Red Hat Linux
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Red Hat Linux.
Recent Red Hat Linux Security Advisories
Advisory | Title | Published |
---|---|---|
RHSA-2024:8128 | (RHSA-2024:8128) Moderate: OpenJDK 21.0.5 Security Update for Portable Linux Builds | October 16, 2024 |
RHSA-2024:8125 | (RHSA-2024:8125) Moderate: OpenJDK 17.0.13 Security Update for Portable Linux Builds | October 16, 2024 |
RHSA-2024:8122 | (RHSA-2024:8122) Moderate: OpenJDK 11.0.25 Security Update for Portable Linux Builds | October 16, 2024 |
RHSA-2024:8118 | (RHSA-2024:8118) Moderate: OpenJDK 8u432 Security Update for Portable Linux Builds | October 16, 2024 |
RHSA-2024:7484 | (RHSA-2024:7484) Moderate: linux-firmware security update | October 2, 2024 |
RHSA-2024:7483 | (RHSA-2024:7483) Low: linux-firmware security update | October 2, 2024 |
RHSA-2024:7482 | (RHSA-2024:7482) Moderate: linux-firmware security update | October 2, 2024 |
RHSA-2024:7481 | (RHSA-2024:7481) Important: linux-firmware security update | October 2, 2024 |
RHSA-2024:7418 | (RHSA-2024:7418) Moderate: linux-firmware security update | October 1, 2024 |
RHSA-2024:5982 | (RHSA-2024:5982) Important: linux-firmware security update | August 29, 2024 |
By the Year
In 2024 there have been 0 vulnerabilities in Red Hat Linux . Last year Linux had 1 security vulnerability published. Right now, Linux is on track to have less security vulnerabilities in 2024 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 1 | 5.90 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 2 | 7.80 |
It may take a day or so for new Linux vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Linux Security Vulnerabilities
A vulnerability was found
CVE-2023-5981
5.9 - Medium
- November 28, 2023
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
Side Channel Attack
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries
CVE-2018-20346
8.1 - High
- December 21, 2018
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
Integer Overflow or Wraparound
Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c
CVE-2018-17962
7.5 - High
- October 09, 2018
Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
Integer Overflow or Wraparound
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled
CVE-2016-3699
7.4 - High
- October 07, 2016
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Permissions, Privileges, and Access Controls
Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite);
CVE-2007-2834
- September 18, 2007
Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow.
Integer Overflow or Wraparound
Memory leak in the ip_options_get function in the Linux kernel before 2.6.10
CVE-2004-1335
- December 15, 2004
Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.
Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10
CVE-2004-1333
- December 15, 2004
Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake
CVE-2004-0079
7.5 - High
- November 23, 2004
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
NULL Pointer Dereference
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which
CVE-2004-0081
- November 23, 2004
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake
CVE-2004-0112
- November 23, 2004
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
Out-of-bounds Read
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename
CVE-2003-0041
- February 19, 2003
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.
Shell injection
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2
CVE-2002-0083
9.8 - Critical
- March 15, 2002
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
off-by-five
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux
CVE-2002-0062
- March 08, 2002
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Classic Buffer Overflow
Buffer overflow in ncurses library
CVE-2000-0963
- December 19, 2000
Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.
The initscripts package in Red Hat Linux
CVE-2000-0031
- October 20, 2000
The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack.
An installation of Red Hat uses DES password encryption with crypt() for the initial password
CVE-2000-0093
- January 21, 2000
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.
Red Hat Linux screen program does not use Unix98 ptys
CVE-1999-0894
- January 04, 2000
Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.
Buffer overflow in Linux linuxconf package
CVE-2000-0017
- December 21, 1999
Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter.
Buffer overflows in Red Hat net-tools package.
CVE-1999-0748
- June 24, 1999
Buffer overflows in Red Hat net-tools package.
XFree86 startx command is vulnerable to a symlink attack
CVE-1999-0433
- March 21, 1999
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a
CVE-1999-0368
- February 09, 1999
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
A Unix account has a default
CVE-1999-0502
- March 01, 1998
A Unix account has a default, null, blank, or missing password.
Buffer overflow in telnet daemon tgetent routing
CVE-1999-0192
- October 18, 1997
Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.
Buffer overflow in suidperl (sperl)
CVE-1999-0034
- May 29, 1997
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
Arbitrary command execution
CVE-1999-0037
- May 21, 1997
Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail.
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
CVE-1999-0042
- April 07, 1997
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
Buffer overflow in xmcd 2.0p12
CVE-1999-0318
- March 01, 1997
Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable.
ucbmail allows remote attackers to execute commands via shell metacharacters
CVE-1999-0868
- February 20, 1997
ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN.
Buffer overflow in NLS (Natural Language Service).
CVE-1999-0041
- February 13, 1997
Buffer overflow in NLS (Natural Language Service).
Buffer overflow in Vixie Cron library up to version 3.0
CVE-1999-0297
- December 12, 1996
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages
CVE-1999-0043
- December 04, 1996
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.
Bash treats any character with a value of 255 as a command separator.
CVE-1999-0234
- October 08, 1996
Bash treats any character with a value of 255 as a command separator.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Suse Linux or by Red Hat? Click the Watch button to subscribe.