Red Hat and CVEs
Last updated
Was this helpful?
Last updated
Was this helpful?
CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they mean a security flaw that's been assigned a CVE identification (ID) number .
Security advisories issued by vendors and researchers almost always mention at least one CVE ID. CVEs help IT professionals coordinate their efforts to prioritize and address these vulnerabilities to make computer systems more secure.
CVE is overseen by the with funding from the Cybersecurity and Infrastructure Security Agency, part of the U.S. Department of Homeland Security.
CVE entries are brief. They don’t include technical data, or information about risks, impacts, and fixes. Those details appear in other databases, including the , the , and various lists maintained by vendors and other organizations. Across these different systems, CVE IDs give users a reliable way to tell one unique security flaw from another.
As a major contributor to software, Red Hat is continuously engaged in the security community. Red Hat is one of the leaders and contributors in the CVE Special Interest Group (industry group sponsored by ).
Red Hat is also a (CNA) and uses CVE IDs to track security vulnerabilities. Red Hat Security maintains an open and frequently updated , which you can view by CVE number.
[1]