cve
stringlengths 13
16
| affected_component
stringlengths 0
177
| summary
stringlengths 0
227
| severity
stringclasses 5
values | cvss_v2
stringclasses 234
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 30
4k
| statement
stringlengths 31
2.49k
⌀ | release_date
stringlengths 25
25
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
351
| known_not_affected_products
sequencelengths 0
29.8k
| under_investigation_products
sequencelengths 0
77
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
214
| remediation_details
sequencelengths 0
214
| remediation_dates
sequencelengths 0
214
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2002-0166 | security flaw | None | null | null | Cross-site scripting vulnerability in analog before 5.22 allows remote attackers to execute Javascript via an HTTP request containing the script, which is entered into a web logfile and not properly filtered by analog during display. | null | 2024-11-21T22:20:00+00:00 | [
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-10T14:47:00+00:00"
] |
|
CVE-2002-1235 | security flaw | Critical | null | null | The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack. | null | 2024-11-21T22:31:09+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-11-07T16:26:00+00:00",
"2002-11-07T17:35:00+00:00"
] |
|
CVE-2002-1366 | security flaw | None | null | null | Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream. | null | 2024-11-21T22:33:54+00:00 | [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-13T15:34:00+00:00"
] |
|
CVE-2002-0062 | security flaw | None | null | null | Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling." | null | 2024-11-21T22:16:34+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata \nrelevant to your system have been applied. \n \nTo update all RPMs for your particular architecture, run: \n \nrpm -Fvh [filenames] \n \nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those \nRPMs which are currently installed will be updated. Those RPMs which are \nnot installed but included in the list will not be updated. Note that \nyou \ncan also use wildcards (*.rpm) if your current directory *only* contains \nthe \ndesired RPMs. \n \nPlease note that this update is also available via Red Hat Network. \nMany \npeople find this an easier way to apply updates. To use Red Hat \nNetwork, \nlaunch the Red Hat Update Agent with the following command: \n \nup2date \n \nThis will start an interactive process that will result in the \nappropriate \nRPMs being upgraded on your system."
] | [
"2002-02-21T21:37:00+00:00"
] |
|
CVE-2002-1223 | security flaw | None | null | null | Buffer overflow in DSC 3.0 parser from GSview, as used in KGhostView in KDE 1.1 and KDE 3.0.3a, may allow attackers to cause a denial of service or execute arbitrary code via a modified .ps (PostScript) input file. | null | 2024-11-21T22:29:42+00:00 | [
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-12-04T10:32:00+00:00"
] |
|
CVE-2002-0170 | security flaw | None | null | null | Zope 2.2.0 through 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration. | null | 2024-11-21T22:20:06+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-09-25T15:13:00+00:00"
] |
|
CVE-2002-0388 | security flaw | Important | null | null | Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries. | null | 2024-11-21T22:22:58+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1",
"Red Hat Secure Web Server 3.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-07-12T22:59:00+00:00",
"2002-06-10T20:28:00+00:00",
"2002-06-10T20:25:00+00:00",
"2002-06-27T08:29:00+00:00"
] |
|
CVE-2002-1126 | security flaw | None | null | null | Mozilla 1.1 and earlier, and Mozilla-based browsers such as Netscape and Galeon, set the document referrer too quickly in certain situations when a new page is being loaded, which allows web pages to determine the next page that is being visited, including manually entered URLs, using the onunload handler. | null | 2024-11-21T22:27:50+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-18T09:15:00+00:00",
"2003-02-12T14:42:00+00:00"
] |
|
CVE-2002-0808 | security flaw | None | null | null | Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, when performing a mass change, sets the groupset of all bugs to the groupset of the first bug, which could inadvertently cause insecure groupset permissions to be assigned to some bugs. | null | 2024-11-21T22:23:52+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-20T18:42:00+00:00"
] |
|
CVE-2002-1472 | security flaw | None | null | null | Untrusted search path vulnerability in libX11.so in xfree86, when used in setuid or setgid programs, allows local users to gain root privileges via a modified LD_PRELOAD environment variable that points to a malicious module. | null | 2024-11-21T22:39:57+00:00 | [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-06-25T12:49:00+00:00",
"2003-06-25T15:52:00+00:00"
] |
|
CVE-2002-1281 | security flaw | Important | null | null | Unknown vulnerability in the rlogin KIO subsystem (rlogin.protocol) of KDE 2.x 2.1 and later, and KDE 3.x 3.0.4 and earlier, allows local and remote attackers to execute arbitrary code via a certain URL. | null | 2024-11-21T22:30:02+00:00 | [
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-12-04T10:32:00+00:00"
] |
|
CVE-2002-0185 | security flaw | None | null | null | mod_python version 2.7.6 and earlier allows a module indirectly imported by a published module to then be accessed via the publisher, which allows remote attackers to call possibly dangerous functions from the imported module. | null | 2024-11-21T22:21:00+00:00 | [
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-05-02T08:57:00+00:00"
] |
|
CVE-2002-1393 | security flaw | Important | null | null | Multiple vulnerabilities in KDE 2 and KDE 3.x through 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote attackers to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses. | null | 2024-11-21T22:35:49+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-12T16:32:00+00:00",
"2003-02-17T09:53:00+00:00"
] |
|
CVE-2002-1405 | security flaw | Low | null | null | CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters. | null | 2024-11-21T22:37:16+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-02-12T19:22:00+00:00",
"2003-02-21T08:41:00+00:00"
] |
|
CVE-2002-0081 | security flaw | Critical | null | null | Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled. | null | 2024-11-21T22:18:00+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Stronghold 3"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter applying these updates you will need to restart your web server if it\nwas running before the update was applied.",
"Please consult the Stronghold documentation on how to upgrade Stronghold"
] | [
"2002-02-28T17:54:00+00:00",
"2002-02-28T00:00:00+00:00"
] |
|
CVE-2002-0594 | security flaw | Low | null | null | Netscape 6 and Mozilla 1.0 RC1 and earlier allows remote attackers to determine the existence of files on the client system via a LINK element in a Cascading Style Sheet (CSS) page that causes an HTTP redirect. | null | 2024-11-21T22:27:40+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-18T09:15:00+00:00",
"2003-02-12T14:42:00+00:00"
] |
|
CVE-2002-1151 | security flaw | None | null | null | The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 through 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote attackers to execute script and steal cookies from subframes that are in other domains. | null | 2024-11-21T22:29:40+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-12-04T10:32:00+00:00",
"2002-12-04T10:26:00+00:00"
] |
|
CVE-2002-0804 | security flaw | None | null | null | Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, when configured to perform reverse DNS lookups, allows remote attackers to bypass IP restrictions by connecting from a system with a spoofed reverse DNS hostname. | null | 2024-11-21T22:23:35+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-20T18:42:00+00:00"
] |
|
CVE-2002-0384 | security flaw | None | null | null | Buffer overflow in Jabber plug-in for Gaim client before 0.58 allows remote attackers to execute arbitrary code. | null | 2024-11-21T22:22:50+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only \nthose RPMs which are currently installed will be updated. Those RPMs\nwhich are not installed but included in the list will not be updated. \nNote that you can also use wildcards (*.rpm) if your current directory\n*only* contains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. \nMany people find this an easier way to apply updates. To use Red Hat \nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the \nappropriate RPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only \nthose RPMs which are currently installed will be updated. Those RPMs\nwhich are not installed but included in the list will not be updated.\nNote that you can also use wildcards (*.rpm) if your current directory \n*only* contains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. \nMany people find this an easier way to apply updates. To use Red Hat \nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the \nappropriate RPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-06T07:19:00+00:00",
"2002-08-06T07:12:00+00:00",
"2002-08-02T13:50:00+00:00"
] |
|
CVE-2002-0003 | security flaw | Important | null | null | Buffer overflow in the preprocessor in groff 1.16 and earlier allows remote attackers to gain privileges via lpd in the LPRng printing system. | null | 2024-11-21T22:15:22+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-14T16:16:00+00:00"
] |
|
CVE-2002-0146 | security flaw | None | null | null | fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array. | null | 2024-11-21T22:19:10+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-05-21T13:16:00+00:00"
] |
|
CVE-2002-2439 | gcc | Integer overflow can occur during the computation of the memory region size for new[] operator | Moderate | 3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P | null | Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts. | null | 2024-11-21T16:05:03+00:00 | [] | [
"red_hat_enterprise_linux_5:compat-gcc-295",
"red_hat_enterprise_linux_5:compat-gcc-296",
"red_hat_enterprise_linux_5:compat-gcc-32",
"red_hat_enterprise_linux_5:compat-gcc-34",
"red_hat_enterprise_linux_5:gcc",
"red_hat_enterprise_linux_5:gcc43",
"red_hat_enterprise_linux_5:gcc44",
"red_hat_enterprise_linux_6:compat-gcc-295",
"red_hat_enterprise_linux_6:compat-gcc-296",
"red_hat_enterprise_linux_6:compat-gcc-32",
"red_hat_enterprise_linux_6:compat-gcc-34",
"red_hat_enterprise_linux_6:gcc"
] | [
"red_hat_enterprise_linux_7:gcc"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned"
] | [
"Will not fix"
] | [
null
] |
CVE-2002-0404 | security flaw | Moderate | null | null | Vulnerability in GIOP dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (memory consumption). | null | 2024-11-21T22:18:24+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-06-06T06:53:00+00:00",
"2002-09-13T19:09:00+00:00",
"2002-09-13T14:23:00+00:00"
] |
|
CVE-2002-1350 | security flaw | None | null | null | The BGP decoding routines in tcpdump 3.6.x before 3.7 do not properly copy data, which allows remote attackers to cause a denial of service (application crash). | null | 2024-11-21T22:37:27+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-04-23T14:55:00+00:00",
"2003-02-26T15:17:00+00:00"
] |
|
CVE-2002-0392 | security flaw | Moderate | null | null | Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size. | null | 2024-11-21T22:23:14+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Secure Web Server 3.2",
"Red Hat Stronghold 3",
"Red Hat Stronghold 4",
"Stronghold 4 for Red Hat Enterprise Linux"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"We have backported the security fix from the official Apache 1.3.26\nrelease. The patch and instructions on how to apply it are available \nfrom the Stronghold resource center at http://stronghold.redhat.com/.\n\nStronghold 3: http://stronghold.redhat.com/sh3/errata-2002-118\n\nStronghold 4: http://stronghold.redhat.com/sh4/errata-2002-118 \n\nUpdated packages will also be made available shortly from the same URLs.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nSome of these files are distributed in rhmask format and may only be used\nby individuals who have purchased Red Hat Linux 6.2 Professional.\n\nTo produce installable RPM files from the rhmask files, retrieve the rhmask\nfiles via ftp and type the following command:\n\nrhmask secureweb-3.2-12.i386.rpm secureweb-3.2.6-1.i386.rpm.rhmask\n\nThe original RPM is located only on your Secure Web Server CD, and cannot\nbe obtained via the Internet. \n\nNote: If you do not have the original RPM located in the same directory as\nthe rhmask file, you will need to prefix the name of the RPM with the full\npath name to its location (for example, on your installation CD).\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-06-20T13:22:00+00:00",
"2002-06-30T15:23:00+00:00",
"2002-06-19T23:57:00+00:00",
"2002-07-31T16:23:00+00:00",
"2002-07-12T23:00:00+00:00"
] |
|
CVE-2002-0687 | security flaw | None | null | null | The "through the web code" capability for Zope 2.0 through 2.5.1 b1 allows untrusted users to shut down the Zope server via certain headers. | null | 2024-11-21T22:20:08+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-09-25T15:13:00+00:00"
] |
|
CVE-2002-0002 | security flaw | None | null | null | Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code. | null | 2024-11-21T22:15:04+00:00 | [
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure you have applied all previously\nreleased errata relevant to your system.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-07T21:59:00+00:00"
] |
|
CVE-2002-1306 | security flaw | Moderate | null | null | Multiple buffer overflows in LISa on KDE 2.x for 2.1 and later, and KDE 3.x before 3.0.4, allow (1) local and possibly remote attackers to execute arbitrary code via the "lisa" daemon, and (2) remote attackers to execute arbitrary code via a certain "lan://" URL. | null | 2024-11-21T22:30:08+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-12-04T10:26:00+00:00",
"2002-12-04T10:32:00+00:00"
] |
|
CVE-2002-0844 | security flaw | Low | null | null | Off-by-one overflow in the CVS PreservePermissions of rcs.c for CVSD before 1.11.2 allows local users to execute arbitrary code. | null | 2024-11-21T22:55:00+00:00 | [
"3AS:cvs-0:1.11.2-14.i386",
"3AS:cvs-0:1.11.2-14.ia64",
"3AS:cvs-0:1.11.2-14.ppc",
"3AS:cvs-0:1.11.2-14.s390",
"3AS:cvs-0:1.11.2-14.s390x",
"3AS:cvs-0:1.11.2-14.src",
"3AS:cvs-0:1.11.2-14.x86_64",
"3Desktop:cvs-0:1.11.2-14.i386",
"3Desktop:cvs-0:1.11.2-14.ia64",
"3Desktop:cvs-0:1.11.2-14.ppc",
"3Desktop:cvs-0:1.11.2-14.s390",
"3Desktop:cvs-0:1.11.2-14.s390x",
"3Desktop:cvs-0:1.11.2-14.src",
"3Desktop:cvs-0:1.11.2-14.x86_64",
"3ES:cvs-0:1.11.2-14.i386",
"3ES:cvs-0:1.11.2-14.ia64",
"3ES:cvs-0:1.11.2-14.ppc",
"3ES:cvs-0:1.11.2-14.s390",
"3ES:cvs-0:1.11.2-14.s390x",
"3ES:cvs-0:1.11.2-14.src",
"3ES:cvs-0:1.11.2-14.x86_64",
"3WS:cvs-0:1.11.2-14.i386",
"3WS:cvs-0:1.11.2-14.ia64",
"3WS:cvs-0:1.11.2-14.ppc",
"3WS:cvs-0:1.11.2-14.s390",
"3WS:cvs-0:1.11.2-14.s390x",
"3WS:cvs-0:1.11.2-14.src",
"3WS:cvs-0:1.11.2-14.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2004-01-14T13:16:00+00:00"
] |
|
CVE-2002-0014 | security flaw | None | null | null | URL-handling code in Pine 4.43 and earlier allows remote attackers to execute arbitrary commands via a URL enclosed in single quotes and containing shell metacharacters (&). | null | 2024-11-21T22:15:48+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-15T16:00:00+00:00"
] |
|
CVE-2002-0043 | security flaw | None | null | null | sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked. | null | 2024-11-21T22:16:01+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-15T08:46:00+00:00",
"2002-01-15T08:52:00+00:00"
] |
|
CVE-2002-1347 | security flaw | None | null | null | Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string. | null | 2024-11-21T22:32:40+00:00 | [
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-07T09:12:00+00:00"
] |
|
CVE-2002-0805 | security flaw | None | null | null | Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, (1) creates new directories with world-writable permissions, and (2) creates the params file with world-writable permissions, which allows local users to modify the files and execute code. | null | 2024-11-21T22:23:40+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-20T18:42:00+00:00"
] |
|
CVE-2002-0653 | security flaw | Moderate | null | null | Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries. | null | 2024-11-21T22:24:44+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Secure Web Server 3.2",
"Red Hat Stronghold 3",
"Stronghold 4 for Red Hat Enterprise Linux"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"We have backported the security fixes for the versions of OpenSSL, mod_ssl\nand mm included in Stronghold 3. Stronghold 3.0 build code 3018 is now\navailable which includes these fixes, and can be downloaded from \nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3.0, see \nhttp://stronghold.redhat.com/support/upgrade-sh3.xml",
"Some of these files are distributed in rhmask format and may only be used\nby individuals who have purchased Red Hat Linux 6.2 Professional.\n\nTo produce installable RPM files from the rhmask files, retrieve the rhmask\nfiles via ftp and type the following command:\n\nrhmask secureweb-3.2-12.i386.rpm secureweb-3.2.7-1.i386.rpm.rhmask\n\nThe original RPM is located only on your Secure Web Server CD and cannot\nbe obtained via the Internet. \n\nNote: If you do not have the original RPM located in the same directory as\nthe rhmask file, you will need to prefix the name of the RPM with the full\npath name to its location (for example, on your installation CD).\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nAfter the appropriate updates have been applied, it will be necessary to\nmanually restart the server with the following command:\n\n/sbin/service httpsd restart",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter the appropriate updates have been applied, it will be necessary to\nmanually restart the server with the following command:\n\n/sbin/service httpd restart",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter the appropriate updates have been applied, it will be necessary to\nmanually restart the server with the following command:\n\n/sbin/service httpd restart",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter the appropriate updates have been applied, it will be necessary to\nmanually restart the server with the following command:\n\n/sbin/service httpd restart"
] | [
"2002-07-31T15:58:00+00:00",
"2002-07-24T08:37:00+00:00",
"2002-07-16T19:23:00+00:00",
"2002-08-01T21:25:00+00:00",
"2002-07-16T21:35:00+00:00"
] |
|
CVE-2002-0080 | security flaw | None | null | null | rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed. | null | 2024-11-21T22:16:50+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nThe procedure for upgrading the kernel is documented at:\n\n http://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-03-11T20:15:00+00:00"
] |
|
CVE-2002-1384 | security flaw | Important | null | null | Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf. | null | 2024-11-21T22:34:19+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-13T15:34:00+00:00",
"2003-02-06T15:03:00+00:00",
"2003-01-30T19:29:00+00:00"
] |
|
CVE-2002-0429 | security flaw | None | null | null | The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall). | null | 2024-11-21T22:25:58+00:00 | [
"Red Hat Linux 7.3"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2002-08-21T18:09:00+00:00"
] |
|
CVE-2002-1392 | security flaw | Low | null | null | faxspool in mgetty before 1.1.29 uses a world-writable spool directory for outgoing faxes, which allows local users to modify fax transmission privileges. | null | 2024-11-21T22:35:32+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-02-11T16:46:00+00:00",
"2003-04-08T12:16:00+00:00"
] |
|
CVE-2002-1146 | security flaw | Moderate | null | null | The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash). | null | 2024-11-21T22:28:16+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-04T06:17:00+00:00",
"2003-01-30T19:35:00+00:00"
] |
|
CVE-2002-0184 | security flaw | None | null | null | Sudo before 1.6.6 contains an off-by-one error that can result in a heap-based buffer overflow that may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded. | null | 2024-11-21T22:21:08+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-25T21:21:00+00:00",
"2002-04-25T21:18:00+00:00"
] |
|
CVE-2002-2443 | krb5 | UDP ping-pong flaw in kpasswd | Moderate | 5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P | null | schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103. | null | 2024-11-22T06:39:01+00:00 | [
"5Server-5.9.Z:krb5-0:1.6.1-70.el5_9.2.src",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc64",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc64",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc64",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.x86_64",
"6Client-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258"
] | [
"2013-06-12T16:46:00+00:00"
] |
CVE-2002-0059 | zlib | Double free in inflateEnd | Moderate | null | 6.9/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H | The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data. | null | 2024-12-06T08:25:53+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [
"red_hat_enterprise_linux_6:zlib",
"red_hat_enterprise_linux_7:zlib",
"red_hat_enterprise_linux_8:zlib",
"red_hat_enterprise_linux_9:zlib",
"red_hat_jboss_enterprise_application_platform_6:zlib",
"red_hat_software_collections:rh-nodejs12-nodejs",
"red_hat_software_collections:rh-nodejs14-nodejs"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nThe procedure for upgrading the kernel is documented at:\n\n http://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-03-11T20:15:00+00:00",
"2002-03-11T18:09:00+00:00"
] |
CVE-2002-1131 | security flaw | None | null | null | Cross-site scripting vulnerabilities in SquirrelMail 1.2.7 and earlier allows remote attackers to execute script as other web users via (1) addressbook.php, (2) options.php, (3) search.php, or (4) help.php. | null | 2024-11-21T22:28:30+00:00 | [
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-10T14:53:00+00:00"
] |
|
CVE-2002-1170 | security flaw | None | null | null | The handle_var_requests function in snmp_agent.c for the SNMP daemon in the Net-SNMP (formerly ucd-snmp) package 5.0.1 through 5.0.5 allows remote attackers to cause a denial of service (crash) via a NULL dereference. | null | 2024-11-21T22:30:49+00:00 | [
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-12-17T10:09:00+00:00"
] |
|
CVE-2002-0809 | security flaw | None | null | null | Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, does not properly handle URL-encoded field names that are generated by some browsers, which could cause certain fields to appear to be unset, which has the effect of removing group permissions on bugs when buglist.cgi is provided with the encoded field names. | null | 2024-11-21T22:23:54+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-20T18:42:00+00:00"
] |
|
CVE-2002-0389 | mailman | Local users able to read private mailing list archives | Low | 2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N | null | It was found that mailman stored private email messages in a world-readable directory. A local user could use this flaw to read private mailing list archives. | null | 2024-11-22T09:00:33+00:00 | [
"6Server:mailman-3:2.1.12-25.el6.i686",
"6Server:mailman-3:2.1.12-25.el6.ppc64",
"6Server:mailman-3:2.1.12-25.el6.s390x",
"6Server:mailman-3:2.1.12-25.el6.src",
"6Server:mailman-3:2.1.12-25.el6.x86_64",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.i686",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.ppc64",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.s390x",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.x86_64",
"6Workstation:mailman-3:2.1.12-25.el6.i686",
"6Workstation:mailman-3:2.1.12-25.el6.ppc64",
"6Workstation:mailman-3:2.1.12-25.el6.s390x",
"6Workstation:mailman-3:2.1.12-25.el6.src",
"6Workstation:mailman-3:2.1.12-25.el6.x86_64",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.i686",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.ppc64",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.s390x",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.x86_64"
] | [
"red_hat_enterprise_linux_4:mailman",
"red_hat_enterprise_linux_5:mailman"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"no_fix_planned"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Will not fix"
] | [
"2015-07-20T14:06:40+00:00",
null
] |
CVE-2002-1367 | security flaw | None | null | null | Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a "need authorization" page, as demonstrated by new-coke. | null | 2024-11-21T22:33:55+00:00 | [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-13T15:34:00+00:00"
] |
|
CVE-2002-0825 | security flaw | Important | null | null | Buffer overflow in the DNS SRV code for nss_ldap before nss_ldap-198 allows remote attackers to cause a denial of service and possibly execute arbitrary code. | null | 2024-11-21T22:27:03+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"This update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-04T07:20:00+00:00",
"2002-10-04T07:19:00+00:00"
] |
|
CVE-2002-0063 | security flaw | None | null | null | Buffer overflow in ippRead function of CUPS before 1.1.14 may allow attackers to execute arbitrary code via long attribute names or language values. | null | 2024-11-21T22:17:48+00:00 | [
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Uvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-03-15T12:36:00+00:00"
] |
|
CVE-2002-1371 | security flaw | None | null | null | filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif. | null | 2024-11-21T22:34:09+00:00 | [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-13T15:34:00+00:00"
] |
|
CVE-2002-0167 | security flaw | Important | null | null | Imlib before 1.9.13 sometimes uses the NetPBM package to load trusted images, which could allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain weaknesses of NetPBM. | null | 2024-11-21T22:19:10+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-03-21T15:48:00+00:00"
] |
|
CVE-2002-0029 | security flaw | Important | null | null | Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684. | null | 2024-11-21T23:07:55+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] | [
"2004-08-04T21:36:00+00:00"
] |
|
CVE-2002-1511 | security flaw | Moderate | null | null | The vncserver wrapper for vnc before 3.3.3r2-21 uses the rand() function instead of srand(), which causes vncserver to generate weak cookies. | null | 2024-11-21T22:32:59+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-02-21T08:40:00+00:00",
"2003-02-26T16:23:00+00:00"
] |
|
CVE-2002-0838 | security flaw | None | null | null | Buffer overflow in (1) gv 3.5.8 and earlier, (2) gvv 1.0.2 and earlier, (3) ggv 1.99.90 and earlier, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and earlier, allows attackers to execute arbitrary code via a malformed (a) PDF or (b) PostScript file, which is processed by an unsafe call to sscanf. | null | 2024-11-21T22:28:54+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-10T20:19:00+00:00",
"2002-10-10T20:23:00+00:00",
"2002-10-04T07:25:00+00:00"
] |
|
CVE-2002-1395 | security flaw | None | null | null | Internet Message (IM) 141-18 and earlier uses predictable file and directory names, which allows local users to (1) obtain unauthorized directory permissions via a temporary directory used by impwagent, and (2) overwrite and create arbitrary files via immknmz. | null | 2024-11-21T22:34:57+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-06T15:08:00+00:00",
"2003-02-26T19:46:00+00:00"
] |
|
CVE-2002-0068 | security flaw | None | null | null | Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service (core dump) and possibly execute arbitrary code with an ftp:// URL with a larger number of special characters, which exceed the buffer when Squid URL-escapes the characters. | null | 2024-11-21T22:17:15+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-02-26T22:09:00+00:00"
] |
|
CVE-2002-1383 | security flaw | None | null | null | Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun. | null | 2024-11-21T22:34:19+00:00 | [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-13T15:34:00+00:00"
] |
|
CVE-2002-1157 | security flaw | Low | null | null | Cross-site scripting vulnerability in the mod_ssl Apache module 2.8.9 and earlier, when UseCanonicalName is off and wildcard DNS is enabled, allows remote attackers to execute script as other web site visitors, via the server name in an HTTPS response on the SSL port, which is used in a self-referencing URL, a different vulnerability than CAN-2002-0840. | null | 2024-11-21T22:30:27+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1",
"Red Hat Stronghold 3",
"Red Hat Stronghold 4",
"Stronghold 4 for Red Hat Enterprise Linux"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. \n\nAfter the errata packages are installed, restart the Web service by running\nthe following command:\n\n/sbin/service httpd restart",
"Backported fixes are available for the versions of Apache, mod_ssl, and PHP\nincluded in Stronghold 3. Stronghold 3 build code 3020 is now available\nwhich includes this fix, and can be downloaded from the following URL:\n\nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3, refer\nto the following URL:\n\nhttp://stronghold.redhat.com/support/upgrade-sh3.xml",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"We have backported the security fixes for the versions of OpenSSL\nand mm included in Stronghold 4. The fixed packages are now available via\nthe update agent service; run\n\n$ bin/agent\n\nfrom the Stronghold 4 install root to upgrade an existing Stronghold 4\ninstallation to the new package versions. After upgrading Stronghold, the\nserver must be completely restarted by running the following commands from\nthe install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nsee http://stronghold.redhat.com/support/upgrade-sh4",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter the errata packages are installed, restart the Web service by running\nthe following command:\n\n/sbin/service httpd restart"
] | [
"2002-12-12T18:44:00+00:00",
"2002-11-08T11:15:00+00:00",
"2002-11-07T17:42:00+00:00",
"2002-11-08T11:15:00+00:00",
"2003-01-09T20:10:00+00:00"
] |
|
CVE-2002-0044 | security flaw | None | null | null | GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files. | null | 2024-11-21T22:16:05+00:00 | [
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-18T18:12:00+00:00"
] |
|
CVE-2002-0802 | security flaw | None | null | null | The multibyte support in PostgreSQL 6.5.x with SQL_ASCII encoding consumes an extra character when processing a character that cannot be converted, which could remove an escape character from the query and make the application subject to SQL injection attacks. | null | 2024-11-21T22:25:14+00:00 | [
"Red Hat Database 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-20T17:42:00+00:00"
] |
|
CVE-2002-2215 | security flaw | Moderate | null | null | The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of "To" addresses, which triggers an error in the rfc822_write_address function. | null | 2024-11-22T00:18:43+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2006-05-23T20:09:00+00:00"
] |
|
CVE-2002-0382 | security flaw | Important | null | null | XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters. | null | 2024-11-21T22:22:48+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-06-04T19:09:00+00:00",
"2002-08-05T21:04:00+00:00"
] |
|
CVE-2002-0013 | security flaw | None | null | null | Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available. | null | 2024-11-21T22:13:51+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nFor Red Hat Linux 6.2 you will need to use the following commands to\nupdate your system using up2date:\n\nup2date -u\nup2date ucd-snmp ucd-snmp-utils\nup2date ucd-snmp-devel ucd-snmp-utils",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-02-12T22:34:00+00:00",
"2002-09-13T19:09:00+00:00",
"2002-06-06T06:53:00+00:00"
] |
|
CVE-2002-0855 | security flaw | Important | null | null | Cross-site scripting vulnerability in Mailman before 2.0.12 allows remote attackers to execute script as other users via a subscriber's list subscription options in the (1) adminpw or (2) info parameters to the ml-name feature. | null | 2024-11-21T22:27:06+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1",
"Red Hat Secure Web Server 3.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-27T13:58:00+00:00",
"2002-08-23T17:05:00+00:00",
"2002-08-23T17:08:00+00:00",
"2002-08-28T09:40:00+00:00"
] |
|
CVE-2002-0843 | security flaw | Important | null | null | Buffer overflows in the ApacheBench benchmark support program (ab.c) in Apache before 1.3.27, and Apache 2.x before 2.0.43, allow a malicious web server to cause a denial of service and possibly execute arbitrary code via a long response. | null | 2024-11-21T22:30:27+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1",
"Red Hat Stronghold 3",
"Red Hat Stronghold 4",
"Stronghold 4 for Red Hat Enterprise Linux"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. \n\nAfter the errata packages are installed, restart the Web service by running\nthe following command:\n\n/sbin/service httpd restart",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter the errata packages are installed, restart the Web service by running\nthe following command:\n\n/sbin/service httpd restart",
"We have backported the security fixes for the versions of OpenSSL\nand mm included in Stronghold 4. The fixed packages are now available via\nthe update agent service; run\n\n$ bin/agent\n\nfrom the Stronghold 4 install root to upgrade an existing Stronghold 4\ninstallation to the new package versions. After upgrading Stronghold, the\nserver must be completely restarted by running the following commands from\nthe install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nsee http://stronghold.redhat.com/support/upgrade-sh4",
"Backported fixes are available for the versions of Apache, mod_ssl, and PHP\nincluded in Stronghold 3. Stronghold 3 build code 3020 is now available\nwhich includes this fix, and can be downloaded from the following URL:\n\nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3, refer\nto the following URL:\n\nhttp://stronghold.redhat.com/support/upgrade-sh3.xml"
] | [
"2002-12-12T18:44:00+00:00",
"2002-11-07T17:42:00+00:00",
"2003-01-09T20:10:00+00:00",
"2002-11-08T11:15:00+00:00",
"2002-11-08T11:15:00+00:00"
] |
|
CVE-2002-0402 | security flaw | Moderate | null | null | Buffer overflow in X11 dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code while Ethereal is parsing keysyms. | null | 2024-11-21T22:18:14+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-06-06T06:53:00+00:00",
"2002-09-13T19:09:00+00:00",
"2002-09-13T14:23:00+00:00"
] |
|
CVE-2002-1356 | security flaw | Moderate | null | null | Ethereal 0.9.7 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed packets to the (1) LMP, (2) PPP, or (3) TDS dissectors, possibly related to a missing field for EndVerifyAck messages. | null | 2024-11-21T22:33:32+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-09T16:15:00+00:00",
"2003-01-29T15:32:00+00:00"
] |
|
CVE-2002-1090 | security flaw | Important | null | null | Buffer overflow in read_smtp_response of protocol.c in libesmtp before 0.8.11 allows a remote SMTP server to (1) execute arbitrary code via a certain response or (2) cause a denial of service via long server responses. | null | 2024-11-21T22:43:15+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-22T16:41:00+00:00",
"2003-04-03T20:21:00+00:00"
] |
|
CVE-2002-0834 | security flaw | Moderate | null | null | Buffer overflow in the ISIS dissector for Ethereal 0.9.5 and earlier allows remote attackers to cause a denial of service or execute arbitrary code via malformed packets. | null | 2024-11-21T22:18:38+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-29T14:41:00+00:00",
"2002-09-13T14:23:00+00:00",
"2002-09-13T19:09:00+00:00"
] |
|
CVE-2002-1376 | security flaw | Important | null | null | libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code. | null | 2024-11-21T22:33:23+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1",
"Red Hat Stronghold 3",
"Red Hat Stronghold 4"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"We have backported the security fixes for the versions of OpenSSL, Apache\nand PHP included in Stronghold 3. Stronghold 3.0 build code 3021 is now\navailable which includes these fixes, and can be downloaded from\nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3.0, see\nhttp://stronghold.redhat.com/support/upgrade-sh3.xml",
"Fixed Stronghold 4 packages are now available via the update agent service; run\n\n$ bin/agent\n\nfrom the Stronghold 4 install root to upgrade an existing Stronghold 4\ninstallation to the new package versions. After upgrading Stronghold, the\nserver must be completely restarted by running the following commands from\nthe install root:\n\n$ bin/stop-server\n$ bin/stop-tomcat\n$ bin/start-tomcat\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nsee http://stronghold.redhat.com/support/upgrade-sh4",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-15T19:23:00+00:00",
"2003-03-18T11:01:00+00:00",
"2003-03-03T09:16:00+00:00",
"2003-01-06T15:27:00+00:00"
] |
|
CVE-2002-0658 | security flaw | Moderate | null | null | OSSP mm library (libmm) before 1.2.0 allows the local Apache user to gain privileges via temporary files, possibly via a symbolic link attack. | null | 2024-11-21T22:25:32+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Secure Web Server 3.2",
"Red Hat Stronghold 3",
"Red Hat Stronghold 4"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"We have backported the security fixes for the versions of OpenSSL, mod_ssl\nand mm included in Stronghold 3. Stronghold 3.0 build code 3018 is now\navailable which includes these fixes, and can be downloaded from \nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3.0, see \nhttp://stronghold.redhat.com/support/upgrade-sh3.xml",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Some of these files are distributed in rhmask format and may only be used\nby individuals who have purchased Red Hat Linux 6.2 Professional.\n\nTo produce installable RPM files from the rhmask files, retrieve the rhmask\nfiles via ftp and type the following command:\n\nrhmask secureweb-3.2-12.i386.rpm secureweb-3.2.8-1.i386.rpm.rhmask\n\nThe original RPM is located only on your Secure Web Server CD, and cannot\nbe obtained via the Internet.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.",
"We have backported the security fixes for the versions of OpenSSL \nand mm included in Stronghold 4. The fixed packages are now available via\nthe update agent service; run\n\n$ bin/agent\n\nfrom the Stronghold 4 install root to upgrade an existing Stronghold 4\ninstallation to the new package versions.\n\nDue to a bug in the update agent, users of Solaris on Intel platforms\nshould create a file \"conf/update-agent.conf\" in the install root,\ncontaining the following two lines:\n\n[agent]\nignore: RPMPROB_FILTER_IGNOREARCH\n\nAfter the appropriate updates have been applied, it will be necessary to\nmanually restart the server with the following commands:\n\n $ bin/stop-server\n $ bin/start-server"
] | [
"2002-07-31T15:58:00+00:00",
"2002-07-31T08:51:00+00:00",
"2002-07-31T08:50:00+00:00",
"2002-07-25T00:00:00+00:00",
"2002-08-08T09:20:00+00:00"
] |
|
CVE-2002-0822 | security flaw | Moderate | null | null | Ethereal 0.9.4 and earlier allows remote attackers to cause a denial of service and possibly excecute arbitrary code via the (1) SOCKS, (2) RSVP, (3) AFS, or (4) LMP dissectors, which can be caused to core dump. | null | 2024-11-21T22:18:36+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-29T14:41:00+00:00",
"2002-09-13T19:09:00+00:00",
"2002-09-13T14:23:00+00:00"
] |
|
CVE-2002-0875 | security flaw | Low | null | null | Vulnerability in FAM 2.6.8, 2.6.6, and other versions allows unprivileged users to obtain the names of files whose access is restricted to the root group. | null | 2024-11-21T23:17:11+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] | [
"2005-01-05T15:41:00+00:00"
] |
|
CVE-2002-1337 | security flaw | Critical | null | null | Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. | null | 2024-11-21T22:40:23+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-03T17:04:00+00:00",
"2003-03-03T17:05:00+00:00"
] |
|
CVE-2002-0048 | security flaw | None | null | null | Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote attackers to cause a denial of service and execute arbitrary code in the rsync client or server. | null | 2024-11-21T22:16:28+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-25T21:29:00+00:00"
] |
|
CVE-2002-0009 | security flaw | None | null | null | show_bug.cgi in Bugzilla before 2.14.1 allows a user with "Bugs Access" privileges to see other products that are not accessible to the user, by submitting a bug and reading the resulting Product pulldown menu. | null | 2024-11-21T22:14:47+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nIf you are using Red Hat Linux 6.x, you need to install the perl-DBI and\nperl-Chart packages the current version of bugzilla depends on, as well,\nusing the command \"rpm -Uvh perl*rpm\".\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-15T08:51:00+00:00"
] |
|
CVE-2002-0662 | security flaw | None | null | null | scrollkeeper-get-cl in ScrollKeeper 0.3 to 0.3.11 allows local users to create and overwrite files via a symlink attack on the scrollkeeper-tempfile.x temporary files. | null | 2024-11-21T22:27:10+00:00 | [
"Red Hat Linux 7.3"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-09-02T16:42:00+00:00"
] |
|
CVE-2002-0399 | security flaw | Low | null | null | Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) "/.." or (2) "./.." string, which removes the leading slash but leaves the "..", a variant of CVE-2001-1267. | null | 2024-11-21T22:22:30+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-09-29T08:40:00+00:00",
"2002-10-02T18:44:00+00:00"
] |
|
CVE-2002-0008 | security flaw | None | null | null | Bugzilla before 2.14.1 allows remote attackers to (1) spoof a user comment via an HTTP request to process_bug.cgi using the "who" parameter, instead of the Bugzilla_login cookie, or (2) post a bug as another user by modifying the reporter parameter to enter_bug.cgi, which is passed to post_bug.cgi. | null | 2024-11-21T22:14:41+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nIf you are using Red Hat Linux 6.x, you need to install the perl-DBI and\nperl-Chart packages the current version of bugzilla depends on, as well,\nusing the command \"rpm -Uvh perl*rpm\".\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-15T08:51:00+00:00"
] |
|
CVE-2002-1160 | security flaw | Important | null | null | The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su. | null | 2024-11-21T22:35:53+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-05T16:07:00+00:00",
"2003-02-13T08:34:00+00:00"
] |
|
CVE-2002-0272 | security flaw | None | null | null | Buffer overflows in mpg321 before 0.2.9 allows local and possibly remote attackers to execute arbitrary code via a long URL to (1) a command line option, (2) an HTTP request, or (3) an FTP request. | null | 2024-11-21T22:21:16+00:00 | [
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-05-16T18:23:00+00:00"
] |
|
CVE-2002-1571 | security flaw | Moderate | null | null | The linux 2.4 kernel before 2.4.19 assumes that the fninit instruction clears all registers, which could lead to an information leak on processors that do not clear all relevant SSE registers. | null | 2024-11-21T22:24:25+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 "
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-07-16T15:57:00+00:00"
] |
|
CVE-2002-1336 | security flaw | Moderate | null | null | TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users. | null | 2024-11-21T22:32:59+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-02-21T08:40:00+00:00",
"2003-01-16T15:46:00+00:00"
] |
|
CVE-2002-0177 | security flaw | None | null | null | Buffer overflows in icecast 1.3.11 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request from an MP3 client. | null | 2024-11-21T22:20:38+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-25T22:08:00+00:00"
] |
|
CVE-2002-0989 | security flaw | Important | null | null | The URL handler in the manual browser option for Gaim before 0.59.1 allows remote attackers to execute arbitrary script via shell metacharacters in a link. | null | 2024-11-21T22:27:31+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only \nthose RPMs which are currently installed will be updated. Those RPMs\nwhich are not installed but included in the list will not be updated. \nNote that you can also use wildcards (*.rpm) if your current directory\n*only* contains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. \nMany people find this an easier way to apply updates. To use Red Hat \nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the \nappropriate RPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only \nthose RPMs which are currently installed will be updated. Those RPMs\nwhich are not installed but included in the list will not be updated.\nNote that you can also use wildcards (*.rpm) if your current directory \n*only* contains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. \nMany people find this an easier way to apply updates. To use Red Hat \nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the \nappropriate RPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-09-10T08:59:00+00:00",
"2002-09-10T09:00:00+00:00",
"2002-09-09T17:37:00+00:00"
] |
|
CVE-2002-1224 | security flaw | None | null | null | Directory traversal vulnerability in kpf for KDE 3.0.1 through KDE 3.0.3a allows remote attackers to read arbitrary files as the kpf user via a URL with a modified icon parameter. | null | 2024-11-21T22:29:50+00:00 | [
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-12-04T10:32:00+00:00"
] |
|
CVE-2002-0435 | security flaw | Low | null | null | Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a ".." directory that is higher than expected, possibly up to the root file system. | null | 2024-11-21T22:36:29+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-02-13T08:35:00+00:00",
"2003-02-20T18:37:00+00:00"
] |
|
CVE-2002-0659 | security flaw | Important | null | null | The ASN1 library in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allows remote attackers to cause a denial of service via invalid encodings. | null | 2024-11-21T22:26:08+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux Advanced Workstation 2.1",
"Red Hat Stronghold 3",
"Red Hat Stronghold 4"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Because both client and server applications are affected by these\nvulnerabilities, we advise users to reboot their systems after installing\nthese updates.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"We have backported the security fixes for the versions of OpenSSL, mod_ssl\nand mm included in Stronghold 3. Stronghold 3.0 build code 3018 is now\navailable which includes these fixes, and can be downloaded from \nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3.0, see \nhttp://stronghold.redhat.com/support/upgrade-sh3.xml",
"We have backported the security fixes for the versions of OpenSSL \nand mm included in Stronghold 4. The fixed packages are now available via\nthe update agent service; run\n\n$ bin/agent\n\nfrom the Stronghold 4 install root to upgrade an existing Stronghold 4\ninstallation to the new package versions.\n\nDue to a bug in the update agent, users of Solaris on Intel platforms\nshould create a file \"conf/update-agent.conf\" in the install root,\ncontaining the following two lines:\n\n[agent]\nignore: RPMPROB_FILTER_IGNOREARCH\n\nAfter the appropriate updates have been applied, it will be necessary to\nmanually restart the server with the following commands:\n\n $ bin/stop-server\n $ bin/start-server",
"Because both client and server applications are affected by these\nvulnerabilities, we advise users to reboot their systems after installing\nthese updates.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is only available via Red Hat Network. To \nuse Red Hat Network, launch the Red Hat Update Agent with the following \ncommand:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-06T07:34:00+00:00",
"2002-07-31T15:58:00+00:00",
"2002-08-08T09:20:00+00:00",
"2002-08-05T18:59:00+00:00"
] |
|
CVE-2002-0835 | security flaw | Important | null | null | Preboot eXecution Environment (PXE) server allows remote attackers to cause a denial of service (crash) via certain DHCP packets from Voice-Over-IP (VOIP) phones. | null | 2024-11-21T22:26:16+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-30T13:16:00+00:00",
"2002-08-30T14:35:00+00:00"
] |
|
CVE-2002-1377 | security flaw | Important | null | null | vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt. | null | 2024-11-21T22:34:42+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata \nrelevant to your system have been applied. \n \nTo update all RPMs for your particular architecture, run: \n \nrpm -Fvh [filenames] \n \nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those \nRPMs which are currently installed will be updated. Those RPMs which are \nnot installed but included in the list will not be updated. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs. \n \nPlease note that this update is also available via Red Hat Network. Many \npeople find this an easier way to apply updates. To use Red Hat Network, \nlaunch the Red Hat Update Agent with the following command: \n \nup2date \n \nThis will start an interactive process that will result in the \nappropriate RPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata \nrelevant to your system have been applied. \n \nThis update is available via Red Hat Network. To use Red Hat Network, \nlaunch the Red Hat Update Agent with the following command: \n \nup2date \n \nThis will start an interactive process that will result in the \nappropriate RPMs being upgraded on your system."
] | [
"2003-01-16T14:32:00+00:00",
"2003-01-29T15:33:00+00:00"
] |
|
CVE-2002-0970 | security flaw | Important | null | null | The SSL capability for Konqueror in KDE 3.0.2 and earlier does not verify the Basic Constraints for an intermediate CA-signed certificate, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack. | null | 2024-11-21T22:29:38+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-12-04T10:32:00+00:00",
"2002-12-04T10:26:00+00:00"
] |
|
CVE-2002-1398 | security flaw | Important | null | null | Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability "in handling long datetime input." | null | 2024-11-21T22:35:09+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"This update corrects all of the above-mentioned buffer overruns.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL 7.1.3 packages.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL packages.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-22T18:36:00+00:00",
"2003-01-14T22:40:00+00:00",
"2003-01-14T22:22:00+00:00"
] |
|
CVE-2002-1232 | security flaw | Important | null | null | Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist. | null | 2024-11-21T22:30:35+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-25T12:24:00+00:00",
"2002-10-24T12:13:00+00:00"
] |
|
CVE-2002-1320 | security flaw | Moderate | null | null | Pine 4.44 and earlier allows remote attackers to cause a denial of service (core dump and failed restart) via an email message with a From header that contains a large number of quotation marks ("). | null | 2024-11-21T22:32:22+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-01-03T19:15:00+00:00",
"2003-01-03T19:33:00+00:00"
] |
|
CVE-2002-1091 | security flaw | Important | null | null | Netscape 6.2.3 and earlier, and Mozilla 1.0.1, allow remote attackers to corrupt heap memory and execute arbitrary code via a GIF image with a zero width. | null | 2024-11-21T22:27:44+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-02-12T14:42:00+00:00",
"2002-10-18T09:15:00+00:00"
] |
|
CVE-2002-0403 | security flaw | Moderate | null | null | DNS dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet that causes Ethereal to enter an infinite loop. | null | 2024-11-21T22:18:22+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-09-13T19:09:00+00:00",
"2002-06-06T06:53:00+00:00",
"2002-09-13T14:23:00+00:00"
] |
|
CVE-2002-0638 | security flaw | Moderate | null | null | setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and earlier, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race condition that uses an open file descriptor in utility programs such as chfn and chsh. | null | 2024-11-21T22:24:36+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-07-29T15:00:00+00:00",
"2002-07-29T15:51:00+00:00"
] |
|
CVE-2002-0004 | security flaw | None | null | null | Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice. | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. | 2024-11-21T22:16:20+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-23T01:51:00+00:00"
] |
|
CVE-2002-0012 | security flaw | None | null | null | Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available. | null | 2024-11-21T22:13:42+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nFor Red Hat Linux 6.2 you will need to use the following commands to\nupdate your system using up2date:\n\nup2date -u\nup2date ucd-snmp ucd-snmp-utils\nup2date ucd-snmp-devel ucd-snmp-utils",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-02-12T22:34:00+00:00",
"2002-09-13T19:09:00+00:00",
"2002-06-06T06:53:00+00:00"
] |
|
CVE-2002-2185 | security flaw | Moderate | null | null | The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network. | null | 2024-11-22T00:05:35+00:00 | [
"3AS:kernel-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3AS:kernel-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3AS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3AS:kernel-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-0:2.4.21-37.0.1.EL.src",
"3AS:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.src",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3ES:kernel-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3ES:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3ES:kernel-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-0:2.4.21-37.0.1.EL.src",
"3ES:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3WS:kernel-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3WS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3WS:kernel-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-0:2.4.21-37.0.1.EL.src",
"3WS:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2006-01-19T16:03:00+00:00",
"2006-01-17T08:36:00+00:00",
"2006-02-01T17:57:00+00:00",
"2006-02-01T17:48:00+00:00"
] |