Skip to content
Threat Feed

Vendor

Red Hat

9 briefs RSS
high advisory

Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters

Quarkus Vertx HTTP versions < 3.20.6.1, >= 3.21.0 and < 3.27.3.1, >= 3.30.0 and < 3.33.1.1, and >= 3.34.0 and < 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.

Quarkus Vertx HTTP +3 authentication-bypass authorization-bypass web-application
2r 2t
high advisory

AAP Gateway Account Hijacking Vulnerability (CVE-2026-6266)

CVE-2026-6266 allows a remote attacker to hijack user accounts in AAP gateway by manipulating the IDP-provided email during the user auto-linking process, potentially gaining unauthorized access, including administrative privileges.

AAP cve-2026-6266 account-hijacking authentication-bypass
2r 1t 1c
critical advisory

CVE-2026-31431 'Copy Fail' Linux Kernel Privilege Escalation

The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows a local attacker to escalate privileges to root, potentially leading to container breakout and lateral movement in cloud environments.

Amazon Linux 2023 +3 privilege-escalation linux kernel
2r 1t 1c
high advisory

GnuTLS DTLS Handshake Parsing Flaw (CVE-2026-33845)

A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read, potentially causing information disclosure or denial of service.

GnuTLS cve denial-of-service information-disclosure
2r 3t 1c
critical threat

Local Privilege Escalation Vulnerability 'Copy Fail' in Linux Kernel

A local privilege escalation vulnerability, dubbed 'Copy Fail' (CVE-2026-31431), affects Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions by exploiting a logic bug in the authencesn cryptographic template.

Linux kernel +4 Theori privilege-escalation linux vulnerability
2r 1t 1c
high advisory

Multiple Vulnerabilities in Red Hat Enterprise Linux Fast Datapath

A remote, anonymous attacker can exploit multiple vulnerabilities in Fast Datapath for Red Hat Enterprise Linux to perform a denial-of-service attack or disclose sensitive information.

Fast Datapath redhat vulnerability denial-of-service
2r 4t
critical advisory

Multiple Vulnerabilities in Red Hat Linux Kernel

Multiple vulnerabilities in the Red Hat Linux kernel allow for arbitrary code execution, privilege escalation, and remote denial of service.

Red Hat CodeReady Linux Builder +1 vulnerability kernel redhat execution privilege-escalation denial-of-service
2r 3t 5c
high advisory

Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS

Multiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

Enterprise Linux vulnerability code-execution denial-of-service linux
2r 2t
critical advisory

InstructLab Arbitrary Code Execution via Malicious HuggingFace Model

InstructLab is vulnerable to arbitrary code execution because the `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace, allowing remote attackers to execute code by convincing a user to load a malicious model.

InstructLab cve code-execution huggingface
2r 1t 1c