Red Hat Update Infrastructure
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Red Hat Update Infrastructure.
Recent Red Hat Update Infrastructure Security Advisories
| Advisory | Title | Published |
|---|---|---|
| RHSA-2026:2563 | (RHSA-2026:2563) Important: Red Hat Update Infrastructure 5 security update | February 11, 2026 |
| RHSA-2026:0685 | (RHSA-2026:0685) Moderate: Red Hat Update Infrastructure 5 security update | January 15, 2026 |
By the Year
In 2026 there have been 0 vulnerabilities in Red Hat Update Infrastructure. Update Infrastructure did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 2 | 7.50 |
| 2023 | 0 | 0.00 |
| 2022 | 1 | 5.50 |
It may take a day or so for new Update Infrastructure vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Update Infrastructure Security Vulnerabilities
python-cryptography: Remote Decryption of TLS RSA Exchanges
CVE-2023-50782
7.5 - High
- February 05, 2024
A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
Observable Timing Discrepancy
Remote Decrypt in TLS RSA via M2Crypto: CVE-2023-50781
CVE-2023-50781
7.5 - High
- February 05, 2024
A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
Covert Timing Channel
Pulp Ansible Remote Token Plaintext Exposure via API
CVE-2022-3644
5.5 - Medium
- October 25, 2022
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
Insufficiently Protected Credentials
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Red Hat Update Infrastructure or by Red Hat? Click the Watch button to subscribe.