cve
stringlengths 13
16
| affected_component
stringlengths 0
177
| summary
stringlengths 0
227
| severity
stringclasses 5
values | cvss_v2
stringclasses 234
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 30
4k
| statement
stringlengths 31
2.49k
⌀ | release_date
stringlengths 25
25
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
351
| known_not_affected_products
sequencelengths 0
29.8k
| under_investigation_products
sequencelengths 0
77
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
214
| remediation_details
sequencelengths 0
214
| remediation_dates
sequencelengths 0
214
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2001-1407 | security flaw | None | null | null | Bugzilla before 2.14 allows Bugzilla users to bypass group security checks by marking a bug as the duplicate of a restricted bug, which adds the user to the CC list of the restricted bug and allows the user to view the bug. | null | 2024-11-21T22:10:27+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-0884 | security flaw | None | null | null | Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users. | null | 2024-11-21T22:14:07+00:00 | [
"Red Hat Linux 7.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1",
"Red Hat Secure Web Server 3.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe] desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-12-21T14:06:00+00:00",
"2001-12-21T14:10:00+00:00",
"2002-01-02T15:23:00+00:00"
] |
|
CVE-2001-0191 | security flaw | None | null | null | gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length. | null | 2024-11-21T22:00:33+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-02T00:00:00+00:00",
"2001-02-02T00:00:00+00:00"
] |
|
CVE-2001-0596 | security flaw | None | null | null | Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript. | null | 2024-11-21T22:03:25+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-04-09T00:00:00+00:00"
] |
|
CVE-2001-1387 | security flaw | None | null | null | iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak. | null | 2024-11-21T22:12:13+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-07T14:10:00+00:00"
] |
|
CVE-2001-0851 | security flaw | Important | null | null | Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie. | null | 2024-11-21T22:12:09+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2001-11-02T20:08:00+00:00"
] |
|
CVE-2001-0406 | security flaw | None | null | null | Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient. | null | 2024-11-21T22:03:04+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAgain, note that the packages for Red Hat Linux 6.2 requre an updated\nlogrotate package."
] | [
"2001-05-15T02:21:00+00:00"
] |
|
CVE-2001-1352 | security flaw | None | null | null | Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter. | null | 2024-11-21T22:14:31+00:00 | [
"Red Hat Linux 7.0j"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-07-09T12:40:00+00:00"
] |
|
CVE-2001-0328 | kernel | TCP connection ISN hijacks | Low | 2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N | null | TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. | This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. | 2024-12-06T07:10:10+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:kernel",
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_mrg_2:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2001-1353 | security flaw | None | null | null | ghostscript before 6.51 allows local users to read and write arbitrary files as the 'lp' user via the file operator, even with -dSAFER enabled. | null | 2024-11-21T22:11:45+00:00 | [
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nAfter updating the rpms, you will need to restart your print server, by\nrunning:\n\n/sbin/service lpd restart\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-31T22:59:00+00:00"
] |
|
CVE-2001-1083 | security flaw | None | null | null | Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash). | null | 2024-11-21T22:20:30+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-25T22:08:00+00:00"
] |
|
CVE-2001-0554 | security flaw | Critical | null | null | Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. | null | 2024-11-21T22:08:58+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-08-09T22:14:00+00:00"
] |
|
CVE-2001-0128 | security flaw | None | null | null | Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. | null | 2024-11-21T21:57:36+00:00 | [
"Red Hat Powertools 6.1",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM.\n\nAfter you have applied the update, restart Zope."
] | [
"2000-12-18T00:00:00+00:00"
] |
|
CVE-2001-0169 | security flaw | None | null | null | When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib. | null | 2024-11-21T21:59:00+00:00 | [
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2001-01-15T00:00:00+00:00"
] |
|
CVE-2001-1406 | security flaw | None | null | null | process_bug.cgi in Bugzilla before 2.14 does not set the "groupset" bit when a bug is moved between product groups, which will cause the bug to have the old group's restrictions, which might not be as stringent. | null | 2024-11-21T22:10:18+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-1390 | security flaw | None | null | null | Unknown vulnerability in binfmt_misc in the Linux kernel before 2.2.19, related to user pages. | null | 2024-11-21T22:03:29+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-0775 | security flaw | Important | null | null | Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field. | null | 2024-11-21T22:07:35+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-09T23:39:00+00:00"
] |
|
CVE-2001-1349 | security flaw | None | null | null | Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers. | null | 2024-11-21T22:09:47+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-13T20:25:00+00:00"
] |
|
CVE-2001-0108 | security flaw | None | null | null | PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested. | null | 2024-11-21T21:58:36+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Because of dependencies, the packages must be installed as a group. No\nupdate for the mod_php package is provided for Red Hat Linux 7; it has been\nmerged into the updated php package.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Fvh php*\n\nThen restart your web server:\n\n/etc/rc.d/init.d/httpd restart"
] | [
"2000-12-20T00:00:00+00:00"
] |
|
CVE-2001-0763 | security flaw | None | null | null | Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function. | null | 2024-11-21T22:06:47+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-07T23:14:00+00:00"
] |
|
CVE-2001-1332 | security flaw | None | null | null | Buffer overflows in Linux CUPS before 1.1.6 may allow remote attackers to execute arbitrary code. | null | 2024-11-21T22:17:38+00:00 | [
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Uvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-03-15T12:36:00+00:00"
] |
|
CVE-2001-0489 | security flaw | None | null | null | Format string vulnerability in gftp prior to 2.0.8 allows remote malicious FTP servers to execute arbitrary commands. | null | 2024-11-21T22:04:53+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-04-25T23:27:00+00:00"
] |
|
CVE-2001-0036 | security flaw | None | null | null | KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file. | null | 2024-11-21T22:02:09+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-08T00:00:00+00:00"
] |
|
CVE-2001-0889 | security flaw | None | null | null | Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters. | null | 2024-11-21T22:14:23+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-08T11:44:00+00:00"
] |
|
CVE-2001-0309 | security flaw | None | null | null | inetd in Red Hat 6.2 does not properly close sockets for internal services such as chargen, daytime, echo, etc., which allows remote attackers to cause a denial of service via a series of connections to the internal services. | null | 2024-11-21T21:59:46+00:00 | [
"Red Hat Linux 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-01-29T00:00:00+00:00"
] |
|
CVE-2001-1378 | security flaw | None | null | null | fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files. | null | 2024-11-21T22:09:30+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T15:46:00+00:00"
] |
|
CVE-2001-0569 | security flaw | None | null | null | Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet. | null | 2024-11-21T22:01:41+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"*NOTE* This advisory supercedes all other Zope and Zope-Hotfix advisories \nfrom Red Hat, Inc.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-24T00:00:00+00:00"
] |
|
CVE-2001-1397 | security flaw | None | null | null | The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory. | null | 2024-11-21T22:04:17+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1401 | security flaw | None | null | null | Bugzilla before 2.14 does not properly restrict access to confidential bugs, which could allow Bugzilla users to bypass viewing permissions via modified bug id parameters in (1) process_bug.cgi, (2) show_activity.cgi, (3) showvotes.cgi, (4) showdependencytree.cgi, (5) showdependencygraph.cgi, (6) showattachment.cgi, or (7) describecomponents.cgi. | null | 2024-11-21T22:09:52+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-0197 | security flaw | None | null | null | Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands. | null | 2024-11-21T21:59:24+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2001-01-23T00:00:00+00:00"
] |
|
CVE-2001-0894 | security flaw | None | null | null | Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large. | null | 2024-11-21T22:13:02+00:00 | [
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-27T23:32:00+00:00"
] |
|
CVE-2001-0441 | security flaw | None | null | null | Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header. | null | 2024-11-21T22:02:31+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-09T00:00:00+00:00"
] |
|
CVE-2001-0011 | security flaw | None | null | null | Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges. | null | 2024-11-21T22:00:00+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-01-29T00:00:00+00:00"
] |
|
CVE-2001-0787 | security flaw | Important | null | null | LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges. | null | 2024-11-21T22:07:03+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-12T20:23:00+00:00"
] |
|
CVE-2001-0416 | security flaw | None | null | null | sgml-tools (aka sgmltools) before 1.0.9-15 creates temporary files with insecure permissions, which allows other users to read files that are being processed by sgml-tools. | null | 2024-11-21T22:02:19+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-09T00:00:00+00:00"
] |
|
CVE-2001-0816 | security flaw | None | null | null | OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands. | null | 2024-11-21T22:12:52+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-30T17:09:00+00:00"
] |
|
CVE-2001-1246 | security flaw | Important | null | null | PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters. | null | 2024-11-21T22:23:08+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Please note that the /etc/php.ini configuration file is not replaced or\noverwritten. You should carefully review your configuration file and adapt\nit to your server or service functions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Please Note:\n\nThe /etc/php.ini configuration file is not replaced or\noverwritten. You should carefully review your configuration file and adapt\nit to your server or service functions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-20T15:16:00+00:00",
"2002-06-26T00:00:00+00:00"
] |
|
CVE-2001-1374 | security flaw | None | null | null | expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd. | null | 2024-11-21T22:25:00+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-12T19:38:00+00:00"
] |
|
CVE-2001-1323 | security flaw | Critical | null | null | Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function. | null | 2024-11-21T22:05:23+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-17T01:32:00+00:00"
] |
|
CVE-2001-0066 | security flaw | None | null | null | Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer. | null | 2024-11-21T21:58:12+00:00 | [
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-19T00:00:00+00:00"
] |
|
CVE-2001-1227 | security flaw | Moderate | null | null | Zope before 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags. | null | 2024-11-21T22:06:13+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter you have updated the packages, you must restart zope:\n\n /etc/rc.d/init.d/zope restart"
] | [
"2001-09-18T08:22:00+00:00",
"2001-10-10T22:16:00+00:00"
] |
|
CVE-2001-1030 | security flaw | None | null | null | Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. | null | 2024-11-21T22:08:39+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-19T20:30:00+00:00"
] |
|
CVE-2001-1175 | security flaw | Moderate | null | null | vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing. | null | 2024-11-21T22:08:29+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAlso note that users of vipw may want to run (as root):\n\nchmod 0400 /etc/shadow\n\nto ensure that the file has the correct permissions."
] | [
"2001-10-16T19:15:00+00:00",
"2001-07-16T16:51:00+00:00"
] |
|
CVE-2001-1572 | security flaw | Moderate | null | null | The MAC module in Netfilter in Linux kernel 2.4.1 through 2.4.11, when configured to filter based on MAC addresses, allows remote attackers to bypass packet filters via small packets. | null | 2024-11-21T22:46:25+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2003-06-19T13:55:00+00:00"
] |
|
CVE-2001-1162 | security flaw | None | null | null | Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file. | null | 2024-11-21T22:07:27+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-26T19:00:00+00:00"
] |
|
CVE-2001-0289 | security flaw | None | null | null | Joe text editor 2.8 searches the current working directory (CWD) for the .joerc configuration file, which could allow local users to gain privileges of other users by placing a Trojan Horse .joerc file into a directory, then waiting for users to execute joe from that directory. | null | 2024-11-21T22:02:07+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-28T00:00:00+00:00"
] |
|
CVE-2001-1174 | security flaw | None | null | null | Buffer overflow in Elm 2.5.5 and earlier allows remote attackers to execute arbitrary code via a long Message-ID header. | null | 2024-11-21T22:07:57+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-16T22:07:00+00:00"
] |
|
CVE-2001-0572 | security flaw | None | null | null | The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands. | null | 2024-11-21T22:02:45+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-23T00:00:00+00:00"
] |
|
CVE-2001-1322 | security flaw | None | null | null | xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask. | null | 2024-11-21T22:06:47+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-07T23:14:00+00:00"
] |
|
CVE-2001-1267 | security flaw | Low | null | null | Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot). | null | 2024-11-21T22:22:20+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-09-29T08:40:00+00:00",
"2002-10-02T18:44:00+00:00"
] |
|
CVE-2001-1375 | security flaw | None | null | null | tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory. | null | 2024-11-21T22:25:08+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-12T19:38:00+00:00"
] |
|
CVE-2001-1230 | security flaw | None | null | null | Buffer overflows in Icecast before 1.3.10 allow remote attackers to cause a denial of service (crash) and execute arbitrary code. | null | 2024-11-21T22:20:35+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-25T22:08:00+00:00"
] |
|
CVE-2001-0071 | security flaw | None | null | null | gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection. | null | 2024-11-21T21:58:14+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-19T00:00:00+00:00"
] |
|
CVE-2001-1494 | security flaw | Low | null | null | script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command. | null | 2024-11-21T23:59:27+00:00 | [
"3AS:losetup-0:2.11y-31.11.i386",
"3AS:losetup-0:2.11y-31.11.ia64",
"3AS:losetup-0:2.11y-31.11.ppc",
"3AS:losetup-0:2.11y-31.11.s390",
"3AS:losetup-0:2.11y-31.11.s390x",
"3AS:losetup-0:2.11y-31.11.x86_64",
"3AS:mount-0:2.11y-31.11.i386",
"3AS:mount-0:2.11y-31.11.ia64",
"3AS:mount-0:2.11y-31.11.ppc",
"3AS:mount-0:2.11y-31.11.s390",
"3AS:mount-0:2.11y-31.11.s390x",
"3AS:mount-0:2.11y-31.11.x86_64",
"3AS:util-linux-0:2.11y-31.11.i386",
"3AS:util-linux-0:2.11y-31.11.ia64",
"3AS:util-linux-0:2.11y-31.11.ppc",
"3AS:util-linux-0:2.11y-31.11.s390",
"3AS:util-linux-0:2.11y-31.11.s390x",
"3AS:util-linux-0:2.11y-31.11.src",
"3AS:util-linux-0:2.11y-31.11.x86_64",
"3AS:util-linux-debuginfo-0:2.11y-31.11.i386",
"3AS:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3AS:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3AS:util-linux-debuginfo-0:2.11y-31.11.s390",
"3AS:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3AS:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3Desktop:losetup-0:2.11y-31.11.i386",
"3Desktop:losetup-0:2.11y-31.11.ia64",
"3Desktop:losetup-0:2.11y-31.11.ppc",
"3Desktop:losetup-0:2.11y-31.11.s390",
"3Desktop:losetup-0:2.11y-31.11.s390x",
"3Desktop:losetup-0:2.11y-31.11.x86_64",
"3Desktop:mount-0:2.11y-31.11.i386",
"3Desktop:mount-0:2.11y-31.11.ia64",
"3Desktop:mount-0:2.11y-31.11.ppc",
"3Desktop:mount-0:2.11y-31.11.s390",
"3Desktop:mount-0:2.11y-31.11.s390x",
"3Desktop:mount-0:2.11y-31.11.x86_64",
"3Desktop:util-linux-0:2.11y-31.11.i386",
"3Desktop:util-linux-0:2.11y-31.11.ia64",
"3Desktop:util-linux-0:2.11y-31.11.ppc",
"3Desktop:util-linux-0:2.11y-31.11.s390",
"3Desktop:util-linux-0:2.11y-31.11.s390x",
"3Desktop:util-linux-0:2.11y-31.11.src",
"3Desktop:util-linux-0:2.11y-31.11.x86_64",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.i386",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3ES:losetup-0:2.11y-31.11.i386",
"3ES:losetup-0:2.11y-31.11.ia64",
"3ES:losetup-0:2.11y-31.11.ppc",
"3ES:losetup-0:2.11y-31.11.s390",
"3ES:losetup-0:2.11y-31.11.s390x",
"3ES:losetup-0:2.11y-31.11.x86_64",
"3ES:mount-0:2.11y-31.11.i386",
"3ES:mount-0:2.11y-31.11.ia64",
"3ES:mount-0:2.11y-31.11.ppc",
"3ES:mount-0:2.11y-31.11.s390",
"3ES:mount-0:2.11y-31.11.s390x",
"3ES:mount-0:2.11y-31.11.x86_64",
"3ES:util-linux-0:2.11y-31.11.i386",
"3ES:util-linux-0:2.11y-31.11.ia64",
"3ES:util-linux-0:2.11y-31.11.ppc",
"3ES:util-linux-0:2.11y-31.11.s390",
"3ES:util-linux-0:2.11y-31.11.s390x",
"3ES:util-linux-0:2.11y-31.11.src",
"3ES:util-linux-0:2.11y-31.11.x86_64",
"3ES:util-linux-debuginfo-0:2.11y-31.11.i386",
"3ES:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3ES:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3ES:util-linux-debuginfo-0:2.11y-31.11.s390",
"3ES:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3ES:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3WS:losetup-0:2.11y-31.11.i386",
"3WS:losetup-0:2.11y-31.11.ia64",
"3WS:losetup-0:2.11y-31.11.ppc",
"3WS:losetup-0:2.11y-31.11.s390",
"3WS:losetup-0:2.11y-31.11.s390x",
"3WS:losetup-0:2.11y-31.11.x86_64",
"3WS:mount-0:2.11y-31.11.i386",
"3WS:mount-0:2.11y-31.11.ia64",
"3WS:mount-0:2.11y-31.11.ppc",
"3WS:mount-0:2.11y-31.11.s390",
"3WS:mount-0:2.11y-31.11.s390x",
"3WS:mount-0:2.11y-31.11.x86_64",
"3WS:util-linux-0:2.11y-31.11.i386",
"3WS:util-linux-0:2.11y-31.11.ia64",
"3WS:util-linux-0:2.11y-31.11.ppc",
"3WS:util-linux-0:2.11y-31.11.s390",
"3WS:util-linux-0:2.11y-31.11.s390x",
"3WS:util-linux-0:2.11y-31.11.src",
"3WS:util-linux-0:2.11y-31.11.x86_64",
"3WS:util-linux-debuginfo-0:2.11y-31.11.i386",
"3WS:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3WS:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3WS:util-linux-debuginfo-0:2.11y-31.11.s390",
"3WS:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3WS:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"4AS:util-linux-0:2.12a-16.EL4.12.i386",
"4AS:util-linux-0:2.12a-16.EL4.12.ia64",
"4AS:util-linux-0:2.12a-16.EL4.12.ppc",
"4AS:util-linux-0:2.12a-16.EL4.12.s390",
"4AS:util-linux-0:2.12a-16.EL4.12.s390x",
"4AS:util-linux-0:2.12a-16.EL4.12.src",
"4AS:util-linux-0:2.12a-16.EL4.12.x86_64",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4Desktop:util-linux-0:2.12a-16.EL4.12.i386",
"4Desktop:util-linux-0:2.12a-16.EL4.12.ia64",
"4Desktop:util-linux-0:2.12a-16.EL4.12.ppc",
"4Desktop:util-linux-0:2.12a-16.EL4.12.s390",
"4Desktop:util-linux-0:2.12a-16.EL4.12.s390x",
"4Desktop:util-linux-0:2.12a-16.EL4.12.src",
"4Desktop:util-linux-0:2.12a-16.EL4.12.x86_64",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4ES:util-linux-0:2.12a-16.EL4.12.i386",
"4ES:util-linux-0:2.12a-16.EL4.12.ia64",
"4ES:util-linux-0:2.12a-16.EL4.12.ppc",
"4ES:util-linux-0:2.12a-16.EL4.12.s390",
"4ES:util-linux-0:2.12a-16.EL4.12.s390x",
"4ES:util-linux-0:2.12a-16.EL4.12.src",
"4ES:util-linux-0:2.12a-16.EL4.12.x86_64",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4WS:util-linux-0:2.12a-16.EL4.12.i386",
"4WS:util-linux-0:2.12a-16.EL4.12.ia64",
"4WS:util-linux-0:2.12a-16.EL4.12.ppc",
"4WS:util-linux-0:2.12a-16.EL4.12.s390",
"4WS:util-linux-0:2.12a-16.EL4.12.s390x",
"4WS:util-linux-0:2.12a-16.EL4.12.src",
"4WS:util-linux-0:2.12a-16.EL4.12.x86_64",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2005-10-11T15:49:00+00:00"
] |
|
CVE-2001-0905 | security flaw | None | null | null | Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running. | null | 2024-11-21T22:08:11+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-19T04:48:00+00:00"
] |
|
CVE-2001-1247 | security flaw | None | null | null | PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files. | null | 2024-11-21T22:17:56+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter applying these updates you will need to restart your web server if it\nwas running before the update was applied."
] | [
"2002-02-28T17:54:00+00:00"
] |
|
CVE-2001-0381 | security flaw | None | null | null | The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key. | null | 2024-11-21T22:05:38+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-17T01:32:00+00:00"
] |
|
CVE-2001-0440 | security flaw | None | null | null | Buffer overflow in logging functions of licq before 1.0.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands. | null | 2024-11-21T22:01:55+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-28T00:00:00+00:00"
] |
|
CVE-2001-0010 | security flaw | None | null | null | Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges. | null | 2024-11-21T21:59:52+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-01-29T00:00:00+00:00"
] |
|
CVE-2001-1380 | security flaw | None | null | null | OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses. | null | 2024-11-21T22:10:55+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-16T16:25:00+00:00"
] |
|
CVE-2001-1400 | security flaw | None | null | null | Unknown vulnerabilities in the UDP port allocation for Linux kernel before 2.2.19 could allow local users to cause a denial of service (deadlock). | null | 2024-11-21T22:04:31+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-0641 | security flaw | None | null | null | Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option. | null | 2024-11-21T22:06:03+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nIn particular, if you are running Red Hat Linux 5.x or 6.x, you need to\ninstall the mktemp errata (RHSA-2001:070) before applying this update.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-21T18:38:00+00:00"
] |
|
CVE-2001-1379 | security flaw | None | null | null | The PostgreSQL authentication modules (1) mod_auth_pgsql 0.9.5, and (2) mod_auth_pgsql_sys 0.9.4, allow remote attackers to bypass authentication and execute arbitrary SQL via a SQL injection attack on the user name. | null | 2024-11-21T22:11:09+00:00 | [
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-24T14:39:00+00:00"
] |
|
CVE-2001-0568 | security flaw | None | null | null | Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes. | null | 2024-11-21T22:01:33+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"*NOTE* This advisory supercedes all other Zope and Zope-Hotfix advisories \nfrom Red Hat, Inc.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-24T00:00:00+00:00"
] |
|
CVE-2001-1396 | security flaw | None | null | null | Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact. | null | 2024-11-21T22:04:05+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2000-1254 | openssl | Mishandling C bitwise-shift operations making easier to bypass protection mechanisms | Moderate | 4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N | null | crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms. | null | 2024-12-06T07:08:52+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:openssl",
"red_hat_enterprise_linux_5:openssl097a",
"red_hat_enterprise_linux_6:openssl",
"red_hat_enterprise_linux_6:openssl098e",
"red_hat_enterprise_linux_7:openssl",
"red_hat_enterprise_linux_7:openssl098e",
"red_hat_jboss_enterprise_application_platform_6:openssl",
"red_hat_jboss_enterprise_web_server_1:openssl",
"red_hat_jboss_enterprise_web_server_2:openssl",
"red_hat_jboss_enterprise_web_server_3:openssl"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2000-1137 | security flaw | None | null | null | GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack. | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. | 2024-11-21T21:57:02+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-06T00:00:00+00:00"
] |
|
CVE-2000-1212 | security flaw | None | null | null | Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects. | null | 2024-11-21T21:58:35+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM.\n\nPlease make sure that you have updated you Zope packages to version 2.2.4\nprior to applying this Hotfix. After you have installed this Hotfix,\nrestart Zope."
] | [
"2000-12-20T00:00:00+00:00"
] |
|
CVE-2000-1211 | security flaw | None | null | null | Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities. | null | 2024-11-21T21:57:16+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-13T00:00:00+00:00"
] |
|
CVE-2000-1134 | security flaw | None | null | null | Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. | This issue was fixed in the following products:
- Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30) | 2024-11-21T21:56:16+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.0j"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-11-30T00:00:00+00:00"
] |
|
CVE-2000-0715 | security flaw | None | null | null | DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file. | null | 2024-11-21T21:56:40+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-01T00:00:00+00:00"
] |
|
CVE-2000-1191 | security flaw | Low | null | null | htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path. | null | 2024-11-22T00:43:18+00:00 | [
"3AS:htdig-2:3.1.6-7.el3.i386",
"3AS:htdig-2:3.1.6-7.el3.ia64",
"3AS:htdig-2:3.1.6-7.el3.ppc",
"3AS:htdig-2:3.1.6-7.el3.s390",
"3AS:htdig-2:3.1.6-7.el3.s390x",
"3AS:htdig-2:3.1.6-7.el3.src",
"3AS:htdig-2:3.1.6-7.el3.x86_64",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.x86_64",
"3Desktop:htdig-2:3.1.6-7.el3.i386",
"3Desktop:htdig-2:3.1.6-7.el3.ia64",
"3Desktop:htdig-2:3.1.6-7.el3.ppc",
"3Desktop:htdig-2:3.1.6-7.el3.s390",
"3Desktop:htdig-2:3.1.6-7.el3.s390x",
"3Desktop:htdig-2:3.1.6-7.el3.src",
"3Desktop:htdig-2:3.1.6-7.el3.x86_64",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.x86_64",
"3ES:htdig-2:3.1.6-7.el3.i386",
"3ES:htdig-2:3.1.6-7.el3.ia64",
"3ES:htdig-2:3.1.6-7.el3.ppc",
"3ES:htdig-2:3.1.6-7.el3.s390",
"3ES:htdig-2:3.1.6-7.el3.s390x",
"3ES:htdig-2:3.1.6-7.el3.src",
"3ES:htdig-2:3.1.6-7.el3.x86_64",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.x86_64",
"3WS:htdig-2:3.1.6-7.el3.i386",
"3WS:htdig-2:3.1.6-7.el3.ia64",
"3WS:htdig-2:3.1.6-7.el3.ppc",
"3WS:htdig-2:3.1.6-7.el3.s390",
"3WS:htdig-2:3.1.6-7.el3.s390x",
"3WS:htdig-2:3.1.6-7.el3.src",
"3WS:htdig-2:3.1.6-7.el3.x86_64",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2007-06-11T00:00:00+00:00"
] |
|
CVE-1999-0710 | security flaw | Low | null | null | The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems. | null | 2024-11-21T23:43:50+00:00 | [
"3AS:squid-7:2.5.STABLE3-6.3E.13.i386",
"3AS:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3AS:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3AS:squid-7:2.5.STABLE3-6.3E.13.s390",
"3AS:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3AS:squid-7:2.5.STABLE3-6.3E.13.src",
"3AS:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.i386",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.src",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"3ES:squid-7:2.5.STABLE3-6.3E.13.i386",
"3ES:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3ES:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3ES:squid-7:2.5.STABLE3-6.3E.13.s390",
"3ES:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3ES:squid-7:2.5.STABLE3-6.3E.13.src",
"3ES:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"3WS:squid-7:2.5.STABLE3-6.3E.13.i386",
"3WS:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3WS:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3WS:squid-7:2.5.STABLE3-6.3E.13.s390",
"3WS:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3WS:squid-7:2.5.STABLE3-6.3E.13.src",
"3WS:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"4AS:squid-7:2.5.STABLE6-3.4E.9.i386",
"4AS:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4AS:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4AS:squid-7:2.5.STABLE6-3.4E.9.s390",
"4AS:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4AS:squid-7:2.5.STABLE6-3.4E.9.src",
"4AS:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.i386",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.src",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"4ES:squid-7:2.5.STABLE6-3.4E.9.i386",
"4ES:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4ES:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4ES:squid-7:2.5.STABLE6-3.4E.9.s390",
"4ES:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4ES:squid-7:2.5.STABLE6-3.4E.9.src",
"4ES:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"4WS:squid-7:2.5.STABLE6-3.4E.9.i386",
"4WS:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4WS:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4WS:squid-7:2.5.STABLE6-3.4E.9.s390",
"4WS:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4WS:squid-7:2.5.STABLE6-3.4E.9.src",
"4WS:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] | [
"2005-06-14T19:40:00+00:00",
"2005-06-13T12:08:00+00:00"
] |
|
CVE-1999-0199 | glibc | manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root | None | null | 0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N | manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999. | Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue.
This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage. | 2024-12-06T04:07:05+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:glibc",
"red_hat_enterprise_linux_6:glibc",
"red_hat_enterprise_linux_7:glibc",
"red_hat_enterprise_linux_8:glibc"
] | [] | [] | [] | [] | [] | [] | [] |
CVE-1999-0428 | openssl | allow remote attackers to reuse SSL sessions and bypass access controls | Moderate | null | 6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls. | OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. | 2024-12-06T03:15:27+00:00 | [] | [] | [
"red_hat_advanced_cluster_management_for_kubernetes_2:openssl",
"red_hat_enterprise_linux_5:openssl",
"red_hat_enterprise_linux_5:openssl097a",
"red_hat_enterprise_linux_6:openssl",
"red_hat_enterprise_linux_6:openssl098e",
"red_hat_enterprise_linux_7:openssl",
"red_hat_enterprise_linux_7:openssl098e",
"red_hat_enterprise_linux_7:ovmf",
"red_hat_enterprise_linux_8:compat-openssl10",
"red_hat_enterprise_linux_8:mingw-openssl",
"red_hat_enterprise_linux_8:openssl",
"red_hat_jboss_core_services:jbcs-httpd24-openssl",
"red_hat_jboss_core_services:openssl",
"red_hat_jboss_enterprise_application_platform_5:openssl",
"red_hat_jboss_enterprise_application_platform_6:openssl",
"red_hat_jboss_enterprise_web_server_2:jbcs-httpd24-openssl",
"red_hat_jboss_enterprise_web_server_2:openssl"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |