Vulnerabilities (CVE)

Filtered by vendor Redhat Subscribe
Total 5805 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-26601 3 Redhat, Tigervnc, X.org 4 Enterprise Linux, Tigervnc, X Server and 1 more 2026-04-06 N/A 7.8 HIGH
A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object, possibly causing a use-after-free when the alarm eventually triggers.
CVE-2025-26600 3 Redhat, Tigervnc, X.org 4 Enterprise Linux, Tigervnc, X Server and 1 more 2026-04-06 N/A 7.8 HIGH
A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.
CVE-2025-26599 3 Redhat, Tigervnc, X.org 4 Enterprise Linux, Tigervnc, X Server and 1 more 2026-04-06 N/A 7.8 HIGH
An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.
CVE-2025-26598 3 Redhat, Tigervnc, X.org 4 Enterprise Linux, Tigervnc, X Server and 1 more 2026-04-06 N/A 7.8 HIGH
An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access.
CVE-2025-26597 3 Redhat, Tigervnc, X.org 4 Enterprise Linux, Tigervnc, X Server and 1 more 2026-04-06 N/A 7.8 HIGH
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
CVE-2025-26596 3 Redhat, Tigervnc, X.org 4 Enterprise Linux, Tigervnc, X Server and 1 more 2026-04-06 N/A 7.8 HIGH
A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.
CVE-2025-26595 3 Redhat, Tigervnc, X.org 4 Enterprise Linux, Tigervnc, X Server and 1 more 2026-04-06 N/A 7.8 HIGH
A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.
CVE-2025-26594 3 Redhat, Tigervnc, X.org 4 Enterprise Linux, Tigervnc, X Server and 1 more 2026-04-06 N/A 7.8 HIGH
A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
CVE-2026-2272 2 Gimp, Redhat 2 Gimp, Enterprise Linux 2026-04-03 N/A 4.3 MEDIUM
A flaw was found in GIMP. An integer overflow vulnerability exists when processing ICO image files, specifically in the `ico_read_info` and `ico_read_icon` functions. This issue arises because a size calculation for image buffers can wrap around due to a 32-bit integer evaluation, allowing oversized image headers to bypass security checks. A remote attacker could exploit this by providing a specially crafted ICO file, leading to a buffer overflow and memory corruption, which may result in an application level denial of service.
CVE-2026-2239 2 Gimp, Redhat 2 Gimp, Enterprise Linux 2026-04-03 N/A 2.8 LOW
A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.
CVE-2026-0968 2 Libssh, Redhat 2 Libssh, Enterprise Linux 2026-04-03 N/A 9.8 CRITICAL
A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.
CVE-2012-0059 1 Redhat 2 Network Proxy, Satellite 2026-04-03 4.3 MEDIUM 4.9 MEDIUM
A flaw was found in Spacewalk-backend. This information disclosure vulnerability occurs when a system registration XML-RPC call fails, causing cleartext user passwords to be included in error messages. Remote administrators can exploit this by reading server logs and emails, leading to the unauthorized disclosure of user passwords.
CVE-2011-3344 1 Redhat 2 Network Satellite, Spacewalk 2026-04-03 4.3 MEDIUM 5.4 MEDIUM
A flaw was found in Spacewalk. A remote attacker can exploit a cross-site scripting (XSS) vulnerability in the Lookup Login/Password form by injecting arbitrary web script or HTML via the URI. This can lead to information disclosure or unauthorized actions within the user's browser session.
CVE-2011-2927 1 Redhat 2 Network Satellite, Spacewalk 2026-04-03 4.3 MEDIUM 5.4 MEDIUM
A flaw was found in Spacewalk and Red Hat Network Satellite. This vulnerability, known as cross-site scripting (XSS), allows remote attackers to inject malicious web scripts or HTML into web pages viewed by other users. The flaw is triggered through vectors related to Search forms, enabling attackers to potentially steal sensitive information or perform actions on behalf of the victim.
CVE-2011-2920 1 Redhat 2 Network Satellite, Spacewalk 2026-04-02 4.3 MEDIUM 5.5 MEDIUM
A flaw was found in Spacewalk and Red Hat Network Satellite. This cross-site scripting (XSS) vulnerability allows a remote attacker to inject arbitrary web script or HTML into web pages through various input fields, such as the "Filter by Synopsis" field. This could lead to the execution of malicious code in a user's web browser, potentially compromising user sessions or disclosing sensitive information.
CVE-2011-1594 1 Redhat 2 Network Satellite, Spacewalk 2026-04-02 5.8 MEDIUM 6.5 MEDIUM
A flaw was found in Spacewalk, as used in Red Hat Network Satellite. This open redirect vulnerability allows remote attackers to redirect users to arbitrary web sites by manipulating a URL in the url_bounce parameter. This can enable attackers to conduct phishing attacks, potentially leading to unauthorized information disclosure or credential theft.
CVE-2026-0965 2 Libssh, Redhat 2 Libssh, Enterprise Linux 2026-04-02 N/A 3.3 LOW
A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.
CVE-2026-0967 2 Libssh, Redhat 2 Libssh, Enterprise Linux 2026-04-02 N/A 5.5 MEDIUM
A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.
CVE-2025-12801 2 Linux-nfs, Redhat 3 Nfs-utils, Enterprise Linux, Openshift Container Platform 2026-04-02 N/A 6.5 MEDIUM
A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
CVE-2026-3190 1 Redhat 1 Build Of Keycloak 2026-04-02 N/A 4.3 MEDIUM
A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure.