| Red Hat Enterprise Linux | Number Of NVD | 1680 | CRITICAL | 135 | HIGH | 590 | MEDIUM | 803 | LOW | 151 |
| URL | https://www.redhat.com/technologies/linux-platforms/enterprise-linux | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Explanation | Full support is 5.5 years from release. Maintenance support (security updates only) is for 3.5 years. After that, extended support is available for a fee. |
||||||||
| Tag | |||||||||
| No | Type | Name | URL |
|---|---|---|---|
| 1 | https://access.redhat.com/ja/articles/16476 | ||
| 2 | https://access.redhat.com/support/policy/updates/errata | ||
| 3 | https://access.redhat.com/articles/3078 | ||
| 4 | https://access.redhat.com/security | ||
| 5 | https://access.redhat.com/errata/#/?q=&p=1&sort=portal_publication_date%20desc&rows=10&portal_advisory_type=Security%20Advisory |
| No | Name | Latest Version | Release date | Initial release | Normal Support | Security Support Service Pack Support |
Extended for a fee |
Critical | High | Medium | Low |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 731 | Red Hat Enterprise Linux 9 | 9.7 | Nov. 11, 2025 | May 17, 2022 | 4 | 127 | 172 | 17 | |||
| 732 | Red Hat Enterprise Linux 8 | 8.10 | May 22, 2024 | May 7, 2019 | May 30, 2029 | 43 | 314 | 444 | 50 | ||
| 733 | Red Hat Enterprise Linux 7 | 7.9 | Sept. 29, 2020 | Dec. 11, 2013 | Aug. 6, 2020 | June 30, 2024 | 91 | 270 | 270 | 46 | |
| 734 | Red Hat Enterprise Linux 6 | 6.10 | June 19, 2018 | Nov. 9, 2010 | May 10, 2022 | Nov. 30, 2020 | June 30, 2024 | 72 | 169 | 210 | 55 |
| 735 | Red Hat Enterprise Linux 5 | 5.11 | Sept. 16, 2014 | March 15, 2007 | March 31, 2017 | Nov. 30, 2020 | 24 | 59 | 89 | 40 | |
| 736 | Red Hat Enterprise Linux 4 | 4.5 | Feb. 29, 2012 | March 31, 2017 | 5 | 30 | 29 | 16 | |||
| 737 | Red Hat Enterprise Linux 3 | 3.0 | 0 | 33 | 44 | 17 | |||||
| 738 | Red Hat Enterprise Linux 2 | 2.1 Update 7 | April 28, 2005 | 0 | 32 | 37 | 6 |
| No | CVSS3 CVSS2 |
Level Attach Vector |
Title | CWE | CVE | cpe23Uri | or higher | or less | more than | less than | Update date Published date |
Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 731 |
3.3 2.1 |
LOW
Local |
An issue exists AccountService 0.6.37 in the user_change_password_authorized_cb() function in user.c which could let a local users obtain encrypted passwords. |
CWE-732
Incorrect Permission Assignment for Critical Resource |
CVE-2012-6655 | cpe:2.3:o:redhat:enterprise_linux:7.0:* |
2024-11-21 10:46 2019-11-28 |
Show | GitHub Exploit DB Packet Storm | ||||
| 732 |
5.9 4.3 |
MEDIUM
Network |
SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c. |
CWE-476
NULL Pointer Dereference |
CVE-2019-19242 | cpe:2.3:o:redhat:enterprise_linux:8.0:* |
2024-11-21 13:34 2019-11-28 |
Show | GitHub Exploit DB Packet Storm | ||||
| 733 |
2.5 1.9 |
LOW
Local |
A password generation weakness exists in xquest through 2016-06-13. |
CWE-330
Use of Insufficiently Random Values |
CVE-2016-4980 |
cpe:2.3:o:redhat:enterprise_linux:7.0:* cpe:2.3:o:redhat:enterprise_linux:6.0:* |
2024-11-21 11:53 2019-11-28 |
Show | GitHub Exploit DB Packet Storm | ||||
| 734 |
7.8 6.8 |
HIGH
Local |
In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by cre… |
NVD-CWE-Other
|
CVE-2019-10216 |
cpe:2.3:o:redhat:enterprise_linux:8.0:* cpe:2.3:o:redhat:enterprise_linux:6.0:* cpe:2.3:o:redhat:enterprise_linux… |
2024-11-21 13:18 2019-11-27 |
Show | GitHub Exploit DB Packet Storm | ||||
| 735 |
9.8 10.0 |
CRITICAL
Network |
A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, poss… | - | CVE-2019-14896 | cpe:2.3:o:redhat:enterprise_linux:6.0:* |
2024-11-21 13:27 2019-11-27 |
Show | GitHub Exploit DB Packet Storm | ||||
| 736 |
7.1 3.6 |
HIGH
Local |
Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks. |
CWE-59
Link Following |
CVE-2011-3632 |
cpe:2.3:o:redhat:enterprise_linux:6.0:* cpe:2.3:o:redhat:enterprise_linux:5.0:* |
2024-11-21 10:30 2019-11-26 |
Show | GitHub Exploit DB Packet Storm | ||||
| 737 |
8.8 6.8 |
HIGH
Network |
Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to … |
CWE-190
Integer Overflow or Wraparound |
CVE-2011-3631 |
cpe:2.3:o:redhat:enterprise_linux:6.0:* cpe:2.3:o:redhat:enterprise_linux:5.0:* |
2024-11-21 10:30 2019-11-26 |
Show | GitHub Exploit DB Packet Storm | ||||
| 738 |
8.8 6.8 |
HIGH
Network |
Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a special… |
CWE-787
Out-of-bounds Write |
CVE-2011-3630 |
cpe:2.3:o:redhat:enterprise_linux:6.0:* cpe:2.3:o:redhat:enterprise_linux:5.0:* |
2024-11-21 10:30 2019-11-26 |
Show | GitHub Exploit DB Packet Storm | ||||
| 739 |
5.5 4.9 |
MEDIUM
Local |
libuser has information disclosure when moving user's home directory |
CWE-200
Information Exposure |
CVE-2012-5644 |
cpe:2.3:o:redhat:enterprise_linux:6.0:* cpe:2.3:o:redhat:enterprise_linux:5.0:* |
2024-11-21 10:45 2019-11-26 |
Show | GitHub Exploit DB Packet Storm | ||||
| 740 |
6.3 3.3 |
MEDIUM
Local |
libuser 0.56 and 0.57 has a TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees. |
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition |
CVE-2012-5630 |
cpe:2.3:o:redhat:enterprise_linux:6.0:* cpe:2.3:o:redhat:enterprise_linux:5.0:* |
2024-11-21 10:45 2019-11-25 |
Show | GitHub Exploit DB Packet Storm |