Linux Red Hat Linux

Do you want an email whenever new security vulnerabilities are reported in Red Hat Linux?

Recent Red Hat Linux Security Advisories

Advisory Title Published
RHSA-2023:7109 (RHSA-2023:7109) Moderate: linux-firmware security, bug fix, and enhancement update November 14, 2023
RHSA-2023:6595 (RHSA-2023:6595) Important: linux-firmware security, bug fix, and enhancement update November 7, 2023
RHSA-2023:5734 (RHSA-2023:5734) Moderate: OpenJDK 11.0.21 Security Update for Portable Linux Builds October 18, 2023
RHSA-2023:5607 (RHSA-2023:5607) Moderate: linux-firmware security and enhancement update October 10, 2023
RHSA-2023:5591 (RHSA-2023:5591) Moderate: linux-firmware security update October 10, 2023
RHSA-2023:5068 (RHSA-2023:5068) Moderate: linux-firmware security update September 12, 2023
RHSA-2023:4209 (RHSA-2023:4209) Moderate: OpenJDK 8u382 Security Update for Portable Linux Builds July 20, 2023
RHSA-2023:1903 (RHSA-2023:1903) Important: OpenJDK 8u372 Security Update for Portable Linux Builds April 25, 2023
RHSA-2023:1884 (RHSA-2023:1884) Important: OpenJDK 17.0.7 Security Update for Portable Linux Builds April 19, 2023
RHSA-2023:1882 (RHSA-2023:1882) Important: OpenJDK 11.0.19 Security Update for Portable Linux Builds April 19, 2023

By the Year

In 2023 there have been 1 vulnerability in Red Hat Linux with an average score of 5.9 out of ten. Linux did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2023 as compared to last year.

Year Vulnerabilities Average Score
2023 1 5.90
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 2 7.80

It may take a day or so for new Linux vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Linux Security Vulnerabilities

A vulnerability was found

CVE-2023-5981 5.9 - Medium - November 28, 2023

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

Side Channel Attack

SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries

CVE-2018-20346 8.1 - High - December 21, 2018

SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.

Integer Overflow or Wraparound

Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c

CVE-2018-17962 7.5 - High - October 09, 2018

Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.

Integer Overflow or Wraparound

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled

CVE-2016-3699 7.4 - High - October 07, 2016

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

Permissions, Privileges, and Access Controls

Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite);

CVE-2007-2834 - September 18, 2007

Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow.

Integer Overflow or Wraparound

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake

CVE-2004-0079 - November 23, 2004

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.

The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake

CVE-2004-0112 - November 23, 2004

The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which

CVE-2004-0081 - November 23, 2004

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.

Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux

CVE-2002-0062 - March 08, 2002

Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."

Classic Buffer Overflow

Buffer overflow in ncurses library

CVE-2000-0963 - December 19, 2000

Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.

The initscripts package in Red Hat Linux

CVE-2000-0031 - October 20, 2000

The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack.

An installation of Red Hat uses DES password encryption with crypt() for the initial password

CVE-2000-0093 - January 21, 2000

An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.

Red Hat Linux screen program does not use Unix98 ptys

CVE-1999-0894 - January 04, 2000

Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.

Buffer overflow in Linux linuxconf package

CVE-2000-0017 - December 21, 1999

Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter.

Buffer overflows in Red Hat net-tools package.

CVE-1999-0748 - June 24, 1999

Buffer overflows in Red Hat net-tools package.

XFree86 startx command is vulnerable to a symlink attack

CVE-1999-0433 - March 21, 1999

XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a

CVE-1999-0368 - February 09, 1999

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.

A Unix account has a default

CVE-1999-0502 - March 01, 1998

A Unix account has a default, null, blank, or missing password.

Buffer overflow in telnet daemon tgetent routing

CVE-1999-0192 - October 18, 1997

Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.

Buffer overflow in suidperl (sperl)

CVE-1999-0034 - May 29, 1997

Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.

Arbitrary command execution

CVE-1999-0037 - May 21, 1997

Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail.

Buffer overflow in University of Washington's implementation of IMAP and POP servers.

CVE-1999-0042 - April 07, 1997

Buffer overflow in University of Washington's implementation of IMAP and POP servers.

Buffer overflow in xmcd 2.0p12

CVE-1999-0318 - March 01, 1997

Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable.

ucbmail allows remote attackers to execute commands via shell metacharacters

CVE-1999-0868 - February 20, 1997

ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN.

Buffer overflow in NLS (Natural Language Service).

CVE-1999-0041 - February 13, 1997

Buffer overflow in NLS (Natural Language Service).

Buffer overflow in Vixie Cron library up to version 3.0

CVE-1999-0297 - December 12, 1996

Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.

Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages

CVE-1999-0043 - December 04, 1996

Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.

Bash treats any character with a value of 255 as a command separator.

CVE-1999-0234 - October 08, 1996

Bash treats any character with a value of 255 as a command separator.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Suse Linux or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

Red Hat Linux
Product

subscribe