Red Hat Linux
Recent Red Hat Linux Security Advisories
Advisory | Title | Published |
---|---|---|
RHSA-2023:0389 | (RHSA-2023:0389) Moderate: OpenJDK 17.0.6 Security Update for Portable Linux Builds | January 23, 2023 |
RHSA-2023:0388 | (RHSA-2023:0388) Moderate: OpenJDK 11.0.18 Security Update for Portable Linux Builds | January 23, 2023 |
RHSA-2023:0387 | (RHSA-2023:0387) Moderate: OpenJDK 8u362 Security Update for Portable Linux Builds | January 23, 2023 |
RHSA-2022:7887 | (RHSA-2022:7887) Important: linux-firmware security update | November 9, 2022 |
RHSA-2022:7053 | (RHSA-2022:7053) Moderate: OpenJDK 17.0.5 Security Update for Portable Linux Builds | October 20, 2022 |
RHSA-2022:7054 | (RHSA-2022:7054) Moderate: OpenJDK 11.0.17 Security Update for Portable Linux Builds | October 20, 2022 |
RHSA-2022:7050 | (RHSA-2022:7050) Moderate: OpenJDK 8u352 Security Update for Portable Linux Builds | October 20, 2022 |
RHSA-2022:5948 | (RHSA-2022:5948) Moderate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update | August 9, 2022 |
RHSA-2022:5758 | (RHSA-2022:5758) Important: OpenJDK 17.0.4 Security Update for Portable Linux Builds | July 28, 2022 |
RHSA-2022:5755 | (RHSA-2022:5755) Important: OpenJDK 11.0.16 Security Update for Portable Linux Builds | July 28, 2022 |
By the Year
In 2023 there have been 0 vulnerabilities in Red Hat Linux . Linux did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 2 | 7.80 |
It may take a day or so for new Linux vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Linux Security Vulnerabilities
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries
CVE-2018-20346
8.1 - High
- December 21, 2018
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
Integer Overflow or Wraparound
Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c
CVE-2018-17962
7.5 - High
- October 09, 2018
Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
Integer Overflow or Wraparound
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled
CVE-2016-3699
7.4 - High
- October 07, 2016
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Permissions, Privileges, and Access Controls
Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite);
CVE-2007-2834
- September 18, 2007
Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow.
Integer Overflow or Wraparound
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake
CVE-2004-0079
- November 23, 2004
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which
CVE-2004-0081
- November 23, 2004
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake
CVE-2004-0112
- November 23, 2004
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux
CVE-2002-0062
- March 08, 2002
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Classic Buffer Overflow
Buffer overflow in ncurses library
CVE-2000-0963
- December 19, 2000
Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.
The initscripts package in Red Hat Linux
CVE-2000-0031
- October 20, 2000
The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack.
An installation of Red Hat uses DES password encryption with crypt() for the initial password
CVE-2000-0093
- January 21, 2000
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.
Red Hat Linux screen program does not use Unix98 ptys
CVE-1999-0894
- January 04, 2000
Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.
Buffer overflow in Linux linuxconf package
CVE-2000-0017
- December 21, 1999
Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter.
Buffer overflows in Red Hat net-tools package.
CVE-1999-0748
- June 24, 1999
Buffer overflows in Red Hat net-tools package.
XFree86 startx command is vulnerable to a symlink attack
CVE-1999-0433
- March 21, 1999
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a
CVE-1999-0368
- February 09, 1999
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
A Unix account has a default
CVE-1999-0502
- March 01, 1998
A Unix account has a default, null, blank, or missing password.
Buffer overflow in telnet daemon tgetent routing
CVE-1999-0192
- October 18, 1997
Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.
Buffer overflow in suidperl (sperl)
CVE-1999-0034
- May 29, 1997
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
Arbitrary command execution
CVE-1999-0037
- May 21, 1997
Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail.
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
CVE-1999-0042
- April 07, 1997
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
Buffer overflow in xmcd 2.0p12
CVE-1999-0318
- March 01, 1997
Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable.
ucbmail allows remote attackers to execute commands via shell metacharacters
CVE-1999-0868
- February 20, 1997
ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN.
Buffer overflow in NLS (Natural Language Service).
CVE-1999-0041
- February 13, 1997
Buffer overflow in NLS (Natural Language Service).
Buffer overflow in Vixie Cron library up to version 3.0
CVE-1999-0297
- December 12, 1996
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages
CVE-1999-0043
- December 04, 1996
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.
Bash treats any character with a value of 255 as a command separator.
CVE-1999-0234
- October 08, 1996
Bash treats any character with a value of 255 as a command separator.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Suse Linux or by Red Hat? Click the Watch button to subscribe.
