Update Infrastructure Red Hat Update Infrastructure

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Red Hat Update Infrastructure.

Recent Red Hat Update Infrastructure Security Advisories

Advisory Title Published
RHSA-2026:2563 (RHSA-2026:2563) Important: Red Hat Update Infrastructure 5 security update February 11, 2026
RHSA-2026:0685 (RHSA-2026:0685) Moderate: Red Hat Update Infrastructure 5 security update January 15, 2026

By the Year

In 2026 there have been 0 vulnerabilities in Red Hat Update Infrastructure. Update Infrastructure did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 2 7.50
2023 0 0.00
2022 1 5.50

It may take a day or so for new Update Infrastructure vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Update Infrastructure Security Vulnerabilities

python-cryptography: Remote Decryption of TLS RSA Exchanges
CVE-2023-50782 7.5 - High - February 05, 2024

A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

Observable Timing Discrepancy

Remote Decrypt in TLS RSA via M2Crypto: CVE-2023-50781
CVE-2023-50781 7.5 - High - February 05, 2024

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

Covert Timing Channel

Pulp Ansible Remote Token Plaintext Exposure via API
CVE-2022-3644 5.5 - Medium - October 25, 2022

The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.

Insufficiently Protected Credentials

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat Update Infrastructure or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe