cve
stringlengths
13
16
affected_component
stringlengths
0
177
summary
stringlengths
0
227
severity
stringclasses
5 values
cvss_v2
stringclasses
234 values
cvss_v3
stringlengths
37
48
description
stringlengths
30
4k
statement
stringlengths
31
2.49k
release_date
stringlengths
25
25
fixed_products
sequencelengths
0
28.2k
known_affected_products
sequencelengths
0
351
known_not_affected_products
sequencelengths
0
29.8k
under_investigation_products
sequencelengths
0
77
threat_categories
sequencelengths
0
4
threat_details
sequencelengths
0
4
threat_dates
sequencelengths
0
4
remediation_categories
sequencelengths
0
214
remediation_details
sequencelengths
0
214
remediation_dates
sequencelengths
0
214
CVE-2001-1407
security flaw
None
null
null
Bugzilla before 2.14 allows Bugzilla users to bypass group security checks by marking a bug as the duplicate of a restricted bug, which adds the user to the CC list of the restricted bug and allows the user to view the bug.
null
2024-11-21T22:10:27+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-0884
security flaw
None
null
null
Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users.
null
2024-11-21T22:14:07+00:00
[ "Red Hat Linux 7.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1", "Red Hat Secure Web Server 3.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe] desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-12-21T14:06:00+00:00", "2001-12-21T14:10:00+00:00", "2002-01-02T15:23:00+00:00" ]
CVE-2001-0191
security flaw
None
null
null
gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length.
null
2024-11-21T22:00:33+00:00
[ "Red Hat Linux 7.0", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-02T00:00:00+00:00", "2001-02-02T00:00:00+00:00" ]
CVE-2001-0596
security flaw
None
null
null
Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript.
null
2024-11-21T22:03:25+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-04-09T00:00:00+00:00" ]
CVE-2001-1387
security flaw
None
null
null
iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak.
null
2024-11-21T22:12:13+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-07T14:10:00+00:00" ]
CVE-2001-0851
security flaw
Important
null
null
Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.
null
2024-11-21T22:12:09+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2001-11-02T20:08:00+00:00" ]
CVE-2001-0406
security flaw
None
null
null
Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient.
null
2024-11-21T22:03:04+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAgain, note that the packages for Red Hat Linux 6.2 requre an updated\nlogrotate package." ]
[ "2001-05-15T02:21:00+00:00" ]
CVE-2001-1352
security flaw
None
null
null
Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter.
null
2024-11-21T22:14:31+00:00
[ "Red Hat Linux 7.0j" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-07-09T12:40:00+00:00" ]
CVE-2001-0328
kernel
TCP connection ISN hijacks
Low
2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N
null
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
2024-12-06T07:10:10+00:00
[]
[]
[ "red_hat_enterprise_linux_5:kernel", "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_mrg_2:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-1353
security flaw
None
null
null
ghostscript before 6.51 allows local users to read and write arbitrary files as the 'lp' user via the file operator, even with -dSAFER enabled.
null
2024-11-21T22:11:45+00:00
[ "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nAfter updating the rpms, you will need to restart your print server, by\nrunning:\n\n/sbin/service lpd restart\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-31T22:59:00+00:00" ]
CVE-2001-1083
security flaw
None
null
null
Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash).
null
2024-11-21T22:20:30+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-04-25T22:08:00+00:00" ]
CVE-2001-0554
security flaw
Critical
null
null
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
null
2024-11-21T22:08:58+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-08-09T22:14:00+00:00" ]
CVE-2001-0128
security flaw
None
null
null
Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
null
2024-11-21T21:57:36+00:00
[ "Red Hat Powertools 6.1", "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM.\n\nAfter you have applied the update, restart Zope." ]
[ "2000-12-18T00:00:00+00:00" ]
CVE-2001-0169
security flaw
None
null
null
When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
null
2024-11-21T21:59:00+00:00
[ "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2001-01-15T00:00:00+00:00" ]
CVE-2001-1406
security flaw
None
null
null
process_bug.cgi in Bugzilla before 2.14 does not set the "groupset" bit when a bug is moved between product groups, which will cause the bug to have the old group's restrictions, which might not be as stringent.
null
2024-11-21T22:10:18+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-1390
security flaw
None
null
null
Unknown vulnerability in binfmt_misc in the Linux kernel before 2.2.19, related to user pages.
null
2024-11-21T22:03:29+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-0775
security flaw
Important
null
null
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
null
2024-11-21T22:07:35+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-09T23:39:00+00:00" ]
CVE-2001-1349
security flaw
None
null
null
Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers.
null
2024-11-21T22:09:47+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-13T20:25:00+00:00" ]
CVE-2001-0108
security flaw
None
null
null
PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.
null
2024-11-21T21:58:36+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Because of dependencies, the packages must be installed as a group. No\nupdate for the mod_php package is provided for Red Hat Linux 7; it has been\nmerged into the updated php package.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Fvh php*\n\nThen restart your web server:\n\n/etc/rc.d/init.d/httpd restart" ]
[ "2000-12-20T00:00:00+00:00" ]
CVE-2001-0763
security flaw
None
null
null
Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
null
2024-11-21T22:06:47+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-07T23:14:00+00:00" ]
CVE-2001-1332
security flaw
None
null
null
Buffer overflows in Linux CUPS before 1.1.6 may allow remote attackers to execute arbitrary code.
null
2024-11-21T22:17:38+00:00
[ "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Uvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-03-15T12:36:00+00:00" ]
CVE-2001-0489
security flaw
None
null
null
Format string vulnerability in gftp prior to 2.0.8 allows remote malicious FTP servers to execute arbitrary commands.
null
2024-11-21T22:04:53+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-04-25T23:27:00+00:00" ]
CVE-2001-0036
security flaw
None
null
null
KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file.
null
2024-11-21T22:02:09+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-08T00:00:00+00:00" ]
CVE-2001-0889
security flaw
None
null
null
Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters.
null
2024-11-21T22:14:23+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-01-08T11:44:00+00:00" ]
CVE-2001-0309
security flaw
None
null
null
inetd in Red Hat 6.2 does not properly close sockets for internal services such as chargen, daytime, echo, etc., which allows remote attackers to cause a denial of service via a series of connections to the internal services.
null
2024-11-21T21:59:46+00:00
[ "Red Hat Linux 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-01-29T00:00:00+00:00" ]
CVE-2001-1378
security flaw
None
null
null
fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files.
null
2024-11-21T22:09:30+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T15:46:00+00:00" ]
CVE-2001-0569
security flaw
None
null
null
Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet.
null
2024-11-21T22:01:41+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "*NOTE* This advisory supercedes all other Zope and Zope-Hotfix advisories \nfrom Red Hat, Inc.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-24T00:00:00+00:00" ]
CVE-2001-1397
security flaw
None
null
null
The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory.
null
2024-11-21T22:04:17+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1401
security flaw
None
null
null
Bugzilla before 2.14 does not properly restrict access to confidential bugs, which could allow Bugzilla users to bypass viewing permissions via modified bug id parameters in (1) process_bug.cgi, (2) show_activity.cgi, (3) showvotes.cgi, (4) showdependencytree.cgi, (5) showdependencygraph.cgi, (6) showattachment.cgi, or (7) describecomponents.cgi.
null
2024-11-21T22:09:52+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-0197
security flaw
None
null
null
Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands.
null
2024-11-21T21:59:24+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2001-01-23T00:00:00+00:00" ]
CVE-2001-0894
security flaw
None
null
null
Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
null
2024-11-21T22:13:02+00:00
[ "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-27T23:32:00+00:00" ]
CVE-2001-0441
security flaw
None
null
null
Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header.
null
2024-11-21T22:02:31+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-09T00:00:00+00:00" ]
CVE-2001-0011
security flaw
None
null
null
Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
null
2024-11-21T22:00:00+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-01-29T00:00:00+00:00" ]
CVE-2001-0787
security flaw
Important
null
null
LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.
null
2024-11-21T22:07:03+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-12T20:23:00+00:00" ]
CVE-2001-0416
security flaw
None
null
null
sgml-tools (aka sgmltools) before 1.0.9-15 creates temporary files with insecure permissions, which allows other users to read files that are being processed by sgml-tools.
null
2024-11-21T22:02:19+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-09T00:00:00+00:00" ]
CVE-2001-0816
security flaw
None
null
null
OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.
null
2024-11-21T22:12:52+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-30T17:09:00+00:00" ]
CVE-2001-1246
security flaw
Important
null
null
PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.
null
2024-11-21T22:23:08+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Please note that the /etc/php.ini configuration file is not replaced or\noverwritten. You should carefully review your configuration file and adapt\nit to your server or service functions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Please Note:\n\nThe /etc/php.ini configuration file is not replaced or\noverwritten. You should carefully review your configuration file and adapt\nit to your server or service functions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-08-20T15:16:00+00:00", "2002-06-26T00:00:00+00:00" ]
CVE-2001-1374
security flaw
None
null
null
expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd.
null
2024-11-21T22:25:00+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-08-12T19:38:00+00:00" ]
CVE-2001-1323
security flaw
Critical
null
null
Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function.
null
2024-11-21T22:05:23+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-17T01:32:00+00:00" ]
CVE-2001-0066
security flaw
None
null
null
Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.
null
2024-11-21T21:58:12+00:00
[ "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-19T00:00:00+00:00" ]
CVE-2001-1227
security flaw
Moderate
null
null
Zope before 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags.
null
2024-11-21T22:06:13+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter you have updated the packages, you must restart zope:\n\n /etc/rc.d/init.d/zope restart" ]
[ "2001-09-18T08:22:00+00:00", "2001-10-10T22:16:00+00:00" ]
CVE-2001-1030
security flaw
None
null
null
Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.
null
2024-11-21T22:08:39+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-19T20:30:00+00:00" ]
CVE-2001-1175
security flaw
Moderate
null
null
vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing.
null
2024-11-21T22:08:29+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAlso note that users of vipw may want to run (as root):\n\nchmod 0400 /etc/shadow\n\nto ensure that the file has the correct permissions." ]
[ "2001-10-16T19:15:00+00:00", "2001-07-16T16:51:00+00:00" ]
CVE-2001-1572
security flaw
Moderate
null
null
The MAC module in Netfilter in Linux kernel 2.4.1 through 2.4.11, when configured to filter based on MAC addresses, allows remote attackers to bypass packet filters via small packets.
null
2024-11-21T22:46:25+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2003-06-19T13:55:00+00:00" ]
CVE-2001-1162
security flaw
None
null
null
Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file.
null
2024-11-21T22:07:27+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-26T19:00:00+00:00" ]
CVE-2001-0289
security flaw
None
null
null
Joe text editor 2.8 searches the current working directory (CWD) for the .joerc configuration file, which could allow local users to gain privileges of other users by placing a Trojan Horse .joerc file into a directory, then waiting for users to execute joe from that directory.
null
2024-11-21T22:02:07+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-28T00:00:00+00:00" ]
CVE-2001-1174
security flaw
None
null
null
Buffer overflow in Elm 2.5.5 and earlier allows remote attackers to execute arbitrary code via a long Message-ID header.
null
2024-11-21T22:07:57+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-16T22:07:00+00:00" ]
CVE-2001-0572
security flaw
None
null
null
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
null
2024-11-21T22:02:45+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-23T00:00:00+00:00" ]
CVE-2001-1322
security flaw
None
null
null
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.
null
2024-11-21T22:06:47+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-07T23:14:00+00:00" ]
CVE-2001-1267
security flaw
Low
null
null
Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).
null
2024-11-21T22:22:20+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-09-29T08:40:00+00:00", "2002-10-02T18:44:00+00:00" ]
CVE-2001-1375
security flaw
None
null
null
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
null
2024-11-21T22:25:08+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-08-12T19:38:00+00:00" ]
CVE-2001-1230
security flaw
None
null
null
Buffer overflows in Icecast before 1.3.10 allow remote attackers to cause a denial of service (crash) and execute arbitrary code.
null
2024-11-21T22:20:35+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-04-25T22:08:00+00:00" ]
CVE-2001-0071
security flaw
None
null
null
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.
null
2024-11-21T21:58:14+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-19T00:00:00+00:00" ]
CVE-2001-1494
security flaw
Low
null
null
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
null
2024-11-21T23:59:27+00:00
[ "3AS:losetup-0:2.11y-31.11.i386", "3AS:losetup-0:2.11y-31.11.ia64", "3AS:losetup-0:2.11y-31.11.ppc", "3AS:losetup-0:2.11y-31.11.s390", "3AS:losetup-0:2.11y-31.11.s390x", "3AS:losetup-0:2.11y-31.11.x86_64", "3AS:mount-0:2.11y-31.11.i386", "3AS:mount-0:2.11y-31.11.ia64", "3AS:mount-0:2.11y-31.11.ppc", "3AS:mount-0:2.11y-31.11.s390", "3AS:mount-0:2.11y-31.11.s390x", "3AS:mount-0:2.11y-31.11.x86_64", "3AS:util-linux-0:2.11y-31.11.i386", "3AS:util-linux-0:2.11y-31.11.ia64", "3AS:util-linux-0:2.11y-31.11.ppc", "3AS:util-linux-0:2.11y-31.11.s390", "3AS:util-linux-0:2.11y-31.11.s390x", "3AS:util-linux-0:2.11y-31.11.src", "3AS:util-linux-0:2.11y-31.11.x86_64", "3AS:util-linux-debuginfo-0:2.11y-31.11.i386", "3AS:util-linux-debuginfo-0:2.11y-31.11.ia64", "3AS:util-linux-debuginfo-0:2.11y-31.11.ppc", "3AS:util-linux-debuginfo-0:2.11y-31.11.s390", "3AS:util-linux-debuginfo-0:2.11y-31.11.s390x", "3AS:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3Desktop:losetup-0:2.11y-31.11.i386", "3Desktop:losetup-0:2.11y-31.11.ia64", "3Desktop:losetup-0:2.11y-31.11.ppc", "3Desktop:losetup-0:2.11y-31.11.s390", "3Desktop:losetup-0:2.11y-31.11.s390x", "3Desktop:losetup-0:2.11y-31.11.x86_64", "3Desktop:mount-0:2.11y-31.11.i386", "3Desktop:mount-0:2.11y-31.11.ia64", "3Desktop:mount-0:2.11y-31.11.ppc", "3Desktop:mount-0:2.11y-31.11.s390", "3Desktop:mount-0:2.11y-31.11.s390x", "3Desktop:mount-0:2.11y-31.11.x86_64", "3Desktop:util-linux-0:2.11y-31.11.i386", "3Desktop:util-linux-0:2.11y-31.11.ia64", "3Desktop:util-linux-0:2.11y-31.11.ppc", "3Desktop:util-linux-0:2.11y-31.11.s390", "3Desktop:util-linux-0:2.11y-31.11.s390x", "3Desktop:util-linux-0:2.11y-31.11.src", "3Desktop:util-linux-0:2.11y-31.11.x86_64", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.i386", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.ia64", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.ppc", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390x", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3ES:losetup-0:2.11y-31.11.i386", "3ES:losetup-0:2.11y-31.11.ia64", "3ES:losetup-0:2.11y-31.11.ppc", "3ES:losetup-0:2.11y-31.11.s390", "3ES:losetup-0:2.11y-31.11.s390x", "3ES:losetup-0:2.11y-31.11.x86_64", "3ES:mount-0:2.11y-31.11.i386", "3ES:mount-0:2.11y-31.11.ia64", "3ES:mount-0:2.11y-31.11.ppc", "3ES:mount-0:2.11y-31.11.s390", "3ES:mount-0:2.11y-31.11.s390x", "3ES:mount-0:2.11y-31.11.x86_64", "3ES:util-linux-0:2.11y-31.11.i386", "3ES:util-linux-0:2.11y-31.11.ia64", "3ES:util-linux-0:2.11y-31.11.ppc", "3ES:util-linux-0:2.11y-31.11.s390", "3ES:util-linux-0:2.11y-31.11.s390x", "3ES:util-linux-0:2.11y-31.11.src", "3ES:util-linux-0:2.11y-31.11.x86_64", "3ES:util-linux-debuginfo-0:2.11y-31.11.i386", "3ES:util-linux-debuginfo-0:2.11y-31.11.ia64", "3ES:util-linux-debuginfo-0:2.11y-31.11.ppc", "3ES:util-linux-debuginfo-0:2.11y-31.11.s390", "3ES:util-linux-debuginfo-0:2.11y-31.11.s390x", "3ES:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3WS:losetup-0:2.11y-31.11.i386", "3WS:losetup-0:2.11y-31.11.ia64", "3WS:losetup-0:2.11y-31.11.ppc", "3WS:losetup-0:2.11y-31.11.s390", "3WS:losetup-0:2.11y-31.11.s390x", "3WS:losetup-0:2.11y-31.11.x86_64", "3WS:mount-0:2.11y-31.11.i386", "3WS:mount-0:2.11y-31.11.ia64", "3WS:mount-0:2.11y-31.11.ppc", "3WS:mount-0:2.11y-31.11.s390", "3WS:mount-0:2.11y-31.11.s390x", "3WS:mount-0:2.11y-31.11.x86_64", "3WS:util-linux-0:2.11y-31.11.i386", "3WS:util-linux-0:2.11y-31.11.ia64", "3WS:util-linux-0:2.11y-31.11.ppc", "3WS:util-linux-0:2.11y-31.11.s390", "3WS:util-linux-0:2.11y-31.11.s390x", "3WS:util-linux-0:2.11y-31.11.src", "3WS:util-linux-0:2.11y-31.11.x86_64", "3WS:util-linux-debuginfo-0:2.11y-31.11.i386", "3WS:util-linux-debuginfo-0:2.11y-31.11.ia64", "3WS:util-linux-debuginfo-0:2.11y-31.11.ppc", "3WS:util-linux-debuginfo-0:2.11y-31.11.s390", "3WS:util-linux-debuginfo-0:2.11y-31.11.s390x", "3WS:util-linux-debuginfo-0:2.11y-31.11.x86_64", "4AS:util-linux-0:2.12a-16.EL4.12.i386", "4AS:util-linux-0:2.12a-16.EL4.12.ia64", "4AS:util-linux-0:2.12a-16.EL4.12.ppc", "4AS:util-linux-0:2.12a-16.EL4.12.s390", "4AS:util-linux-0:2.12a-16.EL4.12.s390x", "4AS:util-linux-0:2.12a-16.EL4.12.src", "4AS:util-linux-0:2.12a-16.EL4.12.x86_64", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4Desktop:util-linux-0:2.12a-16.EL4.12.i386", "4Desktop:util-linux-0:2.12a-16.EL4.12.ia64", "4Desktop:util-linux-0:2.12a-16.EL4.12.ppc", "4Desktop:util-linux-0:2.12a-16.EL4.12.s390", "4Desktop:util-linux-0:2.12a-16.EL4.12.s390x", "4Desktop:util-linux-0:2.12a-16.EL4.12.src", "4Desktop:util-linux-0:2.12a-16.EL4.12.x86_64", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4ES:util-linux-0:2.12a-16.EL4.12.i386", "4ES:util-linux-0:2.12a-16.EL4.12.ia64", "4ES:util-linux-0:2.12a-16.EL4.12.ppc", "4ES:util-linux-0:2.12a-16.EL4.12.s390", "4ES:util-linux-0:2.12a-16.EL4.12.s390x", "4ES:util-linux-0:2.12a-16.EL4.12.src", "4ES:util-linux-0:2.12a-16.EL4.12.x86_64", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4WS:util-linux-0:2.12a-16.EL4.12.i386", "4WS:util-linux-0:2.12a-16.EL4.12.ia64", "4WS:util-linux-0:2.12a-16.EL4.12.ppc", "4WS:util-linux-0:2.12a-16.EL4.12.s390", "4WS:util-linux-0:2.12a-16.EL4.12.s390x", "4WS:util-linux-0:2.12a-16.EL4.12.src", "4WS:util-linux-0:2.12a-16.EL4.12.x86_64", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2005-10-11T15:49:00+00:00" ]
CVE-2001-0905
security flaw
None
null
null
Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running.
null
2024-11-21T22:08:11+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-19T04:48:00+00:00" ]
CVE-2001-1247
security flaw
None
null
null
PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files.
null
2024-11-21T22:17:56+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter applying these updates you will need to restart your web server if it\nwas running before the update was applied." ]
[ "2002-02-28T17:54:00+00:00" ]
CVE-2001-0381
security flaw
None
null
null
The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key.
null
2024-11-21T22:05:38+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-17T01:32:00+00:00" ]
CVE-2001-0440
security flaw
None
null
null
Buffer overflow in logging functions of licq before 1.0.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands.
null
2024-11-21T22:01:55+00:00
[ "Red Hat Linux 7.0", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-28T00:00:00+00:00" ]
CVE-2001-0010
security flaw
None
null
null
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.
null
2024-11-21T21:59:52+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-01-29T00:00:00+00:00" ]
CVE-2001-1380
security flaw
None
null
null
OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.
null
2024-11-21T22:10:55+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-16T16:25:00+00:00" ]
CVE-2001-1400
security flaw
None
null
null
Unknown vulnerabilities in the UDP port allocation for Linux kernel before 2.2.19 could allow local users to cause a denial of service (deadlock).
null
2024-11-21T22:04:31+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-0641
security flaw
None
null
null
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
null
2024-11-21T22:06:03+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nIn particular, if you are running Red Hat Linux 5.x or 6.x, you need to\ninstall the mktemp errata (RHSA-2001:070) before applying this update.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-21T18:38:00+00:00" ]
CVE-2001-1379
security flaw
None
null
null
The PostgreSQL authentication modules (1) mod_auth_pgsql 0.9.5, and (2) mod_auth_pgsql_sys 0.9.4, allow remote attackers to bypass authentication and execute arbitrary SQL via a SQL injection attack on the user name.
null
2024-11-21T22:11:09+00:00
[ "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-24T14:39:00+00:00" ]
CVE-2001-0568
security flaw
None
null
null
Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes.
null
2024-11-21T22:01:33+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "*NOTE* This advisory supercedes all other Zope and Zope-Hotfix advisories \nfrom Red Hat, Inc.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-24T00:00:00+00:00" ]
CVE-2001-1396
security flaw
None
null
null
Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact.
null
2024-11-21T22:04:05+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2000-1254
openssl
Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Moderate
4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N
null
crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.
null
2024-12-06T07:08:52+00:00
[]
[]
[ "red_hat_enterprise_linux_5:openssl", "red_hat_enterprise_linux_5:openssl097a", "red_hat_enterprise_linux_6:openssl", "red_hat_enterprise_linux_6:openssl098e", "red_hat_enterprise_linux_7:openssl", "red_hat_enterprise_linux_7:openssl098e", "red_hat_jboss_enterprise_application_platform_6:openssl", "red_hat_jboss_enterprise_web_server_1:openssl", "red_hat_jboss_enterprise_web_server_2:openssl", "red_hat_jboss_enterprise_web_server_3:openssl" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2000-1137
security flaw
None
null
null
GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
2024-11-21T21:57:02+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-06T00:00:00+00:00" ]
CVE-2000-1212
security flaw
None
null
null
Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects.
null
2024-11-21T21:58:35+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM.\n\nPlease make sure that you have updated you Zope packages to version 2.2.4\nprior to applying this Hotfix. After you have installed this Hotfix,\nrestart Zope." ]
[ "2000-12-20T00:00:00+00:00" ]
CVE-2000-1211
security flaw
None
null
null
Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.
null
2024-11-21T21:57:16+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-13T00:00:00+00:00" ]
CVE-2000-1134
security flaw
None
null
null
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
This issue was fixed in the following products: - Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30)
2024-11-21T21:56:16+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.0j" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-11-30T00:00:00+00:00" ]
CVE-2000-0715
security flaw
None
null
null
DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file.
null
2024-11-21T21:56:40+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-01T00:00:00+00:00" ]
CVE-2000-1191
security flaw
Low
null
null
htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.
null
2024-11-22T00:43:18+00:00
[ "3AS:htdig-2:3.1.6-7.el3.i386", "3AS:htdig-2:3.1.6-7.el3.ia64", "3AS:htdig-2:3.1.6-7.el3.ppc", "3AS:htdig-2:3.1.6-7.el3.s390", "3AS:htdig-2:3.1.6-7.el3.s390x", "3AS:htdig-2:3.1.6-7.el3.src", "3AS:htdig-2:3.1.6-7.el3.x86_64", "3AS:htdig-debuginfo-2:3.1.6-7.el3.i386", "3AS:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3AS:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3AS:htdig-debuginfo-2:3.1.6-7.el3.s390", "3AS:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3AS:htdig-debuginfo-2:3.1.6-7.el3.x86_64", "3Desktop:htdig-2:3.1.6-7.el3.i386", "3Desktop:htdig-2:3.1.6-7.el3.ia64", "3Desktop:htdig-2:3.1.6-7.el3.ppc", "3Desktop:htdig-2:3.1.6-7.el3.s390", "3Desktop:htdig-2:3.1.6-7.el3.s390x", "3Desktop:htdig-2:3.1.6-7.el3.src", "3Desktop:htdig-2:3.1.6-7.el3.x86_64", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.i386", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.x86_64", "3ES:htdig-2:3.1.6-7.el3.i386", "3ES:htdig-2:3.1.6-7.el3.ia64", "3ES:htdig-2:3.1.6-7.el3.ppc", "3ES:htdig-2:3.1.6-7.el3.s390", "3ES:htdig-2:3.1.6-7.el3.s390x", "3ES:htdig-2:3.1.6-7.el3.src", "3ES:htdig-2:3.1.6-7.el3.x86_64", "3ES:htdig-debuginfo-2:3.1.6-7.el3.i386", "3ES:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3ES:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3ES:htdig-debuginfo-2:3.1.6-7.el3.s390", "3ES:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3ES:htdig-debuginfo-2:3.1.6-7.el3.x86_64", "3WS:htdig-2:3.1.6-7.el3.i386", "3WS:htdig-2:3.1.6-7.el3.ia64", "3WS:htdig-2:3.1.6-7.el3.ppc", "3WS:htdig-2:3.1.6-7.el3.s390", "3WS:htdig-2:3.1.6-7.el3.s390x", "3WS:htdig-2:3.1.6-7.el3.src", "3WS:htdig-2:3.1.6-7.el3.x86_64", "3WS:htdig-debuginfo-2:3.1.6-7.el3.i386", "3WS:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3WS:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3WS:htdig-debuginfo-2:3.1.6-7.el3.s390", "3WS:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3WS:htdig-debuginfo-2:3.1.6-7.el3.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2007-06-11T00:00:00+00:00" ]
CVE-1999-0710
security flaw
Low
null
null
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
null
2024-11-21T23:43:50+00:00
[ "3AS:squid-7:2.5.STABLE3-6.3E.13.i386", "3AS:squid-7:2.5.STABLE3-6.3E.13.ia64", "3AS:squid-7:2.5.STABLE3-6.3E.13.ppc", "3AS:squid-7:2.5.STABLE3-6.3E.13.s390", "3AS:squid-7:2.5.STABLE3-6.3E.13.s390x", "3AS:squid-7:2.5.STABLE3-6.3E.13.src", "3AS:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.i386", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.ia64", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.ppc", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390x", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.src", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "3ES:squid-7:2.5.STABLE3-6.3E.13.i386", "3ES:squid-7:2.5.STABLE3-6.3E.13.ia64", "3ES:squid-7:2.5.STABLE3-6.3E.13.ppc", "3ES:squid-7:2.5.STABLE3-6.3E.13.s390", "3ES:squid-7:2.5.STABLE3-6.3E.13.s390x", "3ES:squid-7:2.5.STABLE3-6.3E.13.src", "3ES:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "3WS:squid-7:2.5.STABLE3-6.3E.13.i386", "3WS:squid-7:2.5.STABLE3-6.3E.13.ia64", "3WS:squid-7:2.5.STABLE3-6.3E.13.ppc", "3WS:squid-7:2.5.STABLE3-6.3E.13.s390", "3WS:squid-7:2.5.STABLE3-6.3E.13.s390x", "3WS:squid-7:2.5.STABLE3-6.3E.13.src", "3WS:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "4AS:squid-7:2.5.STABLE6-3.4E.9.i386", "4AS:squid-7:2.5.STABLE6-3.4E.9.ia64", "4AS:squid-7:2.5.STABLE6-3.4E.9.ppc", "4AS:squid-7:2.5.STABLE6-3.4E.9.s390", "4AS:squid-7:2.5.STABLE6-3.4E.9.s390x", "4AS:squid-7:2.5.STABLE6-3.4E.9.src", "4AS:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.i386", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.ia64", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.ppc", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390x", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.src", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "4ES:squid-7:2.5.STABLE6-3.4E.9.i386", "4ES:squid-7:2.5.STABLE6-3.4E.9.ia64", "4ES:squid-7:2.5.STABLE6-3.4E.9.ppc", "4ES:squid-7:2.5.STABLE6-3.4E.9.s390", "4ES:squid-7:2.5.STABLE6-3.4E.9.s390x", "4ES:squid-7:2.5.STABLE6-3.4E.9.src", "4ES:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "4WS:squid-7:2.5.STABLE6-3.4E.9.i386", "4WS:squid-7:2.5.STABLE6-3.4E.9.ia64", "4WS:squid-7:2.5.STABLE6-3.4E.9.ppc", "4WS:squid-7:2.5.STABLE6-3.4E.9.s390", "4WS:squid-7:2.5.STABLE6-3.4E.9.s390x", "4WS:squid-7:2.5.STABLE6-3.4E.9.src", "4WS:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/" ]
[ "2005-06-14T19:40:00+00:00", "2005-06-13T12:08:00+00:00" ]
CVE-1999-0199
glibc
manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
None
null
0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.
Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue. This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage.
2024-12-06T04:07:05+00:00
[]
[]
[ "red_hat_enterprise_linux_5:glibc", "red_hat_enterprise_linux_6:glibc", "red_hat_enterprise_linux_7:glibc", "red_hat_enterprise_linux_8:glibc" ]
[]
[]
[]
[]
[]
[]
[]
CVE-1999-0428
openssl
allow remote attackers to reuse SSL sessions and bypass access controls
Moderate
null
6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
2024-12-06T03:15:27+00:00
[]
[]
[ "red_hat_advanced_cluster_management_for_kubernetes_2:openssl", "red_hat_enterprise_linux_5:openssl", "red_hat_enterprise_linux_5:openssl097a", "red_hat_enterprise_linux_6:openssl", "red_hat_enterprise_linux_6:openssl098e", "red_hat_enterprise_linux_7:openssl", "red_hat_enterprise_linux_7:openssl098e", "red_hat_enterprise_linux_7:ovmf", "red_hat_enterprise_linux_8:compat-openssl10", "red_hat_enterprise_linux_8:mingw-openssl", "red_hat_enterprise_linux_8:openssl", "red_hat_jboss_core_services:jbcs-httpd24-openssl", "red_hat_jboss_core_services:openssl", "red_hat_jboss_enterprise_application_platform_5:openssl", "red_hat_jboss_enterprise_application_platform_6:openssl", "red_hat_jboss_enterprise_web_server_2:jbcs-httpd24-openssl", "red_hat_jboss_enterprise_web_server_2:openssl" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]