Red Hat threat watch

Red Hat product CVE coverage for Enterprise Linux, OpenShift, virtualization, and enterprise platform packages.

Vendor watch hub

What this page covers

The Red Hatwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Red Hat activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

167

Active

11

Featured

52

Unique CVEs

20

Most recent entry

Apr 22, 2026, 9:17 AM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Red Hat watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

instructlab vulnerability (CVE-2026-6859)

HIGH
watchNVDCVE-2026-6859

A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace. This allows a remote attacker to achieve arbitrary Python code execution by convincing a user to run `ilab train/download/generate` with a specially crafted malicious model from the HuggingFace Hub. This vulnerability can lead to complete system compromise.

Apr 22, 2026, 9:17 AMOfficial source

instructlab vulnerability (CVE-2026-6855)

HIGH
watchNVDCVE-2026-6855

A flaw was found in InstructLab. A local attacker could exploit a path traversal vulnerability in the chat session handler by manipulating the `logs_dir` parameter. This allows the attacker to create new directories and write files to arbitrary locations on the system, potentially leading to unauthorized data modification or disclosure.

Apr 22, 2026, 8:16 AMOfficial source

quay vulnerability (CVE-2026-6848)

HIGH
watchNVDCVE-2026-6848

A flaw was found in Red Hat Quay. When Red Hat Quay requests password re-verification for sensitive operations, such as token generation or robot account creation, the re-authentication prompt can be bypassed. This allows a user with a timed-out session, or an attacker with access to an idle authenticated browser session, to perform privileged actions without providing valid credentials. The vulnerability enables unauthorized execution of sensitive operations despite the user interface displaying an error for invalid credentials.

Apr 22, 2026, 5:16 AMOfficial source

openshift ai vulnerability (CVE-2026-5483)

CRITICAL
watchNVDCVE-2026-5483

A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could enable an attacker to gain unauthorized access to Kubernetes resources.

Apr 10, 2026, 1:16 PMOfficial source

mirror registry for red hat openshift vulnerability (CVE-2026-32590)

HIGH
watchNVDCVE-2026-32590

A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server.

Apr 8, 2026, 1:25 PMOfficial source

mirror registry for red hat openshift vulnerability (CVE-2026-32589)

HIGH
watchNVDCVE-2026-32589

A flaw was found in Red Hat Quay's container image upload process. An authenticated user with push access to any repository on the registry can interfere with image uploads in progress by other users, including those in repositories they do not have access to. This could allow the attacker to read, modify, or cancel another user's in-progress image upload.

Apr 8, 2026, 1:25 PMOfficial source

advanced cluster management for kubernetes vulnerability (CVE-2026-4740)

HIGH
watchNVDCVE-2026-4740

A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certificate that can be approved by the OCM controller. This enables cross-cluster privilege escalation and may allow an attacker to gain control over other managed clusters, including the hub cluster.

Apr 7, 2026, 10:17 AMOfficial source

virtio-win vulnerability (CVE-2026-5165)

HIGH
watchNVDCVE-2026-5165

A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device undergoes a reset, it fails to properly manage memory, resulting in a use-after-free vulnerability. This issue could allow a local attacker to corrupt system memory, potentially leading to system instability or unexpected behavior.

Mar 30, 2026, 10:16 AMOfficial source

build of apache camel - hawtio vulnerability (CVE-2026-28369)

CRITICAL
watchNVDCVE-2026-28369

A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one or more spaces, it incorrectly processes the request by stripping these leading spaces. This behavior, which violates HTTP standards, can be exploited by a remote attacker to perform request smuggling. Request smuggling allows an attacker to bypass security mechanisms, access restricted information, or manipulate web caches, potentially leading to unauthorized actions or data exposure.

Mar 27, 2026, 12:16 PMOfficial source

build of apache camel - hawtio vulnerability (CVE-2026-28368)

CRITICAL
watchNVDCVE-2026-28368

A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header interpretation can be exploited to launch request smuggling attacks, potentially bypassing security controls and accessing unauthorized resources.

Mar 27, 2026, 12:16 PMOfficial source

build of apache camel - hawtio vulnerability (CVE-2026-28367)

CRITICAL
watchNVDCVE-2026-28367

A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Google Cloud Classic Application Load Balancer, potentially leading to unauthorized access or manipulation of web requests.

Mar 27, 2026, 12:16 PMOfficial source

openshift ai vulnerability (CVE-2025-12805)

HIGH
watchNVDCVE-2025-12805

A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vulnerability allows unauthorized access to Llama Stack services deployed in other namespaces via direct network requests, because no NetworkPolicy restricts access to the llama-stack service endpoint. As a result, a user in one namespace can access another user’s Llama Stack instance and potentially view or manipulate sensitive data.

Mar 26, 2026, 5:16 PMOfficial source

build of apache camel - hawtio vulnerability (CVE-2026-3260)

HIGH
watchNVDCVE-2026-3260

A flaw was found in Undertow. A remote attacker could exploit this vulnerability by sending an HTTP GET request containing multipart/form-data content. If the underlying application processes parameters using methods like `getParameterMap()`, the server prematurely parses and stores this content to disk. This could lead to resource exhaustion, potentially resulting in a Denial of Service (DoS).

Mar 24, 2026, 12:16 AMOfficial source

wildfly core vulnerability (CVE-2025-23368)

HIGH
watchNVDCVE-2025-23368

A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI.

Mar 4, 2025, 10:15 AMOfficial source

enterprise linux vulnerability (CVE-2023-50781)

HIGH
watchNVDCVE-2023-50781

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

Feb 5, 2024, 3:15 PMOfficial source

Red Hat JBoss RichFaces Framework Expression Language Injection Vulnerability

critical
activeCISA KEVCVE-2018-14667

Red Hat JBoss RichFaces Framework contains an expression language injection vulnerability via the UserResource resource. A remote, unauthenticated attacker could exploit this vulnerability to execute malicious code using a chain of Java serialized objects via org.ajax4jsf.resource.UserResource$UriData.

Sep 27, 2023, 7:00 PMOfficial source

Red Hat Polkit Incorrect Authorization Vulnerability

critical
activeCISA KEVCVE-2021-3560

Red Hat Polkit contains an incorrect authorization vulnerability through the bypassing of credential checks for D-Bus requests, allowing for privilege escalation.

May 11, 2023, 7:00 PMOfficial source

Red Hat Polkit Out-of-Bounds Read and Write Vulnerability

critical
activeCISA KEVCVE-2021-4034

The Red Hat polkit pkexec utility contains an out-of-bounds read and write vulnerability that allows for privilege escalation with administrative rights.

Jun 26, 2022, 7:00 PMOfficial source

satellite vulnerability (CVE-2012-5562)

HIGH
watchNVDCVE-2012-5562

A flaw was found in rhn-proxy. This vulnerability may allow the rhn-proxy to transmit user credentials in clear-text when it accesses RHN Satellite. This could lead to information disclosure, where sensitive authentication details are exposed to unauthorized parties.

Dec 2, 2019, 1:15 PMOfficial source

virtualization host vulnerability (CVE-2017-1000407)

HIGH
watchNVDCVE-2017-1000407

The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.

Dec 11, 2017, 3:29 PMOfficial source

Related vendors

Other cloud vendors in the radar

Vendor watch FAQ

Common questions

What is the Red Hat threat watch page?

It is the Red Hat-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Red Hat watch page?

Use it to confirm whether current Red Hat issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Red Hat security issues?

Yes. ITECS can help map Red Hat advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.