Enterprise linux Vulnerabilities

Security vulnerability tracking for Redhat Enterprise linux

Last updated: Feb 25, 2026
Total CVEs

2

Critical

0

With Exploits

1

Last 30 Days

0

Vulnerability Timeline

2 vulnerabilities discovered over time for Enterprise linux

Severity Distribution

Critical0
0%
High1
50%
Medium1
50%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-261045.5

An attacker can exploit a flaw in the udisks storage management system to access and back up sensitive encryption information from LUKS-encrypted drives without proper authorization. This vulnerability requires the attacker to have access to the system as an unprivileged user, allowing them to potentially compromise the confidentiality of encrypted data.

redhatenterprise linux
Theoretical
about 1 month agoFeb 25, 2026
CVE-2026-261037.1

An attacker with local access can exploit a flaw in the udisks storage management tool to overwrite encryption settings on protected drives, potentially making the data permanently inaccessible. This requires no special privileges, meaning any regular user on the system could cause significant data loss and disrupt access to encrypted volumes.

redhatenterprise linux
Exploit Available
about 1 month agoFeb 25, 2026

About Redhat Enterprise linux Security

This page provides comprehensive security vulnerability tracking for Redhat Enterprise linux. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Enterprise linux updated to the latest version
  • • Subscribe to security advisories from Redhat
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately