Red Hat threat watch

Red Hat product CVE coverage for Enterprise Linux, OpenShift, virtualization, and enterprise platform packages.

Vendor watch hub

What this page covers

The Red Hatwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Red Hat activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

26

Active

11

Featured

18

Unique CVEs

20

Most recent entry

Apr 10, 2026, 1:16 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Red Hat watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

openshift ai vulnerability (CVE-2026-5483)

CRITICAL
watchNVDCVE-2026-5483

A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could enable an attacker to gain unauthorized access to Kubernetes resources.

Apr 10, 2026, 1:16 PMOfficial source

mirror registry for red hat openshift vulnerability (CVE-2026-32590)

HIGH
watchNVDCVE-2026-32590

A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server.

Apr 8, 2026, 1:25 PMOfficial source

mirror registry for red hat openshift vulnerability (CVE-2026-32589)

HIGH
watchNVDCVE-2026-32589

A flaw was found in Red Hat Quay's container image upload process. An authenticated user with push access to any repository on the registry can interfere with image uploads in progress by other users, including those in repositories they do not have access to. This could allow the attacker to read, modify, or cancel another user's in-progress image upload.

Apr 8, 2026, 1:25 PMOfficial source

advanced cluster management for kubernetes vulnerability (CVE-2026-4740)

HIGH
watchNVDCVE-2026-4740

A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certificate that can be approved by the OCM controller. This enables cross-cluster privilege escalation and may allow an attacker to gain control over other managed clusters, including the hub cluster.

Apr 7, 2026, 10:17 AMOfficial source

virtio-win vulnerability (CVE-2026-5165)

HIGH
watchNVDCVE-2026-5165

A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device undergoes a reset, it fails to properly manage memory, resulting in a use-after-free vulnerability. This issue could allow a local attacker to corrupt system memory, potentially leading to system instability or unexpected behavior.

Mar 30, 2026, 10:16 AMOfficial source

build of apache camel - hawtio vulnerability (CVE-2026-28369)

CRITICAL
watchNVDCVE-2026-28369

A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one or more spaces, it incorrectly processes the request by stripping these leading spaces. This behavior, which violates HTTP standards, can be exploited by a remote attacker to perform request smuggling. Request smuggling allows an attacker to bypass security mechanisms, access restricted information, or manipulate web caches, potentially leading to unauthorized actions or data exposure.

Mar 27, 2026, 12:16 PMOfficial source

build of apache camel - hawtio vulnerability (CVE-2026-28368)

CRITICAL
watchNVDCVE-2026-28368

A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header interpretation can be exploited to launch request smuggling attacks, potentially bypassing security controls and accessing unauthorized resources.

Mar 27, 2026, 12:16 PMOfficial source

build of apache camel - hawtio vulnerability (CVE-2026-28367)

CRITICAL
watchNVDCVE-2026-28367

A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Google Cloud Classic Application Load Balancer, potentially leading to unauthorized access or manipulation of web requests.

Mar 27, 2026, 12:16 PMOfficial source

openshift ai vulnerability (CVE-2025-12805)

HIGH
watchNVDCVE-2025-12805

A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vulnerability allows unauthorized access to Llama Stack services deployed in other namespaces via direct network requests, because no NetworkPolicy restricts access to the llama-stack service endpoint. As a result, a user in one namespace can access another user’s Llama Stack instance and potentially view or manipulate sensitive data.

Mar 26, 2026, 5:16 PMOfficial source

build of apache camel - hawtio vulnerability (CVE-2026-3260)

HIGH
watchNVDCVE-2026-3260

A flaw was found in Undertow. A remote attacker could exploit this vulnerability by sending an HTTP GET request containing multipart/form-data content. If the underlying application processes parameters using methods like `getParameterMap()`, the server prematurely parses and stores this content to disk. This could lead to resource exhaustion, potentially resulting in a Denial of Service (DoS).

Mar 24, 2026, 12:16 AMOfficial source

Red Hat JBoss RichFaces Framework Expression Language Injection Vulnerability

critical
activeCISA KEVCVE-2018-14667

Red Hat JBoss RichFaces Framework contains an expression language injection vulnerability via the UserResource resource. A remote, unauthenticated attacker could exploit this vulnerability to execute malicious code using a chain of Java serialized objects via org.ajax4jsf.resource.UserResource$UriData.

Sep 27, 2023, 7:00 PMOfficial source

Red Hat Polkit Incorrect Authorization Vulnerability

critical
activeCISA KEVCVE-2021-3560

Red Hat Polkit contains an incorrect authorization vulnerability through the bypassing of credential checks for D-Bus requests, allowing for privilege escalation.

May 11, 2023, 7:00 PMOfficial source

Red Hat Polkit Out-of-Bounds Read and Write Vulnerability

critical
activeCISA KEVCVE-2021-4034

The Red Hat polkit pkexec utility contains an out-of-bounds read and write vulnerability that allows for privilege escalation with administrative rights.

Jun 26, 2022, 7:00 PMOfficial source

satellite vulnerability (CVE-2012-5562)

HIGH
watchNVDCVE-2012-5562

A flaw was found in rhn-proxy. This vulnerability may allow the rhn-proxy to transmit user credentials in clear-text when it accesses RHN Satellite. This could lead to information disclosure, where sensitive authentication details are exposed to unauthorized parties.

Dec 2, 2019, 1:15 PMOfficial source

jboss enterprise application platform vulnerability (CVE-2017-12149)

CRITICAL
activeCISA KEVCVE-2017-12149

In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.

Oct 4, 2017, 4:01 PMOfficial source

enterprise linux desktop vulnerability (CVE-2016-3718)

MEDIUM
activeCISA KEVCVE-2016-3718

The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.

May 5, 2016, 1:59 PMOfficial source

enterprise linux desktop vulnerability (CVE-2016-3715)

MEDIUM
activeCISA KEVCVE-2016-3715

The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.

May 5, 2016, 1:59 PMOfficial source

enterprise linux desktop vulnerability (CVE-2015-5123)

CRITICAL
activeCISA KEVCVE-2015-5123

Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.

Jul 14, 2015, 5:59 AMOfficial source

subscription asset manager vulnerability (CVE-2014-0130)

HIGH
activeCISA KEVCVE-2014-0130

Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.

May 7, 2014, 5:55 AMOfficial source

enterprise virtualization vulnerability (CVE-2013-1591)

CRITICAL
watchNVDCVE-2013-1591

Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.

Jan 31, 2013, 5:55 PMOfficial source

Related vendors

Other cloud vendors in the radar

Vendor watch FAQ

Common questions

What is the Red Hat threat watch page?

It is the Red Hat-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Red Hat watch page?

Use it to confirm whether current Red Hat issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Red Hat security issues?

Yes. ITECS can help map Red Hat advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.