 2437111
Bugzilla Description: crypto/tls: Unexpected session resumption in crypto/tls
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE:
Affected Packages: openshift4/ose-agent-installer-node-agent-rhel9:sha256:2ad3be815abfa60205bc0de77557f8bfc6ee8b80e3d25ee9cd1088a5e3f6bf8d,rhc-1:0.2.7-2.el9_7,grafana-0:9.2.10-28.el8_10,openshift4/ose-cluster-node-tuning-rhel9-operator:sha256:df01b29e279c5fef750737c48041bfb4ef531599fa6ce556987ecdfbf8eb6767,openshift4/ose-monitoring-plugin-rhel9:sha256:3dd9ca3b6c119ebeeb38e5529407f1889ce2c06c11f15bbdb38955caf2a3a44d,openshift4/ose-machine-api-rhel9-operator:sha256:c8dd2c2cc351300aecd856351099e39d225e4ca22e952f2c0dfc3e96e8d3006e,openshift4/ose-console-rhel9-operator:sha256:0bb318828b87e7fd8771289955dacb1c1d2efb2fbb7247f126e4910555fb2405,openshift4/ose-operator-framework-tools-rhel9:sha256:c34e3b2772aa6329401c1dffa8316d3516368cfaa095a9cba95628bd9ad2a7d0,openshift4/ose-csi-livenessprobe-rhel9:sha256:78976f244a2a7101390df281688f339864f3e7eda6531df18225022c768ca0b3,openshift4/ose-csi-external-snapshot-metadata-rhel9:sha256:1560bc58a43485387fda173fe0a8a396c2f6b038202bd9863c85d1b666f3ddc1,openshift4/ose-gcp-cluster-api-controllers-rhel9:sha256:4f474f91da6fa969938f67a7b254f6e34e6ed2d8ca38e4de4d7c190328c65352,openshift4/ose-cluster-config-api-rhel9:sha256:99e65563c13b1a6d3e64f79ab6491b21106b3d46ef75ade4829c33cb97100ae1,openshift4/kubevirt-csi-driver-rhel9:sha256:b9cf1116ad028c8b358eb013d9751aec24eda566a74325123ce18c10bade1e13,openshift-service-mesh/kiali-rhel9:sha256:8a0cd7af8acc148468fe8ac718e0d80687e6c59372f0e3f87393a72482fc1277,openshift4/ose-cluster-capi-rhel9-operator:sha256:5383f749ae80a70b6bac223d5c3ce9b70d58de06c031a57b02ea5510f4cf2e31,podman-7:5.6.0-12.el10_1,openshift4/ose-azure-cluster-api-controllers-rhel9:sha256:39f7c7176125c49d751b48b42dd9dbd62a4a315e40994a02a747a46db8cc860a,openshift4/ose-cli-artifacts-rhel9:sha256:cce4806b40fd1f040da28b0a76e8f7edb45e5e3b68fcdbd1ffec407f8b5d40a4,openshift4/ose-multus-whereabouts-ipam-cni-rhel9:sha256:c20df9f23d90cb585878aeb06e921741267b98a7b078ba494f6dbcdde2156020,openshift4/ose-operator-framework-tools-rhel9:sha256:8b46084314308de19d55ad4d00969903bb237f779d689524a8d85ad25a9b5fb1,openshift4/ose-csi-driver-manila-rhel9-operator:sha256:8a0bf468fd716a6323eff09954a3b657d7c972c82db37e1c25ec90363c81c845,openshift4/ose-cluster-api-rhel9:sha256:47e721205ff64d2cd94f17a704c315ab4f48601dc446c6fdbf6d0651af0e282f,git-lfs-0:3.6.1-7.el9_7,openshift4/insights-runtime-extractor-rhel9:sha256:12521bfd441d9b3db4d86a4f0d1c2818064ecc152bb9d78cfdad35652f173703,openshift4/ose-ibm-vpc-block-csi-driver-rhel9-operator:sha256:348bfab8b43715c5b79610c50bd7a8c383bd7e0d404fe26ad3745d803fdaf339,openshift4/ose-csi-external-provisioner-rhel9:sha256:f1fdf87492d66f03cbca16cbdb07607481041080c244d94c59a773cbe5457734,openshift4/ose-cluster-kube-scheduler-rhel9-operator:sha256:2fbd7baee98c89f59a87d541fd4f7b2e14eb88645b53fefa7b44fcd86e3e1eff,openshift4/ose-ibmcloud-machine-controllers-rhel9:sha256:08ea69707b4d728f1368947281cf3ec122d68713209cfcb0e91e5322bf1ada5b,openshift4/ose-baremetal-machine-controllers-rhel9:sha256:bba88a8f8b41c76aeddd25012b4dcb14da6d896763ba6a003ca824260b8c24e6,openshift4/ose-cluster-machine-approver-rhel9:sha256:37287b7720a8d5951fdf6f92b59a5b25a21a7748b93bffe6a4686fe377e80a1c,openshift4/ose-prometheus-operator-admission-webhook-rhel9:sha256:d6020264e2d560cb396757e9061455568ff5fcee405f9d5ef5b07abf9bd16c27,openshift4/ose-csi-node-driver-registrar-rhel9:sha256:b2c1423302c27b56725d91ef0c9dc34903eecee9b0e8bf6761f179bfcc48cd32,openshift-service-mesh/ratelimit-rhel8:sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b,openshift-gitops-1/dex-rhel8:sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949,openshift4/ose-cluster-kube-controller-manager-rhel9-operator:sha256:67df479466b162b90afb4d17a6ba5d3d51cec078adafceb0a406dad55173371d,openshift4/ose-console-rhel9:sha256:2d5a9f1213ef66cd474cbbe11dce4c37a56613cb136fddc8a5a93ac63ebb79d3,rhc-1:0.2.5-4.el8_10,openshift4/ose-multus-route-override-cni-rhel9:sha256:92d6845bc5c65cdec3d0f59440500af1b60b070b415ecb6e3c5c276fbdb97f4a,openshift4/network-tools-rhel9:sha256:fd3e60bc24de6ec4065fa463ab0b47680a335de84c7689e1b5d3f513e258eb20,openshift4/ose-cluster-kube-storage-version-migrator-rhel9-operator:sha256:fada881117627ed34c8001afc157a42f6cf0efe3e4dda2b73ff8d665c2f8a878,openshift4/ose-csi-livenessprobe-rhel9:sha256:178cf1edf9a80f37bbb19597a34bdd8edfed5e44af3ff7273a46a7b4fb7fe964,rhc-1:0.3.2-2.el10_0,openshift4/ose-powervs-machine-controllers-rhel9:sha256:23ab98b2ad9e01cebf816c41ffcf05a0238c376e749891b69571d14e3254725a,openshift4/ose-machine-config-rhel9-operator:sha256:cbc38b69f3b3aadfc71efc9b42472b4cf70ba3429850cf865cfcf98cfaa22b5e,openshift4/ose-prometheus-operator-admission-webhook-rhel9:sha256:25daab414833b6f1f0f91b7a55935ed5cfd7aaad5d2f0eb8674a06a603187059,openshift4/ose-operator-registry-rhel9:sha256:1b60d44b4151cc97b03a634ab3ac9114552dbe3a0db013e75e388b30267bd159,openshift4/ose-csi-driver-nfs-rhel9:sha256:afcd51e5d51313d108a2ba7aa2be93dc3a1055a1c578988baa10bf0fb1eaaf78,openshift4/ose-machine-config-rhel9-operator:sha256:da8d61470c3c3120912a4c05fb149d404da73c1cc654faa36c5311b3ba47c554,openshift4/ose-agent-installer-api-server-rhel9:sha256:5a3945e350248697a15a6c76fe1ce18a6bccf75c671431a007011e0382f3c0ae,openshift4/ose-baremetal-installer-rhel9:sha256:dba9f31f1f13b63b527cda2cf8153d1d28c5c60b5ff2ea0d8a45278d60b7cc9c,yggdrasil-0:0.4.7-2.el10_0,grafana-pcp-0:5.1.1-12.el9_6,grafana-pcp-0:5.1.1-12.el9_7,openshift4/ose-prometheus-config-reloader-rhel9:sha256:5ba53ce20c10e348f5d4683419f83c51e8ef10c43e750ab589328b52f90c72b4,openshift4/network-tools-rhel9:sha256:6e32a82da78fd60e74c129296bd390de402cd7a22a0f1ddbcfb9d3dec7ac1c5b,openshift4/ose-kube-storage-version-migrator-rhel9:sha256:b7694580f54417a5114f97099702dad2612769e3cbd37e9fbbae76d6234f138e,openshift4/insights-runtime-extractor-rhel9:sha256:f9fb910e3a55c4023201befe8e29197f3a60b3c62b7814903bcef5554b939857,openshift4/ose-cluster-cloud-controller-manager-rhel9-operator:sha256:786c62c9eab9cb68788ddef5dee8ecd74e03a1197293a3047adacd489e034dda,openshift4/ose-vsphere-problem-detector-rhel9:sha256:5ff7cea307bba36d569d6d66b4d3e116f52b69441cc071b830310d9f4134f02a,yggdrasil-0:0.4.8-3.el10_1,openshift4/ose-operator-marketplace-rhel9:sha256:894978ef07143c0e17fd299e1cf3cf66bfd5d1d94c61bb98a196c22c8004252e,delve-0:1.25.2-2.el9_7,openshift4/ose-console-rhel9:sha256:912e9b0b57674cb8fba5a2e1de0896f61ee865dda7fae05de2ce947ce156e44b,openshift4/ose-network-interface-bond-cni-rhel9:sha256:96674cceccce573229f82da92f10e3029a5af33b192ae9437214f50bbf9e2651,rhtas/cosign-rhel9:sha256:fab56b9624ac2348e7fef16cda18f48777f76909d93a505db62717a74d9a7c9d,openshift4/insights-runtime-exporter-rhel9:sha256:a19a3f623da8d80725954f6cd9aa9717b62c8fca465f242db675b28911906499,openshift4/ose-image-customization-controller-rhel9:sha256:59a251157e8aa68bde3d1953a52c2e3d34faeb9088340c7f5f8e818e82acef7c,openshift4/ose-cluster-config-rhel9-operator:sha256:416fe4e736d5f3e3b0e4668fd2f092ae855a4073d18a064bdcca73ff5450b77d,openshift4/ose-aws-ebs-csi-driver-rhel9-operator:sha256:1a519196155e2b7a81d5bc098c5bacac53753fe20de6472cd7181943c39e3da9,git-lfs-0:3.6.1-2.el10_0.2,openshift4/ose-monitoring-plugin-rhel9:sha256:a8632686ff6aa29daa34e5c92e773d333618f9cf435b7327e8e2254f254498a7,openshift4/ose-hypershift-rhel9:sha256:d2137f1cbd01473f0f59113acd49c366ab07cf2be96b847114f2eccc5574cf70,openshift4/ose-ibm-cloud-controller-manager-rhel9:sha256:a0d654463288adab9acd6dd6bc5e9bfc05b60081e77877e285b60738c4210077,openshift4/ose-powervs-block-csi-driver-rhel9:sha256:82f53b70f880581287554b90759c0ff9737a7a676e5341794faad3e55366cde7,openshift4/ose-cluster-baremetal-operator-rhel9:sha256:779674ddd263854aa364bbdfeb92865821613d6da30a0d3b503ceadaea48cffa,openshift4/ose-oauth-server-rhel9:sha256:25f015786ca305a2bd100695adef64936782586725477c67bc43a42402e9a4a0,openshift4/ose-azure-file-csi-driver-rhel9:sha256:5f9c581120873f1a012c29ac00721b6fd834c9378cd64f1d8e243da36755cef3,openshift4/ose-cluster-image-registry-rhel9-operator:sha256:f90a83b839dcd68d04ffee8569e4ffe1bcc695d192c9026ecfcef9d52428e4fb,openshift4/ose-cluster-csi-snapshot-controller-rhel9-operator:sha256:9da0116d6b0b4f33ca7ccfc26658ec79c8a4ba17f8a63d0bd399ec26808382fd,openshift4/ose-kube-storage-version-migrator-rhel9:sha256:9edb1bba41b757bc30ccc0bd7d823f3574e21195a1a4075a31ae5bea6fcea516,openshift4/ose-hyperkube-rhel9:sha256:7ede51978a537c20cf89f7e2c469034859ef89b1f34b3a8c89a727378746bd24,golang-0:1.25.7-1.el10_1,golang-0:1.25.7-1.el10_0,openshift4/ose-gcp-cluster-api-controllers-rhel9:sha256:e74e44e4f418e3f2f7bf433c9cd8d556a6e7c4aa07f9ec82190e2d3f5188daf1,rhosp-rhel9/osp-director-agent:sha256:104de5ab607f2da597f8671bbb873e45c7d7c0ececa370f585841022a924aa5c,openshift4/ose-tools-rhel9:sha256:016186005ba6bc28aaa6eb5e53440cb32db58fdad03c01cae007f13ca72b6bc2,grafana-pcp-0:5.1.1-12.el8_10,image-builder-0:31-3.el9_7,openshift4/ose-etcd-rhel9:sha256:2fff2ecb2b19603744be8e2821f401a9e0234ce1b4ac15c27223c10e24ccc7b0,openshift4/ose-csi-driver-manila-rhel9-operator:sha256:fb2df252487a734b3e051ff54713a7689f7f1e8cd93557f846458f54d3776162,openshift4/ose-installer-artifacts-rhel9:sha256:19a89d0373af1265e09e12bd377e5bf631e5fb58c36b2f73b8ca86d186bb0840,openshift-service-mesh/istio-rhel8-operator:sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23,openshift4/ose-kubevirt-cloud-controller-manager-rhel9:sha256:24830ccec39949668dc836f6532f2375d0b7ac23ef69c78315139c4e15af4088,openshift4/ose-nutanix-cloud-controller-manager-rhel9:sha256:fc58e1f537d1d1cfb376c8bb3a1390c008341212540fcd98a4a315509cd7e62a,openshift4/ose-vmware-vsphere-csi-driver-rhel9-operator:sha256:4f52a030e28c14e0439d867f8fcaf7d68dc55615121202b9a481f57743211853,openshift4/ose-installer-artifacts-rhel9:sha256:09c9f0fc1eb4f8249b7d31f903b38b6a98ff7eaf3ff3dc9d57ee46ac3ede71f9,openshift4/ose-thanos-rhel9:sha256:097e955c655e3dea8251b05c0f56a5cba51ef51c7e15b0812cc10f2a36a68eb1,openshift4/ose-agent-installer-csr-approver-rhel9:sha256:f4f78fda0baa299dcf7ac093ca782970074760999f96fcea9d170c9cd35455ee,openshift4/ose-azure-cloud-controller-manager-rhel9:sha256:0f6d80e175d9165dd41da793921d5d6f69cf536c5d16e745b445979b0282045c,openshift4/ose-service-ca-rhel9-operator:sha256:18064f2babbd41c755d29968a2d3f2bf5865a1d49f6bd9a37c527b754abf6273,multicluster-engine/discovery-rhel9:sha256:9358b7c24e4c4f8e72266af077352af1af3ba61e266087cf55b7dc9ea0eddcb9,openshift4/ose-cluster-autoscaler-rhel9-operator:sha256:dd5537f856bf3d86da38de94c7ee6fb9851b262515a4efee6aa1230924755721,openshift4/ose-docker-registry-rhel9:sha256:20bc3672a7b6aa6540d2865a8954997052d62055f8a81c05d43e80c77ab24e9e,openshift4/ose-azure-cluster-api-controllers-rhel9:sha256:e244c83b21c68b755d7e0eaaf476a1ae451f3368918b80b19546fe01a9a4a9a2,openshift-gitops-1/dex-rhel8:sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770,image-builder-0:31-4.el10_1,openshift4/insights-runtime-exporter-rhel9:sha256:4bff8e6c2036c475175b402d239dddd1a7ba3f60ac6651ea3f6667707741bc9d,openshift4/ose-machine-api-provider-aws-rhel9:sha256:b1e1d2e8782377f73d8b9d458a7d433dc9395ec7fefd2e376a54a19779dd4ca0,openshift4/ose-must-gather-rhel9:sha256:42cf0a1f66357b0054b4932b2952489fcb46182e4ff04501ec3b8ec4fc86b5c5,openshift4/ose-cluster-control-plane-machine-set-rhel9-operator:sha256:ef54b7c8c1f96edbed0f3c449b57c6869ea4c33d97f883ab697f53f7d923f5c6,openshift4/ose-multus-cni-rhel9:sha256:8820d4283d1076c069fba2ef244c43ed97ec264ab803df3f1e3277b7adeb31f1,openshift4/ose-tests-rhel9:sha256:ca003a5430003fdc23da191cb1ad662b36acbed76c201ff0b00bf3f171463e6c,openshift4/ose-aws-cluster-api-controllers-rhel9:sha256:87371170c06f7ff9245e5c8f2a0884e969d6d8941d555338ef28ba63be405728,openshift4/ose-installer-rhel9:sha256:2b075e0d54437ff4323eea051e2347a71dc085464c2abbdcb4a85d55d9fb84e3,openshift4/ose-docker-builder-rhel9:sha256:850822810478d3eb9a90d65d98633bc55f783a3cfc9d804eeb2b7fe6b20d7387,openshift4/ose-csi-external-snapshotter-rhel9:sha256:64e1b9fd351ac5ee0427dd131b0dccfa961b07df2dc72225f59090acab8886cd,openshift4/ose-cluster-bootstrap-rhel9:sha256:65c1a312a57a482045f442861f6a64605d64994304b07567af0c69eb4b205bcc,openshift4/ose-ironic-machine-os-downloader-rhel9:sha256:d279a26db070d4a243df5391bebfd209488648a89428c9d02a345a7eacfe3cf2,openshift4/ose-azure-disk-csi-driver-rhel9-operator:sha256:017f982fb763a0eea61580758d4f69ec14bb78e5b5d107503276683336f9983c,golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.2,grafana-pcp-0:5.2.2-4.el10_0,openshift4/ose-agent-installer-api-server-rhel9:sha256:85b66f1e1b6ca493592c62215cf8e94d29d6f1bcb68c146a7466133f661cff9c,openshift4/ose-cluster-monitoring-rhel9-operator:sha256:7426b65a3e619303aa1a565226e25437b7601c415c5efc1014e2c99c44a527aa,oadp/oadp-velero-rhel9:sha256:7b2a6de1e9a124a5f2588a49b17fac3e4152a7d66792306a33a8d20a918dabbb,openshift4/azure-service-rhel9-operator:sha256:4a5cb39ccce3520bbbd2bb98b84df278724e9084cf7abe9f100963b05f6a51a8,openshift4/ose-cluster-version-rhel9-operator:sha256:dfb848cb68bea17a789a807b5edadba37a02947c506b8fa58d8b6376cfd3fe48,openshift4/ose-image-customization-controller-rhel9:sha256:b040fd7da964ff9d19353082affcbe1068239f02d45f72a8ebcf8df274f278ce,openshift4/ose-openshift-state-metrics-rhel9:sha256:f1b0a334d0a34ac7df7177915c9d86925b1d09e2b7b73739e2e242b156043d00,openshift4/cloud-network-config-controller-rhel9:sha256:1675f4cf4337e6ee6f4b0506017f95e48775b58ae80b02f24d2d6cf4b24e0897,openshift4/ose-aws-pod-identity-webhook-rhel9:sha256:3701c8556b2ec7a09dab7e672729dc6057919b905eeeaba9e09ab38e3074ebb7,openshift4/ose-cluster-monitoring-rhel9-operator:sha256:a973533a2ecfa414c1f95c4d8ffdbe85f18969a740c19d3b8c4d2096f17a94bf,openshift4/ose-cluster-network-rhel9-operator:sha256:12f1e84fdd0ca084e018f3f9ca550bfe183412dfe42fc9ccb356238ddc572a2a,openshift4/ose-baremetal-installer-rhel9:sha256:d6ab422fea2e5e0782be99e3a275eee5ff665baf8e7310a601d42ba2f5f39608,openshift4/ose-openstack-cluster-api-controllers-rhel9:sha256:d3ffde90e606b0344c39f8668dc629f919612cc5a3475e8fbd15aa1bb807a42f,openshift4/ose-cluster-policy-controller-rhel9:sha256:182e148ddb5ae83c7540564f0975f28c17fd859912bedd6392231fee95060d69,openshift4/ose-oauth-apiserver-rhel9:sha256:852a40e0bf7ba727a9a4f4e65d820184f69d3b6410afeaee5b7c25da9d6222f7,openshift4/ose-network-metrics-daemon-rhel9:sha256:578f67e6b9aa327a20cfaf5912a5601489ca0653ad744109b08262fd31d27d68,grafana-0:10.2.6-22.el10_1,openshift4/ose-csi-snapshot-controller-rhel9:sha256:ae9f9c747fc7f26dc4fe31644db03b93c7de10384eae1dd40b40767c2e654667,skopeo-2:1.20.0-3.el9_7,openshift4/ose-console-rhel9-operator:sha256:73acd569142f5dbfffb16d34dabb2e05d4552354cc58bba83ef8406029c102d1,openshift4/ose-vsphere-cloud-controller-manager-rhel9:sha256:d10f095d393890ca29041fd02fd48c36bc9481375ec62469eb610c626bbe9678,openshift4/ose-csi-driver-nfs-rhel9:sha256:9e739fbf82f09ff6bbbd9baf6f2e64b0056ba1608b979e45ee6de17dcd5fcb85,openshift4/ose-baremetal-rhel9-operator:sha256:8ceb3fd7e1d7d6bbdfeed53a97accf43b3981d5e101746e891a804ef8903fee4,openshift4/ose-coredns-rhel9:sha256:761b0b68ca18e23e758c780c5baee54607549cace7f1d337b418c0e0ee630ddb,golang-0:1.25.7-1.el9_6,golang-0:1.25.7-1.el9_7,openshift4/ose-ovn-kubernetes-rhel9:sha256:cdf3f134bac400823d74df622bc73368c849621e10ce6e2483a3d17346e9adc8,openshift4/ose-csi-driver-manila-rhel9:sha256:9d807221e98130e63530f757157207556a7b2bb7fe7587f0d7c5f9d1ac9592d0,openshift4/ose-csi-external-attacher-rhel9:sha256:952459632a7e13cff2a8543a1a23e0032e9c163bc223102ca0c8d92c28e0acad,openshift-logging/eventrouter-rhel9:sha256:e99a99d015d5db9a61663303148bea2ffd77c5a0b689e456b288993749aa43b2,osbuild-composer-0:149-5.el10_1,openshift4/ose-azure-disk-csi-driver-rhel9:sha256:0e9fe96d6b1ef18e0fb3ed4751d8809e0fcddada5387ef81e2801ed4036d54d3,openshift4/ose-openstack-cloud-controller-manager-rhel9:sha256:d5fe8fa8055701c1d85ff5cd062b28b808a791d658c1e6227cef379dc3706740,openshift4/ose-cluster-etcd-rhel9-operator:sha256:25db07689f639f79919d6f028a10375fb9b68abfd9cf55829333d0360a7acf99,openshift4/ose-cluster-openshift-apiserver-rhel9-operator:sha256:00f150e9a977b547e1511fbd0972027a01bdf4852bfaa5b7c21a01f1bb9cdc76,openshift4/ose-operator-lifecycle-manager-rhel9:sha256:8a23563b0a48ef83f83afb6b603c3c6e432613ac914f91cee12c45ce88e4568a,openshift4/frr-rhel9:sha256:1256eb041e3f4703292fda7d334bdab8ad59e6ded330b2480f0e450aee1b141d,quay/quay-rhel8:sha256:6e13793ca8f309ec0b69ae609b840ff0f41989d88cd4bba127e1b0040631367e,openshift4/ose-gcp-cloud-controller-manager-rhel9:sha256:df2d7c18bdb6bf49c2f655b7dd70cd4739b2b9b4243fe2f136042b922a029e9c,openshift4/ose-csi-external-provisioner-rhel9:sha256:16ac552088d7bdff558474c576f77f8091c009eb49a13d8bdac756161491e4e4,openshift4/ose-container-networking-plugins-rhel9:sha256:bcb139bd20b7cd79ee16cf8968dfcb0a5a3398bcfa734dcc2c2ec47dda46a93c,openshift4/ose-openshift-apiserver-rhel9:sha256:613556b062cf0adc4f9826afca26ee52106805907c1c083580b0f7595fe35d22,openshift4/ose-oauth-proxy-rhel9:sha256:4af0d2d2ff92b30d0bfd1217791f796ab853a709d6724c1089d967cd8b2bdb35,openshift4/ose-gcp-workload-identity-federation-webhook-rhel9:sha256:c8a1a13f5a36513e22f8db1345386f1835eac5b7f809c6745fe43afe8372ed92,openshift4/ose-pod-rhel9:sha256:ab60ac0729c4fe33c4a801982f9a632d7c9b5ecf991b7166b8a6642a621f9490,openshift4/ose-azure-disk-csi-driver-rhel9-operator:sha256:b79947b0015b88a5e6b09d99d6f5026d868ca2c810bb7be21832362a62918f84,openshift4/ose-multus-cni-microshift-rhel9:sha256:5f52687421da96b5d501a8a5a8911094dfe900c7f0e64edf993b313e462cdc9b,openshift4/ose-apiserver-network-proxy-rhel9:sha256:3322914e1219da147d36aee3121d4d4b42bb619419535942aa9108f6918d8e3b,rhosdt/tempo-rhel9:sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1,openshift4/ose-docker-builder-rhel9:sha256:78f92ad65baee06e314611b83e07e7a87dc4e3994ecb76b5b3b2a2039c1aa2b3,openshift4/ose-prometheus-rhel9:sha256:408bfcd24ecda598d5a71bf827a74c3e10d6d7748a9cb8007616c45e4d490275,cert-manager/jetstack-cert-manager-acmesolver-rhel9:sha256:abcdf8c79fe663805d3bd5e43ac73b0472b5dab8c9dd80c90e1cf54ff161f41f,buildah-2:1.41.8-2.el10_1,openshift4/ose-docker-registry-rhel9:sha256:6b4db8392b4fd5d49b177c707bed1048c6ccc7564f2dea39ebafe492807884df,skopeo-2:1.20.0-3.el10_1,git-lfs-0:3.6.1-2.el9_6.2,openshift4/ose-cluster-authentication-rhel9-operator:sha256:e8bbd18a1d2d8a8eed42cc86d19a260f2bbe9379e35257c33cdb70980cbfa5f8,openshift4/ose-cluster-kube-cluster-api-rhel9-operator:sha256:aae9deacd010205f4a5f4ed0bbb3408ab493972ed4acc5ad296a81f0099c3ef6,cert-manager/jetstack-cert-manager-rhel9:sha256:a1bfde47d53ed34e899229870228ce35230fa216ade3e348befd9b77c2c7ceea,openshift4/openshift-route-controller-manager-rhel9:sha256:d3fe7d8d1fbacc9832ebf90ed7548a6b2cb283f8a98a6ca73b324e427b5d69d7,openshift-service-mesh/proxyv2-rhel9:sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d,openshift4/egress-router-cni-rhel9:sha256:82a2a3cc00c616964a3c24cf1095a005e4e573cb79c345e9004dbcd35e180c10,openshift4/ose-azure-file-csi-driver-operator-rhel9:sha256:105a07e6bc8acd530a8ae3097846789dbcd2c7a2f1f984805c5bb3b7449b1d05,openshift4/ose-multus-cni-rhel9:sha256:aedb8ec541683a33066c8e4393fdef2b2940879da38f06e37bc4aa247038081d,openshift4/ose-telemeter-rhel9:sha256:d1d8e4246ccac8436bc696b9bbac8c102c26258e902f947c892c91084f7d41cf,openshift4/ose-agent-installer-ui-rhel9:sha256:4bac5520ec58aac65a508a746976667acbb6132ebfe6aacb2f8136f3198aa35b,openshift4/ose-gcp-pd-csi-driver-rhel9:sha256:e43bb0e2b7af46bbfeff6809f44f401007498cae3cbc04a9c4e8f8033f3142d9,grafana-0:10.2.6-21.el10_0,openshift4/ose-libvirt-machine-controllers-rhel9:sha256:8e26412eb9c4efddfb90bbc864e68aac6ce43541f5952250709e973c75cbe8b9,openshift4/ose-azure-cloud-node-manager-rhel9:sha256:3e3f7e476df2c2b27a8c3a17ca83a98224c8db8952ef6b2117816bc81c9c74ae,openshift4/ose-ibmcloud-cluster-api-controllers-rhel9:sha256:ab7d9c2e48415e4cd8a1584e942dd2bb98848aa657ee7293fadebbc6cf439c4e,openshift4/ose-vsphere-cluster-api-controllers-rhel9:sha256:c699affbdef36d64881653a63e0e8a5c10fd5dae0ef6dddb9bb7e50de29d8e8b,rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator:sha256:fc6cd4a43aa9ca1cf87722be0a600a74c7b6c5adbdd970ce418f149a8f85d7b1,openshift4/ose-insights-rhel9-operator:sha256:0d1e25b874b260043556c33ed62a26ebd56bef929e3539fa86db96501a798b14,openshift4/ose-ibm-vpc-block-csi-driver-rhel9:sha256:b27cbc2a5d54ec8bbf744ee483f2cc81b9101900ec9e229d362a8169ee72b29b,openshift4/ose-cluster-olm-rhel9-operator:sha256:4e708aba93aa644457fa3aa047fafcea0b504cee71724917f497fb4f0ad59210,openshift4/ose-prometheus-alertmanager-rhel9:sha256:e8372947353c8a6e32dbce30650b91a1f09b20162fef90150a58f3d3764c0e86,openshift4/ose-kube-state-metrics-rhel9:sha256:dcde633d96ae797962a3bec581ef3078a5142b3131595e0055031195b798bc16,openshift4/ose-prometheus-rhel9-operator:sha256:e865bad23956b605474eaa4c5e637a14e5453a53522b145138f216e4909b5348,openshift-logging/eventrouter-rhel9:sha256:cb98c8af6800e8aa841367ea9d03eb9ad091c9a966c760bf759152750d7979f3,openshift-service-mesh/pilot-rhel8:sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79,openshift4/ose-csi-external-resizer-rhel9:sha256:abfd8c69fd7ac41b2a46b8398370b79ff5f7388ce09d80bcb88180b160ac7c2a,grafana-pcp-0:5.3.0-2.el10_1,openshift4/ose-baremetal-runtimecfg-rhel9:sha256:425a3e4c2774dd14e2d4baf3bc6f9b1bc6fbcc41faa0ed55431fef26cc5db7ce,openshift4/ose-ovn-kubernetes-microshift-rhel9:sha256:c3076f6ad851ec022590776e86a86c5552388edf897d9a0d39d0ad2ec2cd0b75,openshift4/ose-prometheus-rhel9-operator:sha256:4be800b359f4f043ea6535511a1b79ba7d1d2489164c5cbff98ada9f16699820,openshift4/ose-baremetal-cluster-api-controllers-rhel9:sha256:5b132b86c1b14a775ee77dafa3a72eb723358cbce6e710e44d279c8050c4261b,opentelemetry-collector-0:0.144.0-1.el10_0,openshift4/kube-metrics-server-rhel9:sha256:3c928586ae0b46feacd6570dee3ec49a5a204227e113432194bc353f6014dcbc,opentelemetry-collector-0:0.144.0-1.el10_1,openshift-service-mesh/kiali-rhel8:sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd,containernetworking-plugins-1:1.7.1-3.el9_7,openshift4/ose-configmap-reloader-rhel9:sha256:e0f6f48dfc0eb1f410ac198eb6ef6a9c6ee288fe4a01b7ef65e6b62f6b939153,openshift4/ose-prometheus-node-exporter-rhel9:sha256:33943aaf687567ae3ddb4339608e562f9f877f43d779f39820741e68f691b47c,openshift4/ose-machine-api-provider-openstack-rhel9:sha256:6ef29ef6ab610f85055e8a832b8a1147e7ca3763ca4e340bbc6f0207eb387459,openshift4/azure-kms-encryption-provider-rhel9:sha256:c5f8bb01174a32ba07070a5488b2fb27ca7820508491914337a6433d4766f039,source-to-image/source-to-image-rhel8:sha256:f0b6590d7f5168a7dc749138a935d094369a7b87bbbb8b9d1c755fc01d57100e,advanced-cluster-security/rhacs-main-rhel8:sha256:334a3cc1eb9c5716a0ce17ce4555d492e5d6e6176734c7e394e758452b53781f,openshift4/ose-powervs-cloud-controller-manager-rhel9:sha256:f3d43dcaf117d7d4b4ab4db76e4f16bba7384c2c0dde245b3e264d6957bd8f19,osbuild-composer-0:149-4.el9_7,openshift4/aws-kms-encryption-provider-rhel9:sha256:f51d6640749d0b80892428c7eb2b54e1e75fc69311ce456c425afac40caec745,opentelemetry-collector-0:0.144.0-1.el9_7,buildah-2:1.41.8-2.el9_7,opentelemetry-collector-0:0.144.0-1.el9_4,openshift4/ose-cluster-version-rhel9-operator:sha256:6fb6230a76c6b0220ca19d849247de87071ce9f052b2cd059eaae9d8cba2c030,podman-6:5.6.0-14.el9_7,openshift4/ose-vsphere-cluster-api-controllers-rhel9:sha256:71ba62eea59cabd52467c6f88cab8297437711abb581c4301be6645da5fa271d,opentelemetry-collector-0:0.144.0-1.el9_6,openshift4/ose-prom-label-proxy-rhel9:sha256:e8749dc60de7657ebf93e7226b47661b51d1daa4c5a4fecf336a17a0e0cf3c59,openshift4/ose-tools-rhel9:sha256:c43b9dc78e0c242107d45644cfafcbb4fe50bfe078dafed7b79f6e920006cca8,openshift-service-mesh/istio-cni-rhel8:sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4,openshift4/ose-powervs-block-csi-driver-rhel9:sha256:114d2dbfa9f68214f2bf75daf889bd9dd8c678f6dfce6dfff9e13aed8f0ef66d,openshift4/ose-kube-rbac-proxy-rhel9:sha256:622a2e6ba66f1624454cf3ff9229ded9dbd06815ae6512f251836da18b545da2,openshift4/ose-azure-file-csi-driver-operator-rhel9:sha256:c9c82a414593d91cb3a496ac4fb61767941b7a743b917dd385caf9402af17778,openshift4/ose-cluster-ingress-rhel9-operator:sha256:2bb41b270973bd2db4b6ded25357ad5b4113e03a64a5f55bab27e6723902a79b,openshift4/ose-cluster-kube-apiserver-rhel9-operator:sha256:da51fa3afa3d7cad2088b785407b6ae2d73640550410ed375254c3ef948befba,openshift4/ose-aws-ebs-csi-driver-rhel9-operator:sha256:952b83652c4613ee04ecf5c6cfa6961fd66fc865c84c99bff4f879512820bb60,openshift4/ose-olm-operator-controller-rhel9:sha256:06b33e1160ffea1621b8b365682c8b33eb88e1d0af49f2badfa2f2cdc1858187,quay/quay-rhel8:sha256:dd567423c854e8732542c41bfcda71948517762f8e91e31496e7dffa67b3c8c0,openshift4/ose-cluster-autoscaler-rhel9:sha256:5db690533cf26e8bffc456e69dc1e0d2f9554f6770c5ac75ea9eb345e1c101e6,openshift4/ose-vsphere-csi-driver-syncer-rhel9:sha256:368f61e0cd92fd849a673ec2ea2f51e7e6d7c12ee886676409369a580d0347e2,openshift4/ose-machine-api-rhel9-operator:sha256:fdf3b790c4ebbb4a049a452ee65a4f15de7c6b1fa06227dec1e0f44879d33d3f,delve-0:1.25.2-2.el10_1,openshift-service-mesh/kiali-rhel9:sha256:bae8264c3e4095670361ed400dc82020782ba8117a58a738b09d21c49ec348d9,delve-0:1.25.2-2.el10_0,openshift4/ose-cli-rhel9:sha256:8eeb12229d09c020f7f71cc996853eb47ea1311b8426eb7fc6f28652766ded15,openshift4/ose-multus-admission-controller-rhel9:sha256:78d21fcf562cac4d525153a03c574bb2a9ad71d50f955e263f06e2fb2b1daa08,openshift4/ose-aws-cloud-controller-manager-rhel9:sha256:e4f534afec621975ef7b2389f239bc672eae0bc342fee2fbe9560e20e892e3c5,openshift4/ose-operator-registry-rhel9:sha256:46623fe33e5d8b6eb551a012f5b444849b335a5bbd1726c274c28b8491e955de,openshift4/ose-vsphere-cloud-controller-manager-rhel9:sha256:b73ade6d149819e41a72599e2ea12b6a338d5ebd4d9e24e41178a1e2c31971f1,rhc-1:0.3.4-2.el10_1,runc-4:1.4.0-2.el9_7,multicluster-globalhub/multicluster-globalhub-agent-rhel9:sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1,openshift4/ose-aws-cluster-api-controllers-rhel9:sha256:53e8497893e6f46bd7ad043ff6bfae1cbfe6c4c07fad1f885a36f4be795e721a,openshift4/ose-azure-file-csi-driver-rhel9:sha256:0e9f3d7c4b43d2bee87a949509ce5c4874c9798381c388a97e2cb78991875098,openshift4/ose-hypershift-rhel9:sha256:1598a3a15eb623d10cc95a97996611c0949450cff57257b2d1851c8d83657a39,openshift4/ose-csi-node-driver-registrar-rhel9:sha256:923ed79b073776da329dbacd0dc79f7f4aff32c85c2863a36b00bdbd4c71a534,cryostat/cryostat-storage-rhel9:4.1.1-3,openshift4/ose-olm-catalogd-rhel9:sha256:f382ef885d8be8e7007416722029689f2b8ec1fcff45f3f405f4dba5afde7d9d,openshift4/ose-installer-rhel9:sha256:3ee2696cbb37838d53c0123d84d698b88db211c585005e6f5f53c005d3e218cf,openshift4/ose-multus-networkpolicy-rhel9:sha256:9ac3b13d328bdca2a50d286adf9f32621a3a059f3dedbb0f3414bbce3b1d83ec,openshift4/ose-powervs-block-csi-driver-rhel9-operator:sha256:5c312b21457753ed8c850d7fdade84bfc01ab2d0bcb3435e5a800ea1b57ce328,openshift4/ose-agent-installer-orchestrator-rhel9:sha256:a0514e0c9580b85e61b553b971d8d3a65f3cac4040ad6d74a3337db46d840feb,grafana-0:10.2.6-18.el9_7,grafana-0:10.2.6-18.el9_6,openshift4/ose-operator-lifecycle-manager-rhel9:sha256:fe0eedb70254c83eda2b74ac52833ef36c87e18a7ad16cbe88bb22e59d5e0a65,openshift4/ose-vmware-vsphere-csi-driver-rhel9:sha256:ce9541fe136ef5bab259ba766e792b4fcebc4168f91321660c182ad9dc811d17,openshift-builds/openshift-builds-waiters-rhel9:sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872,openshift4/ose-gcp-pd-csi-driver-operator-rhel9:sha256:db8ecd1162e094b6cb166b88dfa40258f31cdc4db3ca7f6a9b110893bc27d044,openshift4/ose-ibm-vpc-block-csi-driver-rhel9:sha256:cb7579bc13026888d51e2786bb35ca7c3b6bc9dedfff0a4435b4eba16c74a56a,openshift4/ose-openstack-cinder-csi-driver-rhel9-operator:sha256:f6929fc57fcf0e9c7d26b858afa505278f09fa81a854050194253e2b84fabb94,openshift4/aws-karpenter-provider-aws-rhel9:sha256:9414bd27ae196de5d952d6689530d09632bc529ea73e29ab09a2a9e8aaed601e,openshift4/ose-prometheus-config-reloader-rhel9:sha256:e4f48095d3dbbf481a4f0044b496ade9fa59cdcd58f6aa9cbea97b3a77cfbb1d,golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1,openshift4/ose-openshift-controller-manager-rhel9:sha256:646a707c50a3656bd6cec5b46960d4d27885135a1b2a4eac2f74fc8721723c3e,openshift4/ose-cloud-credential-rhel9-operator:sha256:d69d1884d60a78838900fb8ac8aa010ffe8a9814bd05c5fd23640ffb2fe62078,openshift4/ose-cluster-samples-rhel9-operator:sha256:6e44082e909372715fb8612484c5fe0ad82699620fa530e75f10d41396ef6d63,openshift4/ose-kube-proxy-rhel9:sha256:7414f3068e135ba5f9e0796967297f66dd619122e426dd8355a7d21c88c3ac36,openshift4/ovirt-csi-driver-rhel9:sha256:9705f3ca0e1fed96e556766c1d5b5e2047e4230ec3a3a57daeca21bfc152bfe7,openshift4/ose-machine-api-provider-openstack-rhel9:sha256:23c4ce9a3efd2b7cfe52406aa0df67bd6b17e2ff2583980b24e5f71c4e69bdd2,openshift4/container-networking-plugins-microshift-rhel9:sha256:7ed045e8c4ffd8421d54d6a4ff9ee3b8af00169d184f39fafdcbe689429e9a94,openshift4/ose-machine-api-provider-gcp-rhel9:sha256:c848d97da53997ed67654ed4cd558961e4ced5fe80860831f6100f27bb97316c,openshift4/volume-data-source-validator-rhel9:sha256:a1bd55517958d9320e04f417ebcdae6ebd6b3fcc9d4cd683c54686c7660205df,openshift-service-mesh/kiali-rhel9:sha256:6eb41fcb4690319f7f8433d1d83a00c75251d96124a249512e877f0b58b17b23,openshift4/ose-openstack-cinder-csi-driver-rhel9:sha256:ee66f64d8b3832cfa270298dc1257226c9abe618918de7283d7ea3acc7bfa058,openshift4/ose-ovn-kubernetes-microshift-rhel9:sha256:fd9a7c1b3d8bcd779e02925e2bd9d79f0c3f839636cb5fc66181eaece5dead1c,openshift4/ovirt-csi-driver-rhel9-operator:sha256:c1bef96bc0b79e4462606d3e42ed71e4d37ef14d2bea928b592272a149db9d11,git-lfs-0:3.6.1-7.el10_1,container-tools:rhel8-8100020260311202035.afee755d,source-to-image/source-to-image-rhel9:sha256:706a7e97fc435cc175679eabed85a3f6a379cc0a4111a11e592758ccfdfd2857,rhoai/odh-rhel9-operator:sha256:e8ae6c0cbe70972beb8b874dcee92a500601588fa7f505a2718df6c00668b90d,openshift4/ose-installer-altinfra-rhel9:sha256:c6cc733249fb7a1766cf1a858627b53c064e1b80344048832198c704a1402305,openshift4/ose-openstack-cinder-csi-driver-rhel9-operator:sha256:70b7a546e0f44c7d9199768c24c1ba195ccad7faf7debfe6766b27ceaccfa177,openshift4/ose-agent-installer-utils-rhel9:sha256:18b5b21ee15093503e1e3d2f6446ef3f5ffdca30bb50cc9f67dc7596930cb449,openshift4/ose-aws-ebs-csi-driver-rhel9:sha256:b877e2430ca1ef3b575577dbe08d3b13fe1274c1bb20e065421cae418a6374a1,rhc-1:0.2.7-1.el9_6.1,openshift4/ose-vsphere-csi-driver-rhel9:sha256:09efa5733cb84096f83209b6488e792758a2cf1710e73542313f6c79044d8f1b,openshift4/openstack-resource-controller-rhel9:sha256:e26d8456983b600e7248b5741030a68531e5d0f45666e6e3ae02ffc55ed0f906,quay/quay-rhel8:sha256:56bcc55b01c76a1eb7ad8b265cf9dfdd488fc62bc353e3822864a0f6c4f98ffb,go-toolset:rhel8-8100020260212045823.a3795dee,openshift4/ose-ovn-kubernetes-rhel9:sha256:b58f195d83635a36d05f1e187afa32e698ce14d509c03b47f984a01a87a5a681,openshift4/ose-multus-cni-microshift-rhel9:sha256:a42d5ec3c0b582a70bfb2297f3f7461f4b516aa28ea8a6c12c6bca2af51a9e7e,openshift4/ose-tests-rhel9:sha256:d464b4bd9d86b902c8836110faafe8c349da3bc03a7b352a2bd2f02e54069570,openshift4/ose-vmware-vsphere-csi-driver-rhel9:sha256:09efa5733cb84096f83209b6488e792758a2cf1710e73542313f6c79044d8f1b,openshift4/ose-cluster-dns-rhel9-operator:sha256:226cc05403576fbcc6d40b001ea969402a5e98cefd9444329396de56ab21c36a,rhc-worker-playbook-0:0.2.3-3.el10_1,rhc-worker-playbook-0:0.2.3-3.el10_0,openshift4/ose-cluster-storage-rhel9-operator:sha256:d91fdcc0e8bbd15d091c316a5bfeb683a7e9982ddf474724f49acedac349c48b,openshift4/ose-machine-api-provider-azure-rhel9:sha256:556d277848c695d76ab33ae109b99e0448bbd60262b39ae7f5cdb5c052252b3b,openshift4/ose-cluster-openshift-controller-manager-rhel9-operator:sha256:ad0b598016cb0aba3335d6d9bb01a2767fc3032baf24a2f8a2d857651a38222c,openshift4/oc-mirror-plugin-rhel9:sha256:97d075f6a0c08361b3f207632d98bdf276a9eb0ec0e79d54ed13550edee42c38,rhdh/rhdh-rhel9-operator:sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9,openshift4/ose-cluster-node-tuning-rhel9-operator:sha256:6a2409119ce2a370e3e33f5022cfe4a740661396ede914725a2a8b5279d89fe2,osbuild-composer-0:101.4-4.el8_10,openshift4/ose-nutanix-machine-controllers-rhel9:sha256:80ea2836ec34d2d2995c50a090e9a97623485c633c2cc39ed4fdce34c9f253dc,git-lfs-0:3.4.1-8.el8_10,openshift4/ose-ironic-machine-os-downloader-rhel9:sha256:344a60ac1e833a349a8f24f3db2859e9fd0f45dd562ca50478973868e3669451,openshift4/ose-azure-workload-identity-webhook-rhel9:sha256:2c0d1db3e0f37f09115d3f1af5ace12911311f70f4ceb574025fb1ed9552575a,
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Compliance Operator,Confidential Compute Attestation,Confidential Compute Attestation,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,ExternalDNS Operator,ExternalDNS Operator,External Secrets Operator for Red Hat OpenShift,Fence Agents Remediation Operator,File Integrity Operator,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Migration Toolkit for Applications 8,Migration Toolkit for Containers,mirror registry for Red Hat OpenShift,mirror registry for Red Hat OpenShift 2,Multiarch Tuning Operator,Network Observability Operator,Node HealthCheck Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 3,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Edge Manager 1,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift for Windows Containers,Red Hat OpenShift on AWS,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Service Interconnect 1,Red Hat Service Interconnect 2,Red Hat Web Terminal,streams for Apache Kafka 3,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2020-37127
Severity: moderate
Released on: 05/02/2026
Advisory:
Bugzilla: 2437103
Bugzilla Description: dnsmasq: dnsmasq-utils 'dhcp_release' Denial of Service
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 18.0,
Full Details
CVE document


CVE-2026-1966
Severity: low
Released on: 05/02/2026
Advisory:
Bugzilla: 2437046
Bugzilla Description: YugabyteDB: YugabyteDB Anywhere: Information disclosure of LDAP bind passwords via web UI
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-312
Affected Packages:
Package States: Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2025-61732
Severity: important
Released on: 05/02/2026
Advisory: RHSA-2026:3469, RHSA-2026:3468, RHSA-2026:3556, RHSA-2026:3489, RHSA-2026:3855, RHSA-2026:2844, RHSA-2026:3559, RHSA-2026:2708, RHSA-2026:2706, RHSA-2026:2709, RHSA-2026:3193, RHSA-2026:3192, RHSA-2026:3473, RHSA-2026:3472, RHSA-2026:3471, RHSA-2026:3470, RHSA-2026:4434, RHSA-2026:5133,
Bugzilla: 2437016
Bugzilla Description: cmd/cgo: Potential code smuggling via doc comments in cmd/cgo
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE:
Affected Packages: openshift4/ose-oauth-apiserver-rhel9:sha256:3e44b9a661ef5e26d00b73530f72e553af21ff1a7c2d3c2d90175d8c9450fb3d,openshift4/ose-cluster-csi-snapshot-controller-rhel9-operator:sha256:55913a30ed6223470b14cdbf3203f70fec75582d8f236930d1fd406d53472f79,openshift4/ose-docker-registry-rhel9:sha256:44394262f87d0cb2bba6b614752603b8aab111338c56d7d99cacfd30216db8df,openshift4/ose-must-gather-rhel9:sha256:e4df0face99b038653e9ebf2393f57fcd850239a6f6e7f3d34dde18197778a0b,openshift4/ose-cluster-node-tuning-rhel9-operator:sha256:df01b29e279c5fef750737c48041bfb4ef531599fa6ce556987ecdfbf8eb6767,openshift4/ose-machine-api-rhel9-operator:sha256:c8dd2c2cc351300aecd856351099e39d225e4ca22e952f2c0dfc3e96e8d3006e,openshift4/ose-openshift-apiserver-rhel9:sha256:42a46a5140aa0766f8f80786fe2b7094c5bee05f03a6d2dcff7e67dc98f6086d,openshift4/ose-cluster-kube-storage-version-migrator-rhel9-operator:sha256:445276782cff34121fede9ff3e4fdcdada8555ffcb073ad5430904bea4718cd4,openshift4/ose-csi-livenessprobe-rhel9:sha256:78976f244a2a7101390df281688f339864f3e7eda6531df18225022c768ca0b3,openshift4/ose-cluster-samples-rhel9-operator:sha256:52e02ed2dfb39a21615be12446e432762e7068635032cf7b8ba4a975053b51a2,openshift4/ose-gcp-cluster-api-controllers-rhel9:sha256:4f474f91da6fa969938f67a7b254f6e34e6ed2d8ca38e4de4d7c190328c65352,openshift4/ose-cluster-config-api-rhel9:sha256:99e65563c13b1a6d3e64f79ab6491b21106b3d46ef75ade4829c33cb97100ae1,openshift4/ose-aws-pod-identity-webhook-rhel9:sha256:5dad27a17bd4e6ee634e0fb0e00ef9b1f3f448dc68b4fa367c09531e42dc3779,openshift4/ose-kube-state-metrics-rhel9:sha256:23cac54b34c5360f23f37d7ed6c2cdc8fbaf93e992effbf184df0177d7b2d7ca,openshift4/ose-cluster-capi-rhel9-operator:sha256:5383f749ae80a70b6bac223d5c3ce9b70d58de06c031a57b02ea5510f4cf2e31,openshift4/ose-cli-artifacts-rhel9:sha256:cce4806b40fd1f040da28b0a76e8f7edb45e5e3b68fcdbd1ffec407f8b5d40a4,openshift4/ose-multus-whereabouts-ipam-cni-rhel9:sha256:c20df9f23d90cb585878aeb06e921741267b98a7b078ba494f6dbcdde2156020,openshift4/ose-operator-framework-tools-rhel9:sha256:8b46084314308de19d55ad4d00969903bb237f779d689524a8d85ad25a9b5fb1,openshift4/ose-csi-driver-manila-rhel9-operator:sha256:8a0bf468fd716a6323eff09954a3b657d7c972c82db37e1c25ec90363c81c845,openshift4/ose-ibm-vpc-block-csi-driver-rhel9-operator:sha256:348bfab8b43715c5b79610c50bd7a8c383bd7e0d404fe26ad3745d803fdaf339,openshift4/ose-cluster-kube-scheduler-rhel9-operator:sha256:2fbd7baee98c89f59a87d541fd4f7b2e14eb88645b53fefa7b44fcd86e3e1eff,openshift4/ose-ibmcloud-machine-controllers-rhel9:sha256:08ea69707b4d728f1368947281cf3ec122d68713209cfcb0e91e5322bf1ada5b,openshift4/ose-cluster-machine-approver-rhel9:sha256:37287b7720a8d5951fdf6f92b59a5b25a21a7748b93bffe6a4686fe377e80a1c,openshift4/ose-monitoring-plugin-rhel9:sha256:b6b49846ee674c3a60e16690b55b8d615a314a4acb037083cff146fd589bccf9,openshift4/ose-gcp-workload-identity-federation-webhook-rhel9:sha256:6c1708e931c8a1de0938b099b327f60db34c55fdd060784354497f2e3ff85bda,openshift4/ose-cluster-node-tuning-rhel9-operator:sha256:7cd066ff5d4ece08dcfea3200c141c04a7f7d602bdb6eece76997e4a5fd9c93c,openshift-service-mesh/ratelimit-rhel8:sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b,openshift4/ose-cluster-kube-controller-manager-rhel9-operator:sha256:67df479466b162b90afb4d17a6ba5d3d51cec078adafceb0a406dad55173371d,openshift4/ose-azure-file-csi-driver-rhel9:sha256:ea23ba720aa96c8bcf28aaa8b7b1958013bd6755c1f9ac45df93ab270cacdb1e,openshift4/ose-multus-route-override-cni-rhel9:sha256:92d6845bc5c65cdec3d0f59440500af1b60b070b415ecb6e3c5c276fbdb97f4a,openshift4/network-tools-rhel9:sha256:fd3e60bc24de6ec4065fa463ab0b47680a335de84c7689e1b5d3f513e258eb20,openshift4/ose-cluster-config-rhel9-operator:sha256:2d83dd39f7c6c31508391409e6290abdfb53cc26efd7c01678c5db022995eb0d,openshift4/ose-cluster-kube-storage-version-migrator-rhel9-operator:sha256:fada881117627ed34c8001afc157a42f6cf0efe3e4dda2b73ff8d665c2f8a878,openshift4/ose-powervs-machine-controllers-rhel9:sha256:23ab98b2ad9e01cebf816c41ffcf05a0238c376e749891b69571d14e3254725a,openshift4/ose-machine-api-provider-aws-rhel9:sha256:533e6256aabb43e56ceb3bb11de0af0fa52b6ed3b06253364ed13bfe7761e995,openshift4/ose-machine-config-rhel9-operator:sha256:cbc38b69f3b3aadfc71efc9b42472b4cf70ba3429850cf865cfcf98cfaa22b5e,openshift4/ose-operator-registry-rhel9:sha256:1b60d44b4151cc97b03a634ab3ac9114552dbe3a0db013e75e388b30267bd159,openshift4/ose-openstack-cluster-api-controllers-rhel9:sha256:58e2be9b362eeb088d6366ebe762e1753fb5d8aa47e0bda2f7526e11a79b8cee,openshift4/ose-baremetal-installer-rhel9:sha256:dba9f31f1f13b63b527cda2cf8153d1d28c5c60b5ff2ea0d8a45278d60b7cc9c,golang-0:1.17.13-10.el9_0,openshift4/ose-gcp-pd-csi-driver-rhel9:sha256:055ab6f647568b03346810361b8d713df697ac6dd7884e54531873a4bd93dacc,openshift4/ose-cluster-olm-rhel9-operator:sha256:d235bcb426bfd81f9b0dbf5d3773378654c06dbbedd663f3412ade87463c66bc,openshift4/network-tools-rhel9:sha256:6e32a82da78fd60e74c129296bd390de402cd7a22a0f1ddbcfb9d3dec7ac1c5b,openshift4/ose-cluster-api-rhel9:sha256:2a1f7d13f37618a9caaaa4d2fe83cb3ca5e5ca16e48fd169e3a7396f485b9af5,openshift4/ose-operator-marketplace-rhel9:sha256:894978ef07143c0e17fd299e1cf3cf66bfd5d1d94c61bb98a196c22c8004252e,openshift4/ose-console-rhel9:sha256:912e9b0b57674cb8fba5a2e1de0896f61ee865dda7fae05de2ce947ce156e44b,openshift4/ose-network-interface-bond-cni-rhel9:sha256:96674cceccce573229f82da92f10e3029a5af33b192ae9437214f50bbf9e2651,openshift4/insights-runtime-exporter-rhel9:sha256:a19a3f623da8d80725954f6cd9aa9717b62c8fca465f242db675b28911906499,openshift4/ose-aws-ebs-csi-driver-rhel9-operator:sha256:1a519196155e2b7a81d5bc098c5bacac53753fe20de6472cd7181943c39e3da9,openshift4/ose-console-rhel9-operator:sha256:d63b344881e7257edc09b0144aca041ab088aa28b5967d876070cfad1fba1aa5,openshift4/ose-monitoring-plugin-rhel9:sha256:a8632686ff6aa29daa34e5c92e773d333618f9cf435b7327e8e2254f254498a7,openshift4/ose-baremetal-rhel9-operator:sha256:b95854d62c45dd3f1c01256529dc28c53c3e643cafc6d7a77480c0ac7cec9e35,openshift4/ose-cluster-baremetal-operator-rhel9:sha256:779674ddd263854aa364bbdfeb92865821613d6da30a0d3b503ceadaea48cffa,openshift4/ose-cluster-cloud-controller-manager-rhel9-operator:sha256:5cb0dbfb2e9d314887215e7207e07925b158c1117ccf33a0ee80fb8d92c81944,openshift4/ose-azure-file-csi-driver-rhel9:sha256:5f9c581120873f1a012c29ac00721b6fd834c9378cd64f1d8e243da36755cef3,openshift4/ose-cluster-image-registry-rhel9-operator:sha256:f90a83b839dcd68d04ffee8569e4ffe1bcc695d192c9026ecfcef9d52428e4fb,openshift4/openstack-resource-controller-rhel9:sha256:231a4dc5f8a72c3a91257742c9e56932271ce526fc66026e1cc4eaec4968b620,golang-0:1.25.7-1.el10_1,openshift4/ose-console-rhel9:sha256:7ea6182af9b9c531477181992f8ed4b656d3b0f1a5520a04650e0b48c8b6263b,golang-0:1.25.7-1.el10_0,openshift4/ose-tools-rhel9:sha256:016186005ba6bc28aaa6eb5e53440cb32db58fdad03c01cae007f13ca72b6bc2,openshift4/ose-cluster-kube-apiserver-rhel9-operator:sha256:0ac34e5621d22748313844e748027a28c9eebca94f9e12383720738b92aa30c2,openshift4/ose-kubevirt-cloud-controller-manager-rhel9:sha256:24830ccec39949668dc836f6532f2375d0b7ac23ef69c78315139c4e15af4088,go-toolset:rhel8-8020020260227115231.02f7cb7a,go-toolset:rhel8-8040020260227112052.5081a262,openshift4/ose-nutanix-cloud-controller-manager-rhel9:sha256:fc58e1f537d1d1cfb376c8bb3a1390c008341212540fcd98a4a315509cd7e62a,openshift4/ose-oauth-server-rhel9:sha256:c5d0b71229ef57dbd2e765977a69fadc94aa844029963cd14cb0d1e5bdf17940,openshift4/ose-vmware-vsphere-csi-driver-rhel9-operator:sha256:4f52a030e28c14e0439d867f8fcaf7d68dc55615121202b9a481f57743211853,openshift4/ovirt-csi-driver-rhel9-operator:sha256:00ee4c19691a1e6e49791b233de1e92527bdcbe51a9d08f6d3737b3858321867,openshift4/ose-thanos-rhel9:sha256:097e955c655e3dea8251b05c0f56a5cba51ef51c7e15b0812cc10f2a36a68eb1,openshift4/ose-ibmcloud-machine-controllers-rhel9:sha256:0cd29686e0331a59e7f9a2002cc49fb58956921f4e715b1c8dc005ac9ba2167d,openshift4/ose-service-ca-rhel9-operator:sha256:18064f2babbd41c755d29968a2d3f2bf5865a1d49f6bd9a37c527b754abf6273,openshift4/ose-image-customization-controller-rhel9:sha256:2e8d6035dd45740df64272ca0757d0fd24277c1791c0649676f115bd5ee386dd,openshift4/ose-azure-cluster-api-controllers-rhel9:sha256:e244c83b21c68b755d7e0eaaf476a1ae451f3368918b80b19546fe01a9a4a9a2,openshift4/ose-machine-api-provider-aws-rhel9:sha256:b1e1d2e8782377f73d8b9d458a7d433dc9395ec7fefd2e376a54a19779dd4ca0,openshift4/ose-cluster-control-plane-machine-set-rhel9-operator:sha256:ef54b7c8c1f96edbed0f3c449b57c6869ea4c33d97f883ab697f53f7d923f5c6,openshift4/ose-aws-cluster-api-controllers-rhel9:sha256:87371170c06f7ff9245e5c8f2a0884e969d6d8941d555338ef28ba63be405728,openshift4/ose-installer-rhel9:sha256:2b075e0d54437ff4323eea051e2347a71dc085464c2abbdcb4a85d55d9fb84e3,openshift4/frr-rhel9:sha256:d3ed8e3d540e29de8ccc3481a4031cf0ae40fefdfa526ad53735ec1ca179123b,openshift4/ose-cluster-bootstrap-rhel9:sha256:65c1a312a57a482045f442861f6a64605d64994304b07567af0c69eb4b205bcc,openshift4/ose-ironic-machine-os-downloader-rhel9:sha256:d279a26db070d4a243df5391bebfd209488648a89428c9d02a345a7eacfe3cf2,openshift4/ose-machine-config-rhel9-operator:sha256:054211051050e024bdd440a4683fb4b08a475dbe32bbe79d3a71c142b438fdd9,openshift4/container-networking-plugins-microshift-rhel9:sha256:e8a34ef59a6cf062b031f1a53a6259f10c0cb1d142c73a5f23a936f2d4ad35a4,openshift4/ose-coredns-rhel9:sha256:e0fce5f642d8b8a1dc71b60236baa43880657d1eeb9d1d0bee57dab7ff4330f2,openshift4/ose-hyperkube-rhel9:sha256:220b32566d0ac5b70162cc266d53346578035828e87fcf2c400e401c97bd5a06,openshift4/ose-telemeter-rhel9:sha256:be5f90f14047bc18722b2a998365396863b9ea726e07bbc8ae1a5d2e284d3b13,openshift4/ose-ibmcloud-cluster-api-controllers-rhel9:sha256:9ebf7deacc5db93b428bdbaf4cea71c3cd3bfa59d95a95c6e9e489839a143850,openshift4/ose-insights-rhel9-operator:sha256:e5ac434e29b17e416688b53e670d62314208edd4343a984789e98db486de36e8,openshift4/ose-openstack-cinder-csi-driver-rhel9-operator:sha256:de927725f70ae7916108b16c5954c96c04798df55879973fdc2b07f70039b216,openshift4/azure-service-rhel9-operator:sha256:4a5cb39ccce3520bbbd2bb98b84df278724e9084cf7abe9f100963b05f6a51a8,openshift4/ose-openshift-state-metrics-rhel9:sha256:f1b0a334d0a34ac7df7177915c9d86925b1d09e2b7b73739e2e242b156043d00,openshift4/ose-aws-pod-identity-webhook-rhel9:sha256:3701c8556b2ec7a09dab7e672729dc6057919b905eeeaba9e09ab38e3074ebb7,openshift4/ose-cluster-kube-controller-manager-rhel9-operator:sha256:161a26d82f38f87f9cf0f621eaf762768bb92dc668536acdb430382a5ce74838,openshift4/ose-baremetal-installer-rhel9:sha256:d6ab422fea2e5e0782be99e3a275eee5ff665baf8e7310a601d42ba2f5f39608,openshift4/ose-prom-label-proxy-rhel9:sha256:dc0bc6821f0a975d2fb4088628873a9c82ff2bbf732e2c6b7e869590333da842,openshift4/ose-operator-framework-tools-rhel9:sha256:49cda765eae1c8fb6253baf223e34d3a71cc025eff453ae6dd4e4bc9b332c725,openshift4/ose-thanos-rhel9:sha256:7d46e79da8ffd5a6bc9153f356ccee7860f3ed4c26bdecb5916bcce8ff9b2bf8,openshift4/ose-network-metrics-daemon-rhel9:sha256:578f67e6b9aa327a20cfaf5912a5601489ca0653ad744109b08262fd31d27d68,openshift4/ose-console-rhel9-operator:sha256:73acd569142f5dbfffb16d34dabb2e05d4552354cc58bba83ef8406029c102d1,openshift4/ose-vsphere-cloud-controller-manager-rhel9:sha256:d10f095d393890ca29041fd02fd48c36bc9481375ec62469eb610c626bbe9678,openshift4/ose-cluster-baremetal-operator-rhel9:sha256:ec7fd19f5ba158294af4ce4bd956125a662d2c913641ea5cd8dc2e53ea2d02ad,openshift4/ose-csi-driver-nfs-rhel9:sha256:9e739fbf82f09ff6bbbd9baf6f2e64b0056ba1608b979e45ee6de17dcd5fcb85,openshift4/ose-vmware-vsphere-csi-driver-rhel9-operator:sha256:3d82aa72e18f8e0be1f05cf15c3443537d130d3906bdb5e22f44947287249d50,openshift4/ose-baremetal-rhel9-operator:sha256:8ceb3fd7e1d7d6bbdfeed53a97accf43b3981d5e101746e891a804ef8903fee4,openshift4/ose-coredns-rhel9:sha256:761b0b68ca18e23e758c780c5baee54607549cace7f1d337b418c0e0ee630ddb,golang-0:1.25.7-1.el9_6,golang-0:1.25.7-1.el9_7,openshift4/ose-csi-driver-nfs-rhel9:sha256:ba0ac498c36b29326e04ae4da80ef05b72cb15426f203a7b0bef13422b473996,openshift4/ose-ironic-machine-os-downloader-rhel9:sha256:a65fae433445b6a745d8396c08fd59249bdb38ba068f94e9f25309db50d3e54b,openshift4/ose-ovn-kubernetes-rhel9:sha256:cdf3f134bac400823d74df622bc73368c849621e10ce6e2483a3d17346e9adc8,openshift4/ose-csi-external-attacher-rhel9:sha256:952459632a7e13cff2a8543a1a23e0032e9c163bc223102ca0c8d92c28e0acad,openshift4/ose-azure-disk-csi-driver-rhel9:sha256:0e9fe96d6b1ef18e0fb3ed4751d8809e0fcddada5387ef81e2801ed4036d54d3,openshift4/ose-openstack-cloud-controller-manager-rhel9:sha256:d5fe8fa8055701c1d85ff5cd062b28b808a791d658c1e6227cef379dc3706740,openshift4/ose-installer-rhel9:sha256:472999616105ee7910f4ba796b9e05186aa328a0fa3c4d9858da410547751f69,openshift4/ose-operator-lifecycle-manager-rhel9:sha256:8a23563b0a48ef83f83afb6b603c3c6e432613ac914f91cee12c45ce88e4568a,openshift4/ose-csi-driver-manila-rhel9-operator:sha256:3fff421574ad4bc7f57e3c8967e3b8f078c1f27f25c9eb922255e20d1eafa450,openshift4/ose-network-metrics-daemon-rhel9:sha256:9312fa2334747bf894f86e8f5a222ded21abbabf5f38b9454f2753cd394058e6,openshift4/frr-rhel9:sha256:1256eb041e3f4703292fda7d334bdab8ad59e6ded330b2480f0e450aee1b141d,openshift4/ose-gcp-cloud-controller-manager-rhel9:sha256:df2d7c18bdb6bf49c2f655b7dd70cd4739b2b9b4243fe2f136042b922a029e9c,openshift4/ose-openshift-apiserver-rhel9:sha256:613556b062cf0adc4f9826afca26ee52106805907c1c083580b0f7595fe35d22,openshift4/ose-oauth-proxy-rhel9:sha256:4af0d2d2ff92b30d0bfd1217791f796ab853a709d6724c1089d967cd8b2bdb35,openshift4/ose-pod-rhel9:sha256:ab60ac0729c4fe33c4a801982f9a632d7c9b5ecf991b7166b8a6642a621f9490,openshift4/ose-multus-cni-microshift-rhel9:sha256:5f52687421da96b5d501a8a5a8911094dfe900c7f0e64edf993b313e462cdc9b,openshift4/ose-vsphere-csi-driver-rhel9-operator:sha256:3d82aa72e18f8e0be1f05cf15c3443537d130d3906bdb5e22f44947287249d50,openshift4/ose-prometheus-rhel9:sha256:408bfcd24ecda598d5a71bf827a74c3e10d6d7748a9cb8007616c45e4d490275,openshift4/ose-docker-registry-rhel9:sha256:6b4db8392b4fd5d49b177c707bed1048c6ccc7564f2dea39ebafe492807884df,openshift4/ose-cluster-kube-cluster-api-rhel9-operator:sha256:aae9deacd010205f4a5f4ed0bbb3408ab493972ed4acc5ad296a81f0099c3ef6,openshift4/ose-azure-disk-csi-driver-rhel9-operator:sha256:b5d17e7f0b7b4a902c45b97ebb1cfbc96a7ca1c1a959f289af78a849dca831b6,openshift4/openshift-route-controller-manager-rhel9:sha256:d3fe7d8d1fbacc9832ebf90ed7548a6b2cb283f8a98a6ca73b324e427b5d69d7,openshift4/ose-azure-file-csi-driver-operator-rhel9:sha256:105a07e6bc8acd530a8ae3097846789dbcd2c7a2f1f984805c5bb3b7449b1d05,openshift4/ose-olm-operator-controller-rhel9:sha256:715031e80a3ba46924b76bb369a5592bbb66b8c474153e85e7c6d5a8c8b6936a,openshift4/ose-agent-installer-ui-rhel9:sha256:4bac5520ec58aac65a508a746976667acbb6132ebfe6aacb2f8136f3198aa35b,openshift4/ose-prometheus-alertmanager-rhel9:sha256:ab5f145f0a939800b4871f0b1d85e58df78d4e588a12c2f78434aafc5f06714c,openshift4/ose-libvirt-machine-controllers-rhel9:sha256:8e26412eb9c4efddfb90bbc864e68aac6ce43541f5952250709e973c75cbe8b9,openshift4/ose-azure-cloud-node-manager-rhel9:sha256:3e3f7e476df2c2b27a8c3a17ca83a98224c8db8952ef6b2117816bc81c9c74ae,openshift4/ose-vsphere-cloud-controller-manager-rhel9:sha256:82ed142fd438d1b7edfd94568a21d547ad2c875a1e61cfa383537d046025c4a2,openshift4/ose-vsphere-cluster-api-controllers-rhel9:sha256:c699affbdef36d64881653a63e0e8a5c10fd5dae0ef6dddb9bb7e50de29d8e8b,openshift4/ose-openshift-state-metrics-rhel9:sha256:b8d676242c7b60fd34c388905423b107d3de9d1921e536c4843181cd934b7aaa,openshift4/ose-insights-rhel9-operator:sha256:0d1e25b874b260043556c33ed62a26ebd56bef929e3539fa86db96501a798b14,openshift4/ose-aws-ebs-csi-driver-rhel9-operator:sha256:aedb4250fbcf5d1b55641a2e058a185d24c30069904f633bc265bd379feb28b1,openshift4/ose-gcp-cloud-controller-manager-rhel9:sha256:f3b8d81a268c289575470fdaac60a7890978e6123531d3661bb3612d2d58e5ae,openshift4/ose-cluster-olm-rhel9-operator:sha256:4e708aba93aa644457fa3aa047fafcea0b504cee71724917f497fb4f0ad59210,openshift-service-mesh/pilot-rhel8:sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79,openshift4/ose-multus-whereabouts-ipam-cni-rhel9:sha256:0c211d13f7f9c0b024f75425a8244e079e7c824f989956a485b301c36119f59d,openshift4/azure-service-rhel9-operator:sha256:5452dfdc650a21170fb5e05eff1631e49e850f47cbc4afdd226fcc85754b2b0d,openshift4/ose-baremetal-runtimecfg-rhel9:sha256:425a3e4c2774dd14e2d4baf3bc6f9b1bc6fbcc41faa0ed55431fef26cc5db7ce,openshift4/openshift-route-controller-manager-rhel9:sha256:f0ba6ed3bfe8fe646b925b0ad746d7aab327f3f51d59e46e1272ab61d3f7e9cf,openshift4/ose-cluster-kube-scheduler-rhel9-operator:sha256:4078eb50f6e22603c29f3050d47ac8a2be4f0a82022c8744ca7d22b01e35b927,openshift4/ovirt-csi-driver-rhel9:sha256:fdd088feedad712da3cb0ecd43f4dfbc886b50420cbb1f3d88f360a5601c73f5,openshift4/ose-csi-snapshot-controller-rhel9:sha256:a22d4a86ab198662a89901bb2078db64989b9d634f12960aa19f66efb57d3d9a,openshift4/ose-libvirt-machine-controllers-rhel9:sha256:6b3bf5b2a628457c055b44707cfb92163956022587e95edf3ff2b694bc91134e,openshift4/ose-apiserver-network-proxy-rhel9:sha256:cbd231157b44ee32cf3de81e21cd52fc62fb8689a2d29545d619409b622d9727,openshift4/ose-cluster-network-rhel9-operator:sha256:19eb52436681a4d060ed99fcd2f8bb6cdc2e1deeeb83bdde5685045aff913fba,openshift4/oc-mirror-plugin-rhel9:sha256:a7e5459c47af8e80020bacd277bb6b051b30be8507ece6c9cb8c8cd8047c70cf,openshift4/ose-prometheus-node-exporter-rhel9:sha256:33943aaf687567ae3ddb4339608e562f9f877f43d779f39820741e68f691b47c,openshift4/ose-machine-api-provider-openstack-rhel9:sha256:6ef29ef6ab610f85055e8a832b8a1147e7ca3763ca4e340bbc6f0207eb387459,openshift4/azure-kms-encryption-provider-rhel9:sha256:c5f8bb01174a32ba07070a5488b2fb27ca7820508491914337a6433d4766f039,openshift4/ose-machine-api-provider-openstack-rhel9:sha256:16492c8441866e5b0f6b397c0d0d16376c6e5389ae0dffbb57468f2cd3235411,openshift4/ose-olm-catalogd-rhel9:sha256:dbfb0eddc9cc9d3016267bb21295a31f352cf137f0e8674c02689e9a8bca85e5,openshift4/ose-powervs-cloud-controller-manager-rhel9:sha256:f3d43dcaf117d7d4b4ab4db76e4f16bba7384c2c0dde245b3e264d6957bd8f19,openshift4/ose-aws-ebs-csi-driver-rhel9:sha256:7ca8252015112e01f7275f4144e2110143ee30e3cc9ac5fc2c4bb9d98fc83db0,openshift4/ose-ibm-cloud-controller-manager-rhel9:sha256:e046732b70bce9f14333cd69783e318b969a92370418f8267d9196288a20515b,openshift4/ose-cluster-version-rhel9-operator:sha256:6fb6230a76c6b0220ca19d849247de87071ce9f052b2cd059eaae9d8cba2c030,openshift4/ose-prometheus-rhel9-operator:sha256:a51254065d160a3cdbd083047e13f5589883436a8584c31c4aa45680d00954bf,openshift4/ose-vmware-vsphere-csi-driver-rhel9:sha256:06d8d0acf4402fc4e78b12308975e249c730f348a2b4014961d15d48d3fa4ccc,openshift4/ose-installer-artifacts-rhel9:sha256:d7e7e0be2fb503cc01b0f3abbf5e897ba492ca2ca338b733bf37f69435308a56,openshift4/ose-tools-rhel9:sha256:c43b9dc78e0c242107d45644cfafcbb4fe50bfe078dafed7b79f6e920006cca8,openshift4/ose-powervs-block-csi-driver-rhel9:sha256:114d2dbfa9f68214f2bf75daf889bd9dd8c678f6dfce6dfff9e13aed8f0ef66d,openshift4/ose-multus-cni-microshift-rhel9:sha256:f90c28c247fdc69521a81b19b77f11d1f32e40cb4886f43400ad4e2d94c9a04d,openshift4/ose-kube-rbac-proxy-rhel9:sha256:622a2e6ba66f1624454cf3ff9229ded9dbd06815ae6512f251836da18b545da2,openshift4/ose-azure-file-csi-driver-operator-rhel9:sha256:c9c82a414593d91cb3a496ac4fb61767941b7a743b917dd385caf9402af17778,openshift4/ose-ibm-vpc-block-csi-driver-rhel9:sha256:c723cdcf7f136bde645de6c253c850023da6793d3d23a2d15c51ee6741071dc9,openshift4/ose-cluster-kube-apiserver-rhel9-operator:sha256:da51fa3afa3d7cad2088b785407b6ae2d73640550410ed375254c3ef948befba,openshift4/ose-olm-operator-controller-rhel9:sha256:06b33e1160ffea1621b8b365682c8b33eb88e1d0af49f2badfa2f2cdc1858187,openshift4/ose-tests-rhel9:sha256:2f5b97b5363d88869448f250e6171856f466fbbbfb61b1b4031438a948761501,openshift4/ose-machine-api-rhel9-operator:sha256:fdf3b790c4ebbb4a049a452ee65a4f15de7c6b1fa06227dec1e0f44879d33d3f,openshift4/ose-service-ca-rhel9-operator:sha256:98bb7c54796d95984ff5d1ad3dfdda6f525dc014eb2f0187e54d4dd298a786c2,openshift4/ose-csi-driver-manila-rhel9:sha256:edfc57e4bcc7cfb48bd6a7ff9b0d50e83a63d35617c5620276a5ce3af20ea52a,openshift4/ose-multus-admission-controller-rhel9:sha256:78d21fcf562cac4d525153a03c574bb2a9ad71d50f955e263f06e2fb2b1daa08,openshift4/ose-operator-registry-rhel9:sha256:46623fe33e5d8b6eb551a012f5b444849b335a5bbd1726c274c28b8491e955de,openshift4/ose-vsphere-cloud-controller-manager-rhel9:sha256:b73ade6d149819e41a72599e2ea12b6a338d5ebd4d9e24e41178a1e2c31971f1,openshift4/ose-vsphere-cluster-api-controllers-rhel9:sha256:3dec3cd2684454252fafbf586887260e6bdade69108adfb7e51fbb18b4113bb1,openshift4/ose-aws-cluster-api-controllers-rhel9:sha256:53e8497893e6f46bd7ad043ff6bfae1cbfe6c4c07fad1f885a36f4be795e721a,openshift4/ose-azure-file-csi-driver-rhel9:sha256:0e9f3d7c4b43d2bee87a949509ce5c4874c9798381c388a97e2cb78991875098,openshift4/ose-container-networking-plugins-rhel9:sha256:02e7ac2e1760b25524229771a745c55006738b812c7ca03f5b8b4abd7d575c1a,openshift4/ose-hypershift-rhel9:sha256:1598a3a15eb623d10cc95a97996611c0949450cff57257b2d1851c8d83657a39,openshift4/ose-csi-node-driver-registrar-rhel9:sha256:923ed79b073776da329dbacd0dc79f7f4aff32c85c2863a36b00bdbd4c71a534,openshift4/ose-olm-catalogd-rhel9:sha256:f382ef885d8be8e7007416722029689f2b8ec1fcff45f3f405f4dba5afde7d9d,openshift4/insights-runtime-exporter-rhel9:sha256:e3d8de992a85be6b07bb0ce76d1c7626edd17168e7fa8db84abb579f78d33ea2,openshift4/ose-operator-lifecycle-manager-rhel9:sha256:fe0eedb70254c83eda2b74ac52833ef36c87e18a7ad16cbe88bb22e59d5e0a65,openshift4/ose-vmware-vsphere-csi-driver-rhel9:sha256:ce9541fe136ef5bab259ba766e792b4fcebc4168f91321660c182ad9dc811d17,openshift4/ose-gcp-cluster-api-controllers-rhel9:sha256:1f367b5beb2e936c60a92e3f174a4bb14e89088764423d0b4e68472fa0c1cee2,openshift4/ose-gcp-pd-csi-driver-operator-rhel9:sha256:db8ecd1162e094b6cb166b88dfa40258f31cdc4db3ca7f6a9b110893bc27d044,openshift4/ose-ibm-vpc-block-csi-driver-rhel9:sha256:cb7579bc13026888d51e2786bb35ca7c3b6bc9dedfff0a4435b4eba16c74a56a,openshift4/ose-openstack-cinder-csi-driver-rhel9-operator:sha256:f6929fc57fcf0e9c7d26b858afa505278f09fa81a854050194253e2b84fabb94,openshift4/aws-karpenter-provider-aws-rhel9:sha256:9414bd27ae196de5d952d6689530d09632bc529ea73e29ab09a2a9e8aaed601e,openshift4/network-tools-rhel9:sha256:0057c9d6f289ffb3d2aea3798300a64a567004822ec5e1a8a0b10b27763df84b,openshift4/ose-csi-livenessprobe-rhel9:sha256:983cf2a5eeac9d36093b054d5cc74573f1c21f13f04ab4a26f988e0711a9d741,openshift4/ose-cloud-credential-rhel9-operator:sha256:d69d1884d60a78838900fb8ac8aa010ffe8a9814bd05c5fd23640ffb2fe62078,openshift4/ose-openshift-controller-manager-rhel9:sha256:1a4113be9b397043d16313b767fffe13aacf8f4ac7648916ee15224a76cf2fec,openshift4/aws-kms-encryption-provider-rhel9:sha256:036bb662ae8841d8f9acc6249419daf627851a5ce8ae77a7c6fca5bd105803de,openshift4/ose-cluster-samples-rhel9-operator:sha256:6e44082e909372715fb8612484c5fe0ad82699620fa530e75f10d41396ef6d63,openshift4/ose-machine-api-provider-openstack-rhel9:sha256:23c4ce9a3efd2b7cfe52406aa0df67bd6b17e2ff2583980b24e5f71c4e69bdd2,openshift4/ose-prometheus-node-exporter-rhel9:sha256:29390d73ac7d0a53652e069cca4357444622048cf63f904415a7fac2adbe66f1,openshift4/ose-machine-api-provider-gcp-rhel9:sha256:c848d97da53997ed67654ed4cd558961e4ced5fe80860831f6100f27bb97316c,openshift4/volume-data-source-validator-rhel9:sha256:a1bd55517958d9320e04f417ebcdae6ebd6b3fcc9d4cd683c54686c7660205df,openshift4/ose-ovn-kubernetes-microshift-rhel9:sha256:fd9a7c1b3d8bcd779e02925e2bd9d79f0c3f839636cb5fc66181eaece5dead1c,openshift4/ovirt-csi-driver-rhel9-operator:sha256:c1bef96bc0b79e4462606d3e42ed71e4d37ef14d2bea928b592272a149db9d11,openshift4/ose-cluster-kube-cluster-api-rhel9-operator:sha256:40df3615b05196db64a457c31c61e8caddaa6a399fcdeaba352fd98b539280c6,openshift4/azure-kms-encryption-provider-rhel9:sha256:f197822b0f5b6bf90f93c0d33a301539e80db2af758620177355245dcbf41c73,openshift4/ose-installer-altinfra-rhel9:sha256:c6cc733249fb7a1766cf1a858627b53c064e1b80344048832198c704a1402305,openshift4/ose-docker-builder-rhel9:sha256:0b6e5bd62d314b68d842adfd311c3085f3238c951411ebf921e15cbc0218ed56,openshift4/ose-agent-installer-utils-rhel9:sha256:18b5b21ee15093503e1e3d2f6446ef3f5ffdca30bb50cc9f67dc7596930cb449,openshift4/ose-csi-external-provisioner-rhel9:sha256:498b1ac6d09e948fcdea92834532df0705a30a579ff7d85bd91673718dd21281,openshift4/ose-azure-workload-identity-webhook-rhel9:sha256:579ffbef2f9dbc881a763a687d82d071a4d3d35119c39e4c95abe9fa5ed14f8b,openshift4/ose-vsphere-csi-driver-rhel9:sha256:09efa5733cb84096f83209b6488e792758a2cf1710e73542313f6c79044d8f1b,openshift4/ose-operator-registry-rhel9:sha256:50a5e02ec64acaf1dd68b29f334968e792661075440173452dd56293b227294d,openshift4/openstack-resource-controller-rhel9:sha256:e26d8456983b600e7248b5741030a68531e5d0f45666e6e3ae02ffc55ed0f906,openshift4/ose-ovn-kubernetes-rhel9:sha256:b58f195d83635a36d05f1e187afa32e698ce14d509c03b47f984a01a87a5a681,openshift4/ose-pod-rhel9:sha256:3d8a01e5261cbfa7445bda3f0c0e0835dfb24f408c365909fb3af4098ddb3f52,openshift4/ose-multus-cni-microshift-rhel9:sha256:a42d5ec3c0b582a70bfb2297f3f7461f4b516aa28ea8a6c12c6bca2af51a9e7e,openshift4/ose-tests-rhel9:sha256:d464b4bd9d86b902c8836110faafe8c349da3bc03a7b352a2bd2f02e54069570,openshift4/ose-ovn-kubernetes-rhel9:sha256:e6bfef60bff5002e1ef5d8de49aba8bd23af0ee1b51d1acb303006265938d8b3,openshift4/ose-cluster-machine-approver-rhel9:sha256:bac707fa58814cbb18aa0e27b99ec64d6cc843cb3397679e6965d2ef6970bcea,openshift4/ose-cluster-dns-rhel9-operator:sha256:226cc05403576fbcc6d40b001ea969402a5e98cefd9444329396de56ab21c36a,openshift4/ose-cli-rhel9:sha256:84bb6d21f277a76efabb70c8b7833342825d23bd3d9dce787deca6e7209bf5c9,openshift4/ose-cluster-version-rhel9-operator:sha256:81188efa2e00bc27801f5d59476733c6597d669af5f2bfa7d3d14dbad9b6ad2b,openshift4/ose-cluster-storage-rhel9-operator:sha256:d91fdcc0e8bbd15d091c316a5bfeb683a7e9982ddf474724f49acedac349c48b,openshift4/ose-cluster-config-api-rhel9:sha256:bd73d46f84a3ea496f235d6a3a04eb0e7c936c286c5d9c06881db9b576a263b3,openshift4/ose-cluster-monitoring-rhel9-operator:sha256:caaa2e3b13997448aa327eccce27a4aa7223a80e9d736e20a88c3e960f3c63d1,openshift4/oc-mirror-plugin-rhel9:sha256:97d075f6a0c08361b3f207632d98bdf276a9eb0ec0e79d54ed13550edee42c38,openshift4/ose-machine-api-rhel9-operator:sha256:6dc46cd772418b3e588340cc7ad1fc487cd5aec7569b9f26feb281e5f7b2ecc6,openshift4/ose-cluster-node-tuning-rhel9-operator:sha256:6a2409119ce2a370e3e33f5022cfe4a740661396ede914725a2a8b5279d89fe2,openshift4/ose-kube-storage-version-migrator-rhel9:sha256:a5b2d725a553acaedfdffe416e8025e3afe56d612e2e0b7175b3e4d89d0db4d2,openshift4/ose-cluster-dns-rhel9-operator:sha256:31cfaa2d2f5cc542c20d130fbc5532f0c827082a8d9fe593d96ea2807d6c77fb,openshift4/ose-cli-artifacts-rhel9:sha256:d4bf99c7d24e005417edb1f688e5aabe2a432baee4f0df0684f57a79ad86d00e,openshift4/ose-machine-api-provider-azure-rhel9:sha256:bd7c2cf93fc50c672e942edf0fad854847f3a9a937f18e31894b8606b71068b0,openshift4/ose-azure-workload-identity-webhook-rhel9:sha256:2c0d1db3e0f37f09115d3f1af5ace12911311f70f4ceb574025fb1ed9552575a,openshift4/ose-agent-installer-node-agent-rhel9:sha256:2ad3be815abfa60205bc0de77557f8bfc6ee8b80e3d25ee9cd1088a5e3f6bf8d,openshift4/kubevirt-csi-driver-rhel9:sha256:e357242b61cd31717c676e29b26a290c5a0a99eaa955059a38029c31320b6b0f,openshift4/ose-monitoring-plugin-rhel9:sha256:3dd9ca3b6c119ebeeb38e5529407f1889ce2c06c11f15bbdb38955caf2a3a44d,openshift4/ose-console-rhel9-operator:sha256:0bb318828b87e7fd8771289955dacb1c1d2efb2fbb7247f126e4910555fb2405,openshift4/ose-ibm-vpc-block-csi-driver-rhel9-operator:sha256:643ffd8e3648da54c7c87042bd55fb06c6610f4dc23327d917aa17662b1f2585,openshift4/ose-powervs-block-csi-driver-rhel9:sha256:73e71e52e82334bb3360e993db9f23650e42e30eb934d0c289afde412ccb7671,openshift4/ose-operator-framework-tools-rhel9:sha256:c34e3b2772aa6329401c1dffa8316d3516368cfaa095a9cba95628bd9ad2a7d0,openshift4/ose-prometheus-config-reloader-rhel9:sha256:8a6eb3f7aa663f0a558fb228fbe633d795c527c17b86fe2d469271c0f9ef9755,openshift4/ose-csi-external-snapshot-metadata-rhel9:sha256:1560bc58a43485387fda173fe0a8a396c2f6b038202bd9863c85d1b666f3ddc1,openshift4/ose-azure-cloud-controller-manager-rhel9:sha256:888a84a4f13c96f918e1c87759f481ede872d097c170f76780888f0c769301b8,openshift4/kubevirt-csi-driver-rhel9:sha256:b9cf1116ad028c8b358eb013d9751aec24eda566a74325123ce18c10bade1e13,openshift4/ose-azure-cluster-api-controllers-rhel9:sha256:39f7c7176125c49d751b48b42dd9dbd62a4a315e40994a02a747a46db8cc860a,openshift4/ose-agent-installer-csr-approver-rhel9:sha256:108a7a51d66e89d3903bf82d1c9f6526cb908c58973fb8c86301fa9b5c8f5ca5,openshift4/ose-cluster-api-rhel9:sha256:47e721205ff64d2cd94f17a704c315ab4f48601dc446c6fdbf6d0651af0e282f,openshift4/ose-csi-external-resizer-rhel9:sha256:945445222439a7eba2a6e63cf71b183e66443c2aba69092e10f4deae6f85e66d,openshift4/insights-runtime-extractor-rhel9:sha256:12521bfd441d9b3db4d86a4f0d1c2818064ecc152bb9d78cfdad35652f173703,openshift4/ose-prometheus-rhel9:sha256:02c332adf9d78c5c1a6e899a489b22053687d1c611e3bc99704ab44aa60f7807,openshift4/ose-csi-external-provisioner-rhel9:sha256:f1fdf87492d66f03cbca16cbdb07607481041080c244d94c59a773cbe5457734,openshift4/ose-baremetal-machine-controllers-rhel9:sha256:bba88a8f8b41c76aeddd25012b4dcb14da6d896763ba6a003ca824260b8c24e6,openshift4/egress-router-cni-rhel9:sha256:6e44853b234041d8d20d92f176b8e75f13b05c62410aa96ac57decdc5a179ae9,openshift4/ose-operator-lifecycle-manager-rhel9:sha256:e4a7b62415a27923486134990109d62b24ab70f946b6e334b11c33fee4cd2134,openshift4/ose-prometheus-operator-admission-webhook-rhel9:sha256:d6020264e2d560cb396757e9061455568ff5fcee405f9d5ef5b07abf9bd16c27,openshift4/ose-csi-node-driver-registrar-rhel9:sha256:b2c1423302c27b56725d91ef0c9dc34903eecee9b0e8bf6761f179bfcc48cd32,openshift4/ose-baremetal-machine-controllers-rhel9:sha256:e3911f49bbf3df9a83fdc08aef8de0473c90eb96f7c459d3c6750f9a85065150,openshift4/ose-console-rhel9:sha256:2d5a9f1213ef66cd474cbbe11dce4c37a56613cb136fddc8a5a93ac63ebb79d3,openshift4/ose-network-interface-bond-cni-rhel9:sha256:fd8d038dbe94462e77083557fa5e248225dfc4830fcd0a98a92c6166b549db65,openshift4/ose-csi-livenessprobe-rhel9:sha256:178cf1edf9a80f37bbb19597a34bdd8edfed5e44af3ff7273a46a7b4fb7fe964,openshift4/ose-prometheus-operator-admission-webhook-rhel9:sha256:25daab414833b6f1f0f91b7a55935ed5cfd7aaad5d2f0eb8674a06a603187059,openshift4/ose-csi-driver-nfs-rhel9:sha256:afcd51e5d51313d108a2ba7aa2be93dc3a1055a1c578988baa10bf0fb1eaaf78,openshift4/ose-machine-config-rhel9-operator:sha256:da8d61470c3c3120912a4c05fb149d404da73c1cc654faa36c5311b3ba47c554,openshift4/ose-agent-installer-api-server-rhel9:sha256:5a3945e350248697a15a6c76fe1ce18a6bccf75c671431a007011e0382f3c0ae,openshift4/ose-powervs-cloud-controller-manager-rhel9:sha256:f3633e00ebc485a42b14e061711574a78d44ca89c5e3fbb246d835a3ca6fbe32,openshift4/ose-prometheus-config-reloader-rhel9:sha256:5ba53ce20c10e348f5d4683419f83c51e8ef10c43e750ab589328b52f90c72b4,openshift4/ose-kube-storage-version-migrator-rhel9:sha256:b7694580f54417a5114f97099702dad2612769e3cbd37e9fbbae76d6234f138e,openshift4/insights-runtime-extractor-rhel9:sha256:f9fb910e3a55c4023201befe8e29197f3a60b3c62b7814903bcef5554b939857,openshift4/ose-cluster-cloud-controller-manager-rhel9-operator:sha256:786c62c9eab9cb68788ddef5dee8ecd74e03a1197293a3047adacd489e034dda,openshift4/ose-vsphere-problem-detector-rhel9:sha256:5ff7cea307bba36d569d6d66b4d3e116f52b69441cc071b830310d9f4134f02a,openshift4/ose-nutanix-cloud-controller-manager-rhel9:sha256:59be2e1d16268330964c6597a327dc3998428d8256a7579e774dd8922025d7f7,openshift4/ose-image-customization-controller-rhel9:sha256:59a251157e8aa68bde3d1953a52c2e3d34faeb9088340c7f5f8e818e82acef7c,openshift4/ose-cluster-config-rhel9-operator:sha256:416fe4e736d5f3e3b0e4668fd2f092ae855a4073d18a064bdcca73ff5450b77d,openshift4/ose-openstack-cloud-controller-manager-rhel9:sha256:1987d9d58f7de0034cb415ee78f358ed69ef9612cddd9d12644efab8d4bf9c42,openshift4/ose-hypershift-rhel9:sha256:d2137f1cbd01473f0f59113acd49c366ab07cf2be96b847114f2eccc5574cf70,openshift4/ose-csi-external-snapshotter-rhel9:sha256:3103f047640ab1921830663a5faab9bc3d51da679f94fef231c707b25470cf6c,openshift4/ose-ibm-cloud-controller-manager-rhel9:sha256:a0d654463288adab9acd6dd6bc5e9bfc05b60081e77877e285b60738c4210077,openshift4/ose-powervs-block-csi-driver-rhel9:sha256:82f53b70f880581287554b90759c0ff9737a7a676e5341794faad3e55366cde7,openshift4/ose-azure-disk-csi-driver-rhel9:sha256:c8465593ab64a8f5d375a16e3f56b16ce84d533089954f2b701edda4cbe9e778,openshift4/ose-oauth-server-rhel9:sha256:25f015786ca305a2bd100695adef64936782586725477c67bc43a42402e9a4a0,openshift4/ose-cluster-openshift-controller-manager-rhel9-operator:sha256:5c95ed5c32e99605bb0c2019351d7c60b56c6f2b656472fb5ce2f2a1df7ebb07,openshift4/ose-azure-cluster-api-controllers-rhel9:sha256:1ca19d85c3292c21204e071e8c0a65e4e03324f89af64a1d779ff4f55770ad8f,openshift4/ose-cluster-openshift-apiserver-rhel9-operator:sha256:89ebc4720e5383cdb80a0fc1ee17cee063f9416495ac11a903df339bc649e2e5,openshift4/ose-agent-installer-utils-rhel9:sha256:028494602a8b94d90b098a0e6aeba85f20615938490209378619935a6c8bc447,openshift4/ose-cluster-csi-snapshot-controller-rhel9-operator:sha256:9da0116d6b0b4f33ca7ccfc26658ec79c8a4ba17f8a63d0bd399ec26808382fd,openshift4/ose-kube-proxy-rhel9:sha256:ef8ebb3fea262feea3626347b9b3e07fda0e288ffc61f8b2dcfa6851e4e9b141,openshift4/ose-kube-storage-version-migrator-rhel9:sha256:9edb1bba41b757bc30ccc0bd7d823f3574e21195a1a4075a31ae5bea6fcea516,openshift4/ose-cluster-autoscaler-rhel9-operator:sha256:95e1c1a4af1beaf0421b715925dcca55edb7ab8c86b8927dece3467e59c47482,openshift4/ose-hyperkube-rhel9:sha256:7ede51978a537c20cf89f7e2c469034859ef89b1f34b3a8c89a727378746bd24,openshift4/ose-gcp-cluster-api-controllers-rhel9:sha256:e74e44e4f418e3f2f7bf433c9cd8d556a6e7c4aa07f9ec82190e2d3f5188daf1,openshift4/ose-etcd-rhel9:sha256:2fff2ecb2b19603744be8e2821f401a9e0234ce1b4ac15c27223c10e24ccc7b0,openshift4/ose-oauth-proxy-rhel9:sha256:104695f5af8d078328a7f48d7dc1200319db5fd8e3444406c5161e0aeb8fc10b,openshift4/ose-csi-driver-manila-rhel9-operator:sha256:fb2df252487a734b3e051ff54713a7689f7f1e8cd93557f846458f54d3776162,openshift4/ose-installer-artifacts-rhel9:sha256:19a89d0373af1265e09e12bd377e5bf631e5fb58c36b2f73b8ca86d186bb0840,openshift-service-mesh/istio-rhel8-operator:sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23,openshift4/ose-vsphere-csi-driver-syncer-rhel9:sha256:0cea9ba28352ddc05f97f6811c04e0f320e870ce99f6a88b8a635cc62ba67f4c,golang-0:1.21.13-14.el9_4,openshift4/ose-installer-artifacts-rhel9:sha256:09c9f0fc1eb4f8249b7d31f903b38b6a98ff7eaf3ff3dc9d57ee46ac3ede71f9,openshift4/ose-operator-marketplace-rhel9:sha256:0cc7c59785bbac7fb74f4bf928c9d4857e14f9807e67f05e9c66a961de66ce51,openshift4/ose-prometheus-operator-admission-webhook-rhel9:sha256:953d27a225357936648594993538dd3e3d952c4dabfd8f47790a903481551681,openshift4/ose-agent-installer-csr-approver-rhel9:sha256:f4f78fda0baa299dcf7ac093ca782970074760999f96fcea9d170c9cd35455ee,openshift4/ose-azure-cloud-controller-manager-rhel9:sha256:0f6d80e175d9165dd41da793921d5d6f69cf536c5d16e745b445979b0282045c,openshift4/ose-cluster-capi-rhel9-operator:sha256:102d9373277989a2d4457686211ca5cf337d873a35c7698403ec7a46c929a16b,openshift4/ose-cluster-autoscaler-rhel9-operator:sha256:dd5537f856bf3d86da38de94c7ee6fb9851b262515a4efee6aa1230924755721,openshift4/ose-docker-registry-rhel9:sha256:20bc3672a7b6aa6540d2865a8954997052d62055f8a81c05d43e80c77ab24e9e,openshift4/insights-runtime-exporter-rhel9:sha256:4bff8e6c2036c475175b402d239dddd1a7ba3f60ac6651ea3f6667707741bc9d,openshift4/ose-must-gather-rhel9:sha256:42cf0a1f66357b0054b4932b2952489fcb46182e4ff04501ec3b8ec4fc86b5c5,openshift4/ose-multus-cni-rhel9:sha256:8820d4283d1076c069fba2ef244c43ed97ec264ab803df3f1e3277b7adeb31f1,openshift4/ose-tests-rhel9:sha256:ca003a5430003fdc23da191cb1ad662b36acbed76c201ff0b00bf3f171463e6c,openshift4/ose-docker-builder-rhel9:sha256:850822810478d3eb9a90d65d98633bc55f783a3cfc9d804eeb2b7fe6b20d7387,openshift4/ose-csi-external-snapshotter-rhel9:sha256:64e1b9fd351ac5ee0427dd131b0dccfa961b07df2dc72225f59090acab8886cd,openshift4/ose-azure-disk-csi-driver-rhel9-operator:sha256:017f982fb763a0eea61580758d4f69ec14bb78e5b5d107503276683336f9983c,openshift4/ose-agent-installer-api-server-rhel9:sha256:85b66f1e1b6ca493592c62215cf8e94d29d6f1bcb68c146a7466133f661cff9c,openshift4/ose-cluster-monitoring-rhel9-operator:sha256:7426b65a3e619303aa1a565226e25437b7601c415c5efc1014e2c99c44a527aa,openshift4/ose-multus-cni-rhel9:sha256:aef51b317a2b91ef8adb082910d0d14e022acf25d4ec18478850ca3af231fe7e,openshift4/kube-metrics-server-rhel9:sha256:6fae105a929859ba794653d7b02d10980f94a140f39c06c2376d5fdb098995aa,openshift4/ose-cluster-version-rhel9-operator:sha256:dfb848cb68bea17a789a807b5edadba37a02947c506b8fa58d8b6376cfd3fe48,openshift4/ose-image-customization-controller-rhel9:sha256:b040fd7da964ff9d19353082affcbe1068239f02d45f72a8ebcf8df274f278ce,openshift4/cloud-network-config-controller-rhel9:sha256:1675f4cf4337e6ee6f4b0506017f95e48775b58ae80b02f24d2d6cf4b24e0897,openshift4/ose-cluster-monitoring-rhel9-operator:sha256:a973533a2ecfa414c1f95c4d8ffdbe85f18969a740c19d3b8c4d2096f17a94bf,openshift4/ose-cluster-network-rhel9-operator:sha256:12f1e84fdd0ca084e018f3f9ca550bfe183412dfe42fc9ccb356238ddc572a2a,devspaces/udi-rhel9:sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1,openshift4/ose-openstack-cluster-api-controllers-rhel9:sha256:d3ffde90e606b0344c39f8668dc629f919612cc5a3475e8fbd15aa1bb807a42f,openshift4/ose-cluster-policy-controller-rhel9:sha256:182e148ddb5ae83c7540564f0975f28c17fd859912bedd6392231fee95060d69,openshift4/cloud-network-config-controller-rhel9:sha256:a13438f2806152ec0430d13675f3dc6bed876fdc97028718b78967f1d8910eea,openshift4/ose-oauth-apiserver-rhel9:sha256:852a40e0bf7ba727a9a4f4e65d820184f69d3b6410afeaee5b7c25da9d6222f7,openshift4/ose-csi-snapshot-controller-rhel9:sha256:ae9f9c747fc7f26dc4fe31644db03b93c7de10384eae1dd40b40767c2e654667,openshift4/ose-multus-admission-controller-rhel9:sha256:f045f6d75001bd8164bbbae0e73747d3fc4b8f1ce9ff4943da31001381662ead,openshift4/ose-kube-rbac-proxy-rhel9:sha256:8b352916605c20d6d41068b37b32c1847761654bab5e624d5c7f69b94b1c0654,openshift4/ose-agent-installer-orchestrator-rhel9:sha256:2dc4504d4a998509d70dee64ecabe78dce5551769bd51a39d2618316a6b204c7,openshift4/ose-csi-driver-manila-rhel9:sha256:9d807221e98130e63530f757157207556a7b2bb7fe7587f0d7c5f9d1ac9592d0,openshift4/ose-vsphere-problem-detector-rhel9:sha256:45f40bdf8441572e245c4294195a8d4c10821583ec1665bef42dbc86fb5822c5,openshift4/ose-cluster-etcd-rhel9-operator:sha256:25db07689f639f79919d6f028a10375fb9b68abfd9cf55829333d0360a7acf99,openshift4/ose-cluster-openshift-apiserver-rhel9-operator:sha256:00f150e9a977b547e1511fbd0972027a01bdf4852bfaa5b7c21a01f1bb9cdc76,openshift4/ose-baremetal-cluster-api-controllers-rhel9:sha256:a5c7ae5ed3dc592dccff0a4ed019b558bc0111552287db7cb09c199cc52c74c1,openshift4/ose-csi-external-provisioner-rhel9:sha256:16ac552088d7bdff558474c576f77f8091c009eb49a13d8bdac756161491e4e4,openshift4/ose-baremetal-runtimecfg-rhel9:sha256:aca445a3fafbe1c1b1b299a125de506617250152ec9f5d7cd9e0a308a2b532ab,openshift4/ose-container-networking-plugins-rhel9:sha256:bcb139bd20b7cd79ee16cf8968dfcb0a5a3398bcfa734dcc2c2ec47dda46a93c,openshift4/ose-gcp-workload-identity-federation-webhook-rhel9:sha256:c8a1a13f5a36513e22f8db1345386f1835eac5b7f809c6745fe43afe8372ed92,openshift4/ose-azure-disk-csi-driver-rhel9-operator:sha256:b79947b0015b88a5e6b09d99d6f5026d868ca2c810bb7be21832362a62918f84,openshift4/ose-apiserver-network-proxy-rhel9:sha256:3322914e1219da147d36aee3121d4d4b42bb619419535942aa9108f6918d8e3b,openshift4/ose-docker-builder-rhel9:sha256:78f92ad65baee06e314611b83e07e7a87dc4e3994ecb76b5b3b2a2039c1aa2b3,openshift4/ose-etcd-rhel9:sha256:c8fb2862a03154ddc2591eeddd07003dc7c22556592eaae140b0039c70dbe657,openshift4/ose-cluster-authentication-rhel9-operator:sha256:e8bbd18a1d2d8a8eed42cc86d19a260f2bbe9379e35257c33cdb70980cbfa5f8,openshift-service-mesh/proxyv2-rhel9:sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d,openshift4/egress-router-cni-rhel9:sha256:82a2a3cc00c616964a3c24cf1095a005e4e573cb79c345e9004dbcd35e180c10,openshift4/ose-multus-cni-rhel9:sha256:aedb8ec541683a33066c8e4393fdef2b2940879da38f06e37bc4aa247038081d,openshift4/ose-telemeter-rhel9:sha256:d1d8e4246ccac8436bc696b9bbac8c102c26258e902f947c892c91084f7d41cf,openshift4/ose-nutanix-machine-controllers-rhel9:sha256:b368cfa913dbe0da22e9c6b10547a84ec3661815079f1817cd28e75e78012398,openshift4/ose-gcp-pd-csi-driver-rhel9:sha256:e43bb0e2b7af46bbfeff6809f44f401007498cae3cbc04a9c4e8f8033f3142d9,openshift4/ose-baremetal-installer-rhel9:sha256:b21deee9ea821fc595cd31a17515d4cdba75220c93293402560d0936fb712480,openshift4/ose-ibmcloud-cluster-api-controllers-rhel9:sha256:ab7d9c2e48415e4cd8a1584e942dd2bb98848aa657ee7293fadebbc6cf439c4e,openshift4/ose-machine-api-provider-gcp-rhel9:sha256:cfcc8beb3d7c66166b889f6bfe7ae8a396630519d15245113656652be2221613,openshift4/ose-ibm-vpc-block-csi-driver-rhel9:sha256:b27cbc2a5d54ec8bbf744ee483f2cc81b9101900ec9e229d362a8169ee72b29b,openshift4/ose-hypershift-rhel9:sha256:ae87015686b6cdad9f31ccf0b9eeac7b1a97e8a3c7ea59acb3b13990fc79cd2b,openshift4/ose-prometheus-alertmanager-rhel9:sha256:e8372947353c8a6e32dbce30650b91a1f09b20162fef90150a58f3d3764c0e86,openshift4/ose-kube-state-metrics-rhel9:sha256:dcde633d96ae797962a3bec581ef3078a5142b3131595e0055031195b798bc16,openshift4/ose-prometheus-rhel9-operator:sha256:e865bad23956b605474eaa4c5e637a14e5453a53522b145138f216e4909b5348,openshift4/ose-csi-external-resizer-rhel9:sha256:abfd8c69fd7ac41b2a46b8398370b79ff5f7388ce09d80bcb88180b160ac7c2a,openshift4/ose-ovn-kubernetes-microshift-rhel9:sha256:c3076f6ad851ec022590776e86a86c5552388edf897d9a0d39d0ad2ec2cd0b75,openshift4/ose-prometheus-rhel9-operator:sha256:4be800b359f4f043ea6535511a1b79ba7d1d2489164c5cbff98ada9f16699820,openshift4/ose-baremetal-cluster-api-controllers-rhel9:sha256:5b132b86c1b14a775ee77dafa3a72eb723358cbce6e710e44d279c8050c4261b,openshift4/ose-tools-rhel9:sha256:89eda303ead84ae119cc1a25ff11140068c8d18d9154e6a4e3eff26392235578,openshift4/ose-cluster-image-registry-rhel9-operator:sha256:880f19aed8c91200955d40d1f5af87c44265b0a3e02cfc8f3d7571de3d6d5c5c,openshift4/kube-metrics-server-rhel9:sha256:3c928586ae0b46feacd6570dee3ec49a5a204227e113432194bc353f6014dcbc,openshift4/ose-cluster-storage-rhel9-operator:sha256:15dc279ee7d74d79de4017a21dcafef0f59f27485168ac12fe853b4734324f32,openshift4/ose-cluster-policy-controller-rhel9:sha256:7cdb67f56903a6c4bd29610dc9a93ff24c225bcb0d29ba16c6742e169b15865e,openshift4/ose-configmap-reloader-rhel9:sha256:e0f6f48dfc0eb1f410ac198eb6ef6a9c6ee288fe4a01b7ef65e6b62f6b939153,openshift4/ose-aws-cloud-controller-manager-rhel9:sha256:648d28825b3a3ccbea7966ddf860e16b36daf7373e8a502b3406a83780df55b9,openshift4/ose-gcp-pd-csi-driver-operator-rhel9:sha256:18655da2bef64e072b45519106fa490570d275083ab2b3d942885fa744775f2f,openshift4/ose-cluster-ingress-rhel9-operator:sha256:8cb9c2ab556483071dc00957f70b2bf59d164874d99ab61da267b17db7e6be19,openshift4/ose-aws-cluster-api-controllers-rhel9:sha256:dcb372c4f5345fbc76242113efbdf4f857a82db4f5f9c2335a872608fb40f7a9,openshift4/aws-kms-encryption-provider-rhel9:sha256:f51d6640749d0b80892428c7eb2b54e1e75fc69311ce456c425afac40caec745,openshift4/ose-vsphere-cluster-api-controllers-rhel9:sha256:71ba62eea59cabd52467c6f88cab8297437711abb581c4301be6645da5fa271d,openshift4/ose-prom-label-proxy-rhel9:sha256:e8749dc60de7657ebf93e7226b47661b51d1daa4c5a4fecf336a17a0e0cf3c59,openshift-service-mesh/istio-cni-rhel8:sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4,openshift4/ose-multus-route-override-cni-rhel9:sha256:a52d88356641d43d4593124999dac07a846e1e1659d74a156d1b600bf668c566,openshift4/ose-cluster-ingress-rhel9-operator:sha256:2bb41b270973bd2db4b6ded25357ad5b4113e03a64a5f55bab27e6723902a79b,openshift4/ose-aws-ebs-csi-driver-rhel9-operator:sha256:952b83652c4613ee04ecf5c6cfa6961fd66fc865c84c99bff4f879512820bb60,openshift4/ose-azure-cloud-node-manager-rhel9:sha256:9c475eae10a67ed0dcd6b74e0ab0838b68d488b0dd45128a53671bbbe5610e50,openshift4/ose-cluster-autoscaler-rhel9:sha256:5db690533cf26e8bffc456e69dc1e0d2f9554f6770c5ac75ea9eb345e1c101e6,openshift4/ose-vsphere-csi-driver-syncer-rhel9:sha256:368f61e0cd92fd849a673ec2ea2f51e7e6d7c12ee886676409369a580d0347e2,openshift4/ose-kubevirt-cloud-controller-manager-rhel9:sha256:e0eb4ad399d815333330a0444eb6bea1d7bc1705e7035ba7c9985964dac7ee71,openshift4/ose-cli-rhel9:sha256:8eeb12229d09c020f7f71cc996853eb47ea1311b8426eb7fc6f28652766ded15,openshift4/ose-cluster-etcd-rhel9-operator:sha256:85c3ae7b4a757112cc9c858d34050f667f2577672c484372d38d1ef4dbe8d8b9,openshift4/ose-aws-cloud-controller-manager-rhel9:sha256:e4f534afec621975ef7b2389f239bc672eae0bc342fee2fbe9560e20e892e3c5,openshift4/ose-agent-installer-node-agent-rhel9:sha256:a377574a5438572cf6b6e42c5d6da2085a340235eaa3f5b883cf3fdd32935187,openshift4/ose-installer-rhel9:sha256:3ee2696cbb37838d53c0123d84d698b88db211c585005e6f5f53c005d3e218cf,openshift4/ose-multus-networkpolicy-rhel9:sha256:9ac3b13d328bdca2a50d286adf9f32621a3a059f3dedbb0f3414bbce3b1d83ec,openshift4/ose-powervs-block-csi-driver-rhel9-operator:sha256:5c312b21457753ed8c850d7fdade84bfc01ab2d0bcb3435e5a800ea1b57ce328,openshift4/ose-agent-installer-orchestrator-rhel9:sha256:a0514e0c9580b85e61b553b971d8d3a65f3cac4040ad6d74a3337db46d840feb,openshift4/ose-cluster-bootstrap-rhel9:sha256:ff4b5387f41bb8869703d9db6f150ce306d2a22f0cd4892b3c22ef673a117c8f,openshift4/ose-csi-external-attacher-rhel9:sha256:76f9906e7eb927bb8fb786670ae46b6fe742f38a806573267890180bd172367b,openshift4/ose-vsphere-csi-driver-rhel9:sha256:06d8d0acf4402fc4e78b12308975e249c730f348a2b4014961d15d48d3fa4ccc,openshift4/ose-prometheus-config-reloader-rhel9:sha256:e4f48095d3dbbf481a4f0044b496ade9fa59cdcd58f6aa9cbea97b3a77cfbb1d,openshift4/ose-cluster-authentication-rhel9-operator:sha256:3b33c868fbf71e96e890c58a682e387f655e9bcf8b446bd96568022fe14f8eb7,openshift4/ose-openshift-controller-manager-rhel9:sha256:646a707c50a3656bd6cec5b46960d4d27885135a1b2a4eac2f74fc8721723c3e,openshift4/ose-kube-proxy-rhel9:sha256:7414f3068e135ba5f9e0796967297f66dd619122e426dd8355a7d21c88c3ac36,openshift4/ovirt-csi-driver-rhel9:sha256:9705f3ca0e1fed96e556766c1d5b5e2047e4230ec3a3a57daeca21bfc152bfe7,go-toolset:rhel8-8080020260227110256.6b4b45d8,openshift4/container-networking-plugins-microshift-rhel9:sha256:7ed045e8c4ffd8421d54d6a4ff9ee3b8af00169d184f39fafdcbe689429e9a94,openshift4/ose-powervs-block-csi-driver-rhel9-operator:sha256:5ab3ec49626a92fe231033a247c066f93190b9867d39cc38791d90b179a72d04,openshift4/ose-openstack-cinder-csi-driver-rhel9:sha256:ee66f64d8b3832cfa270298dc1257226c9abe618918de7283d7ea3acc7bfa058,go-toolset:rhel8-8060020260227122329.97d7f71f,openshift4/ose-csi-node-driver-registrar-rhel9:sha256:758c6dcba66d80346151ac3a2d167a467501d03860b0106c07015b279045dc3b,openshift4/ose-openstack-cinder-csi-driver-rhel9-operator:sha256:70b7a546e0f44c7d9199768c24c1ba195ccad7faf7debfe6766b27ceaccfa177,openshift4/ose-aws-ebs-csi-driver-rhel9:sha256:b877e2430ca1ef3b575577dbe08d3b13fe1274c1bb20e065421cae418a6374a1,go-toolset:rhel8-8100020260212045823.a3795dee,openshift4/ose-agent-installer-api-server-rhel9:sha256:2270ecb6c5764c22ef26ab44749e5d689be49f2d6fd5f1b02575090049649a98,golang-0:1.19.13-23.el9_2,openshift4/ose-ovn-kubernetes-microshift-rhel9:sha256:35c93957d5352d7ec0f4003bfab9c55054174f86bef4af7a794d0fff008dc8f9,openshift4/ose-vmware-vsphere-csi-driver-rhel9:sha256:09efa5733cb84096f83209b6488e792758a2cf1710e73542313f6c79044d8f1b,openshift4/ose-machine-api-provider-azure-rhel9:sha256:556d277848c695d76ab33ae109b99e0448bbd60262b39ae7f5cdb5c052252b3b,openshift4/ose-powervs-machine-controllers-rhel9:sha256:8b5c97333dd8c721fc3aad2ef0860fff3a9cb67d2094d6a82ea3c6430b8474e8,openshift4/ose-openstack-cinder-csi-driver-rhel9:sha256:4722b86de25d9270629ca3a8ab6defe198eaab9a162fe95c16d34618fabc860d,openshift4/ose-cluster-control-plane-machine-set-rhel9-operator:sha256:b535c59c9313e608e195e94b91f33fcc87ea3b94cadc123e9007c4f33f6c807a,openshift4/ose-cluster-openshift-controller-manager-rhel9-operator:sha256:ad0b598016cb0aba3335d6d9bb01a2767fc3032baf24a2f8a2d857651a38222c,openshift4/ose-azure-file-csi-driver-operator-rhel9:sha256:2d265d4602d4313a1e1b1af20aae55dcc9d8499aa9c79255ae071450a6594b26,openshift4/ose-multus-networkpolicy-rhel9:sha256:d8311a67723d47b5d051d4c979f5a05d72158fe9646e1889af2ac47eecde7a0a,openshift4/ose-configmap-reloader-rhel9:sha256:968cd28dde80455fee7e31a07e9a4a747614994bdf60d0e868af80ec782db34c,openshift4/ose-cloud-credential-rhel9-operator:sha256:566eb9bb576c005a22766f53152929c1786a012db129b8ee428b16fbec266869,openshift4/insights-runtime-extractor-rhel9:sha256:0f645e3ac1917201fc4da7cdcaab4f1adcedda25cf5be84582c6a354e787f10b,openshift4/ose-nutanix-machine-controllers-rhel9:sha256:80ea2836ec34d2d2995c50a090e9a97623485c633c2cc39ed4fdce34c9f253dc,openshift4/ose-cluster-autoscaler-rhel9:sha256:51f46ad462e327983b8a40cf804dabe41ac41f7d44c3e729c7de5e1a7e8119a1,openshift4/ose-ironic-machine-os-downloader-rhel9:sha256:344a60ac1e833a349a8f24f3db2859e9fd0f45dd562ca50478973868e3669451,openshift4/aws-karpenter-provider-aws-rhel9:sha256:c31e5a4e0300d5a9444f73bab9f815f5fc43d23929276fe85c932dcfb6f82e78,
Package States: OpenShift Service Mesh 3,Red Hat Enterprise Linux 9,Red Hat OpenShift Virtualization 4,
Full Details
CVE document


CVE-2025-22873
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436992
Bugzilla Description: os: os: Information disclosure via path traversal using specially crafted filenames
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-22
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Compliance Operator,Confidential Compute Attestation,Confidential Compute Attestation,Cryostat 4,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,ExternalDNS Operator,ExternalDNS Operator,External Secrets Operator for Red Hat OpenShift,Fence Agents Remediation Operator,File Integrity Operator,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Migration Toolkit for Applications 8,Migration Toolkit for Containers,mirror registry for Red Hat OpenShift,mirror registry for Red Hat OpenShift 2,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Global Hub,Network Observability Operator,Node HealthCheck Operator,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Source-to-Image (S2I),Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat AMQ Clients,Red Hat AMQ Clients,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Edge Manager 1,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Lightspeed for Runtimes Operator,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Service Interconnect 2,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,streams for Apache Kafka 3,Zero Trust Workload Identity Manager,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document


CVE-2026-25547
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436942
Bugzilla Description: brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-409
Affected Packages:
Package States: Cryostat 4,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 8,Node HealthCheck Operator,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat AMQ Broker 7,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Directory Server 11,Red Hat Directory Server 12,Red Hat Directory Server 13,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Quay 3,Red Hat Single Sign-On 7,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document


CVE-2026-25537
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436945
Bugzilla Description: jsonwebtoken: jsonwebtoken has Type Confusion that leads to potential authorization bypass
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-843
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2026-25536
Severity: important
Released on: 04/02/2026
Advisory: RHSA-2026:3960,
Bugzilla: 2436937
Bugzilla Description: @modelcontextprotocol/sdk: @modelcontextprotocol/sdk cross-client data leak
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-367
Affected Packages: ansible-automation-platform-tech-preview/mcp-server-rhel9:sha256:5b189785e26a92105f7c78e445629064353f59e29ab1ced96e96cc9069a9a2ce,
Package States:
Full Details
CVE document


CVE-2026-25521
Severity: critical
Released on: 04/02/2026
Advisory:
Bugzilla: 2436950
Bugzilla Description: locutus: Locutus is vulnerable to Prototype Pollution
CVSS Score:
CVSSv3 Score: 9.3
Vector:
CWE: CWE-915
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document


CVE-2026-25518
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436941
Bugzilla Description: github.com/cert-manager/cert-manager: cert-manager: Denial of Service via crafted DNS entry
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-1285
Affected Packages:
Package States: cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Cryostat 4,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,Power monitoring for Red Hat OpenShift,Power monitoring for Red Hat OpenShift,Power monitoring for Red Hat OpenShift,Red Hat Build of Kueue,Red Hat Build of Kueue,Red Hat Build of Kueue,Red Hat Build of Kueue,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift GitOps,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Security Profiles Operator,Security Profiles Operator,
Full Details
CVE document


CVE-2026-1642
Severity: moderate
Released on: 04/02/2026
Advisory: RHSA-2026:4705, RHSA-2026:5581, RHSA-2026:4501, RHSA-2026:3638, RHSA-2026:4943, RHSA-2026:4235, RHSA-2026:5599,
Bugzilla: 2436738
Bugzilla Description: nginx: NGINX: Data injection via man-in-the-middle attack on TLS proxied connections
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-349
Affected Packages: nginx-2:1.20.1-24.el9_7.1,nginx-2:1.26.3-2.el10_1,rhui5/cds-rhel9:sha256:200c27e9b396276bd505c6b41127ac5eb1d94d620172cb818ae733f2a21ac524,nginx:1.24-8100020260223105706.489197e6,discovery/discovery-ui-rhel9:sha256:f80b4635aa39ed1f1633277939dd8a54374a65fc9fd24cc31a4bd88cdc3cde6d,nginx:1.26-9070020260219144748.9,nginx:1.24-9070020260219154412.9,
Package States: Red Hat Hardened Images,Red Hat Lightspeed proxy 1,
Full Details
CVE document


CVE-2026-1622
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436677
Bugzilla Description: neo4j: Unredacted data exposure in query.log
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-532
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,
Full Details
CVE document


CVE-2026-23065
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436752
Bugzilla Description: kernel: platform/x86/amd: Fix memory leak in wbrf_record()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23099
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436753
Bugzilla Description: kernel: bonding: limit BOND_MODE_8023AD to Ethernet devices
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23082
Severity:
Released on: 04/02/2026
Advisory:
Bugzilla: 2436754
Bugzilla Description: kernel: can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23110
Severity: low
Released on: 04/02/2026
Advisory:
Bugzilla: 2436755
Bugzilla Description: kernel: scsi: core: Wake up the error handler when final completions race against each other
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-821
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23061
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436756
Bugzilla Description: kernel: Linux kernel: Denial of Service in kvaser_usb CAN driver due to memory leak
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23056
Severity:
Released on: 04/02/2026
Advisory:
Bugzilla: 2436757
Bugzilla Description: kernel: uacce: implement mremap in uacce_vm_ops to return -EPERM
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71199
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436758
Bugzilla Description: kernel: iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23057
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436759
Bugzilla Description: kernel: vsock/virtio: Coalesce only linear skb
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-200
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23042
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436760
Bugzilla Description: kernel: idpf: fix aux device unplugging when rdma is not supported by vport
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71193
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436761
Bugzilla Description: kernel: phy: qcom-qusb2: Fix NULL pointer dereference on early suspend
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23052
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436762
Bugzilla Description: kernel: ftrace: Do not over-allocate ftrace memory
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-400
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23070
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436763
Bugzilla Description: kernel: Octeontx2-af: Add proper checks for fwdata
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23079
Severity:
Released on: 04/02/2026
Advisory:
Bugzilla: 2436764
Bugzilla Description: kernel: gpio: cdev: Fix resource leaks on errors in lineinfo_changed_notify()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23101
Severity: low
Released on: 04/02/2026
Advisory:
Bugzilla: 2436766
Bugzilla Description: kernel: leds: led-class: Only Add LED to leds_list when it is fully ready
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23068
Severity:
Released on: 04/02/2026
Advisory:
Bugzilla: 2436767
Bugzilla Description: kernel: spi: spi-sprd-adi: Fix double free in probe error path
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23069
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436768
Bugzilla Description: kernel: vsock/virtio: fix potential underflow in virtio_transport_get_credit()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-191
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23043
Severity: low
Released on: 04/02/2026
Advisory:
Bugzilla: 2436769
Bugzilla Description: kernel: btrfs: fix NULL pointer dereference in do_abort_log_replay()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71195
Severity:
Released on: 04/02/2026
Advisory:
Bugzilla: 2436770
Bugzilla Description: kernel: dmaengine: xilinx: xdma: Fix regmap max_register
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23103
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436771
Bugzilla Description: kernel: ipvlan: Make the addrs_lock be per port
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-413
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-71192
Severity:
Released on: 04/02/2026
Advisory:
Bugzilla: 2436772
Bugzilla Description: kernel: ALSA: ac97: fix a double free in snd_ac97_controller_register()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23089
Severity: low
Released on: 04/02/2026
Advisory:
Bugzilla: 2436773
Bugzilla Description: kernel: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23080
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436774
Bugzilla Description: kernel: can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23093
Severity:
Released on: 04/02/2026
Advisory:
Bugzilla: 2436775
Bugzilla Description: kernel: ksmbd: smbd: fix dma_unmap_sg() nents
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23048
Severity: low
Released on: 04/02/2026
Advisory:
Bugzilla: 2436776
Bugzilla Description: kernel: udp: call skb_orphan() before skb_attempt_defer_free()
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23059
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436777
Bugzilla Description: kernel: scsi: qla2xxx: Sanitize payload size to prevent member overflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23053
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436778
Bugzilla Description: kernel: Linux kernel: Denial of Service in NFSv4.1 client due to deadlock during memory reclaim
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-400
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23060
Severity: moderate
Released on: 04/02/2026
Advisory:
Bugzilla: 2436779
Bugzilla Description: kernel: Linux kernel: Denial of Service in authencesn due to too-short AAD
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1284
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23063
Severity:
Released on: 04/02/2026
Advisory:
Bugzilla: 2436780
Bugzilla Description: kernel: uacce: ensure safe queue release with state management
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2026-23051
Severity:
Released on: 04/02/2026
Advisory:
Bugzilla: 2436781
Bugzilla Description: kernel: drm/amdgpu: fix drm panic null pointer when driver not support atomic
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document