Software Detail
Title
CVE
CRITICAL
HIGH
MEDIUM
LOW
CWE
Number of items displayed
Red Hat Enterprise Linux Number Of NVD 1680 CRITICAL 135 HIGH 590 MEDIUM 803 LOW 151
URL https://www.redhat.com/technologies/linux-platforms/enterprise-linux
Explanation Full support is 5.5 years from release.
Maintenance support (security updates only) is for 3.5 years.
After that, extended support is available for a fee.
Tag
  • 商用ライセンス有り
  • Linux

Add Information URL
No Type Name URL
1 https://access.redhat.com/ja/articles/16476
2 https://access.redhat.com/support/policy/updates/errata
3 https://access.redhat.com/articles/3078
4 https://access.redhat.com/security
5 https://access.redhat.com/errata/#/?q=&p=1&sort=portal_publication_date%20desc&rows=10&portal_advisory_type=Security%20Advisory

List Of Product  [ Click to show release history and vulnerability information ]
No Name Latest Version Release date Initial release Normal Support Security Support
Service Pack Support
Extended
for a fee
Critical High Medium Low
1061 Red Hat Enterprise Linux 9 9.7 Nov. 11, 2025 May 17, 2022 4 127 172 17
1062 Red Hat Enterprise Linux 8 8.10 May 22, 2024 May 7, 2019 May 30, 2029 43 314 444 50
1063 Red Hat Enterprise Linux 7 7.9 Sept. 29, 2020 Dec. 11, 2013 Aug. 6, 2020 June 30, 2024 91 270 270 46
1064 Red Hat Enterprise Linux 6 6.10 June 19, 2018 Nov. 9, 2010 May 10, 2022 Nov. 30, 2020 June 30, 2024 72 169 210 55
1065 Red Hat Enterprise Linux 5 5.11 Sept. 16, 2014 March 15, 2007 March 31, 2017 Nov. 30, 2020 24 59 89 40
1066 Red Hat Enterprise Linux 4 4.5 Feb. 29, 2012 March 31, 2017 5 30 29 16
1067 Red Hat Enterprise Linux 3 3.0 0 33 44 17
1068 Red Hat Enterprise Linux 2 2.1 Update 7 April 28, 2005 0 32 37 6
NVD Vulnerability Information
  • CRITICAL
  • HIGH
  • MEDIUM
  • LOW
No CVSS3
CVSS2
Level
Attach Vector
Title CWE CVE cpe23Uri or higher or less more than less than Update date
Published date
Show Affected Exploit
PoC
Search
1061 8.8
6.5
HIGH
Network
It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete. A remote, authenticated attacker could use one of these flaws to execu… - CVE-2018-14651 cpe:2.3:o:redhat:enterprise_linux:7.0:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*
2024-11-21 12:49
2018-11-1
Show GitHub Exploit DB Packet Storm
1062 9.8
7.5
CRITICAL
Network
An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msg… CWE-415
 Double Free
CVE-2018-18751 cpe:2.3:o:redhat:enterprise_linux:7.0:* 2024-11-21 12:56
2018-10-29
Show GitHub Exploit DB Packet Storm
1063 7.8
7.2
HIGH
Local
An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. Amstar is an Amanda Application API script. It should not be run by users direct… CWE-264
Permissions, Privileges, and Access Controls
CVE-2016-10730 cpe:2.3:o:redhat:enterprise_linux:7.0:* 2024-11-21 11:44
2018-10-25
Show GitHub Exploit DB Packet Storm
1064 7.8
7.2
HIGH
Local
An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied… CWE-77
Command Injection
CVE-2016-10729 cpe:2.3:o:redhat:enterprise_linux:7.0:* 2024-11-21 11:44
2018-10-25
Show GitHub Exploit DB Packet Storm
1065 6.5
4.3
MEDIUM
Network
In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write. CWE-787
 Out-of-bounds Write
CVE-2018-18584 cpe:2.3:o:redhat:enterprise_linux:7.0:* 2024-11-21 12:56
2018-10-23
Show GitHub Exploit DB Packet Storm
1066 5.5
2.1
MEDIUM
Local
Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value. CWE-190
 Integer Overflow or Wraparound
CVE-2018-18438 cpe:2.3:o:redhat:enterprise_linux:7.0:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*
2024-11-21 12:55
2018-10-20
Show GitHub Exploit DB Packet Storm
1067 4.3
4.3
MEDIUM
Network
Plaintext of decrypted emails can leak through by user submitting an embedded form by pressing enter key within a text input field. This vulnerability affects Thunderbird < 52.9. CWE-200
Information Exposure
CVE-2018-12374 cpe:2.3:o:redhat:enterprise_linux:7.6:*
cpe:2.3:o:redhat:enterprise_linux:7.5:*
cpe:2.3:o:redhat:enterprise_linux…
2024-11-21 12:45
2018-10-18
Show GitHub Exploit DB Packet Storm
1068 6.5
4.3
MEDIUM
Network
dDecrypted S/MIME parts hidden with CSS or the plaintext HTML tag can leak plaintext when included in a HTML reply/forward. This vulnerability affects Thunderbird < 52.9. CWE-200
Information Exposure
CVE-2018-12373 cpe:2.3:o:redhat:enterprise_linux:7.6:*
cpe:2.3:o:redhat:enterprise_linux:7.5:*
cpe:2.3:o:redhat:enterprise_linux…
2024-11-21 12:45
2018-10-18
Show GitHub Exploit DB Packet Storm
1069 6.5
4.3
MEDIUM
Network
Decrypted S/MIME parts, when included in HTML crafted for an attack, can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird < 52.9. CWE-200
Information Exposure
CVE-2018-12372 cpe:2.3:o:redhat:enterprise_linux:7.6:*
cpe:2.3:o:redhat:enterprise_linux:7.5:*
cpe:2.3:o:redhat:enterprise_linux…
2024-11-21 12:45
2018-10-18
Show GitHub Exploit DB Packet Storm
1070 9.1
6.4
CRITICAL
Network
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unautho… CWE-287
Improper Authentication
CVE-2018-10933 cpe:2.3:o:redhat:enterprise_linux:7.0:* 2024-11-21 12:42
2018-10-17
Show GitHub Exploit DB Packet Storm