Software Detail
Title
CVE
CRITICAL
HIGH
MEDIUM
LOW
CWE
Number of items displayed
Red Hat Enterprise Linux Number Of NVD 1680 CRITICAL 135 HIGH 590 MEDIUM 803 LOW 151
URL https://www.redhat.com/technologies/linux-platforms/enterprise-linux
Explanation Full support is 5.5 years from release.
Maintenance support (security updates only) is for 3.5 years.
After that, extended support is available for a fee.
Tag
  • Linux
  • 商用ライセンス有り

Add Information URL
No Type Name URL
1 https://access.redhat.com/ja/articles/16476
2 https://access.redhat.com/support/policy/updates/errata
3 https://access.redhat.com/articles/3078
4 https://access.redhat.com/security
5 https://access.redhat.com/errata/#/?q=&p=1&sort=portal_publication_date%20desc&rows=10&portal_advisory_type=Security%20Advisory

List Of Product  [ Click to show release history and vulnerability information ]
No Name Latest Version Release date Initial release Normal Support Security Support
Service Pack Support
Extended
for a fee
Critical High Medium Low
731 Red Hat Enterprise Linux 9 9.7 Nov. 11, 2025 May 17, 2022 4 127 172 17
732 Red Hat Enterprise Linux 8 8.10 May 22, 2024 May 7, 2019 May 30, 2029 43 314 444 50
733 Red Hat Enterprise Linux 7 7.9 Sept. 29, 2020 Dec. 11, 2013 Aug. 6, 2020 June 30, 2024 91 270 270 46
734 Red Hat Enterprise Linux 6 6.10 June 19, 2018 Nov. 9, 2010 May 10, 2022 Nov. 30, 2020 June 30, 2024 72 169 210 55
735 Red Hat Enterprise Linux 5 5.11 Sept. 16, 2014 March 15, 2007 March 31, 2017 Nov. 30, 2020 24 59 89 40
736 Red Hat Enterprise Linux 4 4.5 Feb. 29, 2012 March 31, 2017 5 30 29 16
737 Red Hat Enterprise Linux 3 3.0 0 33 44 17
738 Red Hat Enterprise Linux 2 2.1 Update 7 April 28, 2005 0 32 37 6
NVD Vulnerability Information
  • CRITICAL
  • HIGH
  • MEDIUM
  • LOW
No CVSS3
CVSS2
Level
Attach Vector
Title CWE CVE cpe23Uri or higher or less more than less than Update date
Published date
Show Affected Exploit
PoC
Search
731 3.3
2.1
LOW
Local
An issue exists AccountService 0.6.37 in the user_change_password_authorized_cb() function in user.c which could let a local users obtain encrypted passwords. CWE-732
 Incorrect Permission Assignment for Critical Resource
CVE-2012-6655 cpe:2.3:o:redhat:enterprise_linux:7.0:* 2024-11-21 10:46
2019-11-28
Show GitHub Exploit DB Packet Storm
732 5.9
4.3
MEDIUM
Network
SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c. CWE-476
 NULL Pointer Dereference
CVE-2019-19242 cpe:2.3:o:redhat:enterprise_linux:8.0:* 2024-11-21 13:34
2019-11-28
Show GitHub Exploit DB Packet Storm
733 2.5
1.9
LOW
Local
A password generation weakness exists in xquest through 2016-06-13. CWE-330
 Use of Insufficiently Random Values
CVE-2016-4980 cpe:2.3:o:redhat:enterprise_linux:7.0:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*
2024-11-21 11:53
2019-11-28
Show GitHub Exploit DB Packet Storm
734 7.8
6.8
HIGH
Local
In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by cre… NVD-CWE-Other
CVE-2019-10216 cpe:2.3:o:redhat:enterprise_linux:8.0:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*
cpe:2.3:o:redhat:enterprise_linux…
2024-11-21 13:18
2019-11-27
Show GitHub Exploit DB Packet Storm
735 9.8
10.0
CRITICAL
Network
A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, poss… - CVE-2019-14896 cpe:2.3:o:redhat:enterprise_linux:6.0:* 2024-11-21 13:27
2019-11-27
Show GitHub Exploit DB Packet Storm
736 7.1
3.6
HIGH
Local
Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks. CWE-59
Link Following
CVE-2011-3632 cpe:2.3:o:redhat:enterprise_linux:6.0:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*
2024-11-21 10:30
2019-11-26
Show GitHub Exploit DB Packet Storm
737 8.8
6.8
HIGH
Network
Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to … CWE-190
 Integer Overflow or Wraparound
CVE-2011-3631 cpe:2.3:o:redhat:enterprise_linux:6.0:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*
2024-11-21 10:30
2019-11-26
Show GitHub Exploit DB Packet Storm
738 8.8
6.8
HIGH
Network
Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a special… CWE-787
 Out-of-bounds Write
CVE-2011-3630 cpe:2.3:o:redhat:enterprise_linux:6.0:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*
2024-11-21 10:30
2019-11-26
Show GitHub Exploit DB Packet Storm
739 5.5
4.9
MEDIUM
Local
libuser has information disclosure when moving user's home directory CWE-200
Information Exposure
CVE-2012-5644 cpe:2.3:o:redhat:enterprise_linux:6.0:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*
2024-11-21 10:45
2019-11-26
Show GitHub Exploit DB Packet Storm
740 6.3
3.3
MEDIUM
Local
libuser 0.56 and 0.57 has a TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees. CWE-367
 Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2012-5630 cpe:2.3:o:redhat:enterprise_linux:6.0:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*
2024-11-21 10:45
2019-11-25
Show GitHub Exploit DB Packet Storm