Software Detail
Title
CVE
CRITICAL
HIGH
MEDIUM
LOW
CWE
Number of items displayed
Red Hat Enterprise Linux Number Of NVD 1680 CRITICAL 135 HIGH 590 MEDIUM 803 LOW 151
URL https://www.redhat.com/technologies/linux-platforms/enterprise-linux
Explanation Full support is 5.5 years from release.
Maintenance support (security updates only) is for 3.5 years.
After that, extended support is available for a fee.
Tag
  • Linux
  • 商用ライセンス有り

Add Information URL
No Type Name URL
1 https://access.redhat.com/ja/articles/16476
2 https://access.redhat.com/support/policy/updates/errata
3 https://access.redhat.com/articles/3078
4 https://access.redhat.com/security
5 https://access.redhat.com/errata/#/?q=&p=1&sort=portal_publication_date%20desc&rows=10&portal_advisory_type=Security%20Advisory

List Of Product  [ Click to show release history and vulnerability information ]
No Name Latest Version Release date Initial release Normal Support Security Support
Service Pack Support
Extended
for a fee
Critical High Medium Low
561 Red Hat Enterprise Linux 9 9.7 Nov. 11, 2025 May 17, 2022 4 127 172 17
562 Red Hat Enterprise Linux 8 8.10 May 22, 2024 May 7, 2019 May 30, 2029 43 314 444 50
563 Red Hat Enterprise Linux 7 7.9 Sept. 29, 2020 Dec. 11, 2013 Aug. 6, 2020 June 30, 2024 91 270 270 46
564 Red Hat Enterprise Linux 6 6.10 June 19, 2018 Nov. 9, 2010 May 10, 2022 Nov. 30, 2020 June 30, 2024 72 169 210 55
565 Red Hat Enterprise Linux 5 5.11 Sept. 16, 2014 March 15, 2007 March 31, 2017 Nov. 30, 2020 24 59 89 40
566 Red Hat Enterprise Linux 4 4.5 Feb. 29, 2012 March 31, 2017 5 30 29 16
567 Red Hat Enterprise Linux 3 3.0 0 33 44 17
568 Red Hat Enterprise Linux 2 2.1 Update 7 April 28, 2005 0 32 37 6
NVD Vulnerability Information
  • CRITICAL
  • HIGH
  • MEDIUM
  • LOW
No CVSS3
CVSS2
Level
Attach Vector
Title CWE CVE cpe23Uri or higher or less more than less than Update date
Published date
Show Affected Exploit
PoC
Search
561 7.0
5.1
HIGH
Local
A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature … - CVE-2021-20271 cpe:2.3:o:redhat:enterprise_linux:8.0:* 2024-11-21 14:46
2021-03-27
Show GitHub Exploit DB Packet Storm
562 5.3
5.0
MEDIUM
Network
When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of a… CWE-203
 Information Exposure Through Discrepancy
CVE-2020-35518 cpe:2.3:o:redhat:enterprise_linux:8.0:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*
2024-11-21 14:27
2021-03-27
Show GitHub Exploit DB Packet Storm
563 6.3
3.3
MEDIUM
Local
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (pre… - CVE-2021-20197 cpe:2.3:o:redhat:enterprise_linux:8.0:* 2024-11-21 14:46
2021-03-27
Show GitHub Exploit DB Packet Storm
564 4.5
4.4
MEDIUM
Local
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local… - CVE-2020-35508 cpe:2.3:o:redhat:enterprise_linux:8.0:* 2024-11-21 14:27
2021-03-27
Show GitHub Exploit DB Packet Storm
565 9.8
10.0
CRITICAL
Network
A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that… - CVE-2021-3466 cpe:2.3:o:redhat:enterprise_linux:8.0:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*
cpe:2.3:o:redhat:enterprise_linux…
2024-11-21 15:21
2021-03-26
Show GitHub Exploit DB Packet Storm
566 5.5
2.1
MEDIUM
Local
A flaw was found in libtpms in versions before 0.8.2. The commonly used integration of libtpms with OpenSSL contained a vulnerability related to the returned IV (initialization vector) when certain s… CWE-330
 Use of Insufficiently Random Values
CVE-2021-3446 cpe:2.3:o:redhat:enterprise_linux:8.0:* 2024-11-21 15:21
2021-03-26
Show GitHub Exploit DB Packet Storm
567 5.5
4.3
MEDIUM
Local
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an appl… - CVE-2021-3443 cpe:2.3:o:redhat:enterprise_linux:8.0:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*
cpe:2.3:o:redhat:enterprise_linux…
2024-11-21 15:21
2021-03-26
Show GitHub Exploit DB Packet Storm
568 5.7
4.6
MEDIUM
Local
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation c… CWE-119
Incorrect Access of Indexable Resource ('Range Error') 
CVE-2021-3409 cpe:2.3:o:redhat:enterprise_linux:7.0:* 2024-11-21 15:21
2021-03-24
Show GitHub Exploit DB Packet Storm
569 7.5
5.0
HIGH
Network
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only… CWE-835
 Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2021-20270 cpe:2.3:o:redhat:enterprise_linux:8.0:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*
2024-11-21 14:46
2021-03-24
Show GitHub Exploit DB Packet Storm
570 9.8
9.0
CRITICAL
Network
A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a De… - CVE-2019-10196 cpe:2.3:o:redhat:enterprise_linux:7.0:* 2024-11-21 13:18
2021-03-20
Show GitHub Exploit DB Packet Storm