cve
stringlengths
13
16
cwe
stringclasses
484 values
affected_component
stringlengths
0
177
summary
stringlengths
0
227
severity
stringclasses
5 values
cvss_v2
stringclasses
250 values
cvss_v3
stringlengths
37
48
description
stringlengths
30
4k
statement
stringlengths
1
3.47k
discovery_date
stringdate
2001-01-05 00:00:00
2025-05-09 00:00:00
release_date
stringdate
1999-01-01 00:00:00
2025-05-09 00:00:00
fixed_products
sequencelengths
0
28.2k
known_affected_products
sequencelengths
0
599
known_not_affected_products
sequencelengths
0
30.2k
under_investigation_products
sequencelengths
0
78
threat_categories
sequencelengths
0
4
threat_details
sequencelengths
0
4
threat_dates
sequencelengths
0
4
remediation_categories
sequencelengths
0
218
remediation_details
sequencelengths
0
218
remediation_dates
sequencelengths
0
218
CVE-2002-1914
null
security flaw
Low
null
null
dump 0.4 b10 through b29 allows local users to cause a denial of service (execution prevention) by using flock() to lock the /etc/dumpdates file.
null
2002-07-17T00:00:00+00:00
2002-07-17T00:00:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2005-08-03T14:12:00+00:00" ]
CVE-2002-2439
CWE-190
gcc
Integer overflow can occur during the computation of the memory region size for new[] operator
Moderate
3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P
null
Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.
null
2012-08-31T00:00:00+00:00
2002-08-05T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_5:compat-gcc-295", "red_hat_enterprise_linux_5:compat-gcc-296", "red_hat_enterprise_linux_5:compat-gcc-32", "red_hat_enterprise_linux_5:compat-gcc-34", "red_hat_enterprise_linux_5:gcc", "red_hat_enterprise_linux_5:gcc43", "red_hat_enterprise_linux_5:gcc44", "red_hat_enterprise_linux_6:compat-gcc-295", "red_hat_enterprise_linux_6:compat-gcc-296", "red_hat_enterprise_linux_6:compat-gcc-32", "red_hat_enterprise_linux_6:compat-gcc-34", "red_hat_enterprise_linux_6:gcc" ]
[ "red_hat_enterprise_linux_7:gcc" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned" ]
[ "Will not fix" ]
[ null ]
CVE-2002-2443
null
krb5
UDP ping-pong flaw in kpasswd
Moderate
5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P
null
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
null
2013-05-01T00:00:00+00:00
2002-06-16T00:00:00+00:00
[ "5Server-5.9.Z:krb5-0:1.6.1-70.el5_9.2.src", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc64", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc64", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc64", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.x86_64", "6Client-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258" ]
[ "2013-06-12T16:46:00+00:00" ]
CVE-2002-0059
CWE-416
zlib
Double free in inflateEnd
Moderate
null
6.9/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
null
2002-03-09T00:00:00+00:00
2002-03-09T00:00:00+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[ "red_hat_enterprise_linux_6:zlib", "red_hat_enterprise_linux_7:zlib", "red_hat_enterprise_linux_8:zlib", "red_hat_enterprise_linux_9:zlib", "red_hat_jboss_enterprise_application_platform_6:zlib", "red_hat_software_collections:rh-nodejs12-nodejs", "red_hat_software_collections:rh-nodejs14-nodejs" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nThe procedure for upgrading the kernel is documented at:\n\n http://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-03-11T20:15:00+00:00", "2002-03-11T18:09:00+00:00" ]
CVE-2002-0389
null
mailman
Local users able to read private mailing list archives
Low
2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N
null
It was found that mailman stored private email messages in a world-readable directory. A local user could use this flaw to read private mailing list archives.
null
2011-06-13T00:00:00+00:00
2002-01-01T00:00:00+00:00
[ "6Server:mailman-3:2.1.12-25.el6.i686", "6Server:mailman-3:2.1.12-25.el6.ppc64", "6Server:mailman-3:2.1.12-25.el6.s390x", "6Server:mailman-3:2.1.12-25.el6.src", "6Server:mailman-3:2.1.12-25.el6.x86_64", "6Server:mailman-debuginfo-3:2.1.12-25.el6.i686", "6Server:mailman-debuginfo-3:2.1.12-25.el6.ppc64", "6Server:mailman-debuginfo-3:2.1.12-25.el6.s390x", "6Server:mailman-debuginfo-3:2.1.12-25.el6.x86_64", "6Workstation:mailman-3:2.1.12-25.el6.i686", "6Workstation:mailman-3:2.1.12-25.el6.ppc64", "6Workstation:mailman-3:2.1.12-25.el6.s390x", "6Workstation:mailman-3:2.1.12-25.el6.src", "6Workstation:mailman-3:2.1.12-25.el6.x86_64", "6Workstation:mailman-debuginfo-3:2.1.12-25.el6.i686", "6Workstation:mailman-debuginfo-3:2.1.12-25.el6.ppc64", "6Workstation:mailman-debuginfo-3:2.1.12-25.el6.s390x", "6Workstation:mailman-debuginfo-3:2.1.12-25.el6.x86_64" ]
[ "red_hat_enterprise_linux_4:mailman", "red_hat_enterprise_linux_5:mailman" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "no_fix_planned" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "Will not fix" ]
[ "2015-07-20T14:06:40+00:00", null ]
CVE-2002-2215
null
security flaw
Moderate
null
null
The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of "To" addresses, which triggers an error in the rfc822_write_address function.
null
2002-09-07T00:00:00+00:00
2002-09-07T00:00:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-05-23T20:09:00+00:00" ]
CVE-2002-2185
null
security flaw
Moderate
null
null
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
null
2005-12-02T00:00:00+00:00
2002-06-25T00:00:00+00:00
[ "3AS:kernel-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-0:2.4.21-37.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-0:2.4.21-37.0.1.EL.src", "3AS:kernel-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-37.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-37.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-37.0.1.EL.src", "3Desktop:kernel-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-0:2.4.21-37.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-0:2.4.21-37.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-0:2.4.21-37.0.1.EL.src", "3ES:kernel-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-37.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-0:2.4.21-37.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-0:2.4.21-37.0.1.EL.src", "3WS:kernel-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-37.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64", "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-01-19T16:03:00+00:00", "2006-01-17T08:36:00+00:00", "2006-02-01T17:48:00+00:00", "2006-02-01T17:57:00+00:00" ]
CVE-2002-2214
null
security flaw
Moderate
null
null
The php_if_imap_mime_header_decode function in the IMAP functionality in PHP before 4.2.2 allows remote attackers to cause a denial of service (crash) via an e-mail header with a long "To" header.
null
2006-05-31T00:00:00+00:00
2002-02-18T00:00:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-07-25T12:14:00+00:00" ]
CVE-2001-1593
CWE-367
a2ps
insecure temporary file use
Low
2.1/AV:L/AC:L/Au:N/C:N/I:P/A:N
null
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.
null
2001-01-05T00:00:00+00:00
2001-01-05T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:a2ps", "red_hat_enterprise_linux_6:a2ps", "red_hat_enterprise_linux_7:a2ps" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-0131
CWE-59
httpd
allows local users to overwrite arbitrary files via a symlink attack
Low
null
2.8/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.
All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
2020-10-09T00:00:00+00:00
2001-01-10T00:00:00+00:00
[]
[ "red_hat_jboss_enterprise_web_server_2:httpd", "red_hat_jboss_enterprise_web_server_2:httpd22" ]
[ "red_hat_enterprise_linux_5:httpd", "red_hat_enterprise_linux_6:httpd", "red_hat_enterprise_linux_7:httpd", "red_hat_enterprise_linux_8:httpd:2.4/httpd", "red_hat_jboss_core_services:httpd", "red_hat_software_collections:httpd24-httpd" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned" ]
[ "Out of support scope" ]
[ null ]
CVE-2001-1556
CWE-532
httpd
log files contain information directly supplied by clients and does not filter or quote control characters
Low
null
3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083.
2020-10-14T00:00:00+00:00
2001-12-31T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:httpd", "red_hat_enterprise_linux_6:httpd", "red_hat_enterprise_linux_7:httpd", "red_hat_enterprise_linux_8:httpd:2.4/httpd", "red_hat_jboss_core_services:httpd", "red_hat_jboss_enterprise_web_server_2:httpd", "red_hat_jboss_enterprise_web_server_2:httpd22", "red_hat_software_collections:httpd24-httpd" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-0328
null
kernel
TCP connection ISN hijacks
Low
2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N
null
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
2013-05-16T00:00:00+00:00
2001-05-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:kernel", "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_mrg_2:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-1494
null
security flaw
Low
null
null
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
null
2005-06-21T00:00:00+00:00
2001-12-12T00:00:00+00:00
[ "3AS:losetup-0:2.11y-31.11.i386", "3AS:losetup-0:2.11y-31.11.ia64", "3AS:losetup-0:2.11y-31.11.ppc", "3AS:losetup-0:2.11y-31.11.s390", "3AS:losetup-0:2.11y-31.11.s390x", "3AS:losetup-0:2.11y-31.11.x86_64", "3AS:mount-0:2.11y-31.11.i386", "3AS:mount-0:2.11y-31.11.ia64", "3AS:mount-0:2.11y-31.11.ppc", "3AS:mount-0:2.11y-31.11.s390", "3AS:mount-0:2.11y-31.11.s390x", "3AS:mount-0:2.11y-31.11.x86_64", "3AS:util-linux-0:2.11y-31.11.i386", "3AS:util-linux-0:2.11y-31.11.ia64", "3AS:util-linux-0:2.11y-31.11.ppc", "3AS:util-linux-0:2.11y-31.11.s390", "3AS:util-linux-0:2.11y-31.11.s390x", "3AS:util-linux-0:2.11y-31.11.src", "3AS:util-linux-0:2.11y-31.11.x86_64", "3AS:util-linux-debuginfo-0:2.11y-31.11.i386", "3AS:util-linux-debuginfo-0:2.11y-31.11.ia64", "3AS:util-linux-debuginfo-0:2.11y-31.11.ppc", "3AS:util-linux-debuginfo-0:2.11y-31.11.s390", "3AS:util-linux-debuginfo-0:2.11y-31.11.s390x", "3AS:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3Desktop:losetup-0:2.11y-31.11.i386", "3Desktop:losetup-0:2.11y-31.11.ia64", "3Desktop:losetup-0:2.11y-31.11.ppc", "3Desktop:losetup-0:2.11y-31.11.s390", "3Desktop:losetup-0:2.11y-31.11.s390x", "3Desktop:losetup-0:2.11y-31.11.x86_64", "3Desktop:mount-0:2.11y-31.11.i386", "3Desktop:mount-0:2.11y-31.11.ia64", "3Desktop:mount-0:2.11y-31.11.ppc", "3Desktop:mount-0:2.11y-31.11.s390", "3Desktop:mount-0:2.11y-31.11.s390x", "3Desktop:mount-0:2.11y-31.11.x86_64", "3Desktop:util-linux-0:2.11y-31.11.i386", "3Desktop:util-linux-0:2.11y-31.11.ia64", "3Desktop:util-linux-0:2.11y-31.11.ppc", "3Desktop:util-linux-0:2.11y-31.11.s390", "3Desktop:util-linux-0:2.11y-31.11.s390x", "3Desktop:util-linux-0:2.11y-31.11.src", "3Desktop:util-linux-0:2.11y-31.11.x86_64", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.i386", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.ia64", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.ppc", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390x", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3ES:losetup-0:2.11y-31.11.i386", "3ES:losetup-0:2.11y-31.11.ia64", "3ES:losetup-0:2.11y-31.11.ppc", "3ES:losetup-0:2.11y-31.11.s390", "3ES:losetup-0:2.11y-31.11.s390x", "3ES:losetup-0:2.11y-31.11.x86_64", "3ES:mount-0:2.11y-31.11.i386", "3ES:mount-0:2.11y-31.11.ia64", "3ES:mount-0:2.11y-31.11.ppc", "3ES:mount-0:2.11y-31.11.s390", "3ES:mount-0:2.11y-31.11.s390x", "3ES:mount-0:2.11y-31.11.x86_64", "3ES:util-linux-0:2.11y-31.11.i386", "3ES:util-linux-0:2.11y-31.11.ia64", "3ES:util-linux-0:2.11y-31.11.ppc", "3ES:util-linux-0:2.11y-31.11.s390", "3ES:util-linux-0:2.11y-31.11.s390x", "3ES:util-linux-0:2.11y-31.11.src", "3ES:util-linux-0:2.11y-31.11.x86_64", "3ES:util-linux-debuginfo-0:2.11y-31.11.i386", "3ES:util-linux-debuginfo-0:2.11y-31.11.ia64", "3ES:util-linux-debuginfo-0:2.11y-31.11.ppc", "3ES:util-linux-debuginfo-0:2.11y-31.11.s390", "3ES:util-linux-debuginfo-0:2.11y-31.11.s390x", "3ES:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3WS:losetup-0:2.11y-31.11.i386", "3WS:losetup-0:2.11y-31.11.ia64", "3WS:losetup-0:2.11y-31.11.ppc", "3WS:losetup-0:2.11y-31.11.s390", "3WS:losetup-0:2.11y-31.11.s390x", "3WS:losetup-0:2.11y-31.11.x86_64", "3WS:mount-0:2.11y-31.11.i386", "3WS:mount-0:2.11y-31.11.ia64", "3WS:mount-0:2.11y-31.11.ppc", "3WS:mount-0:2.11y-31.11.s390", "3WS:mount-0:2.11y-31.11.s390x", "3WS:mount-0:2.11y-31.11.x86_64", "3WS:util-linux-0:2.11y-31.11.i386", "3WS:util-linux-0:2.11y-31.11.ia64", "3WS:util-linux-0:2.11y-31.11.ppc", "3WS:util-linux-0:2.11y-31.11.s390", "3WS:util-linux-0:2.11y-31.11.s390x", "3WS:util-linux-0:2.11y-31.11.src", "3WS:util-linux-0:2.11y-31.11.x86_64", "3WS:util-linux-debuginfo-0:2.11y-31.11.i386", "3WS:util-linux-debuginfo-0:2.11y-31.11.ia64", "3WS:util-linux-debuginfo-0:2.11y-31.11.ppc", "3WS:util-linux-debuginfo-0:2.11y-31.11.s390", "3WS:util-linux-debuginfo-0:2.11y-31.11.s390x", "3WS:util-linux-debuginfo-0:2.11y-31.11.x86_64", "4AS:util-linux-0:2.12a-16.EL4.12.i386", "4AS:util-linux-0:2.12a-16.EL4.12.ia64", "4AS:util-linux-0:2.12a-16.EL4.12.ppc", "4AS:util-linux-0:2.12a-16.EL4.12.s390", "4AS:util-linux-0:2.12a-16.EL4.12.s390x", "4AS:util-linux-0:2.12a-16.EL4.12.src", "4AS:util-linux-0:2.12a-16.EL4.12.x86_64", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4Desktop:util-linux-0:2.12a-16.EL4.12.i386", "4Desktop:util-linux-0:2.12a-16.EL4.12.ia64", "4Desktop:util-linux-0:2.12a-16.EL4.12.ppc", "4Desktop:util-linux-0:2.12a-16.EL4.12.s390", "4Desktop:util-linux-0:2.12a-16.EL4.12.s390x", "4Desktop:util-linux-0:2.12a-16.EL4.12.src", "4Desktop:util-linux-0:2.12a-16.EL4.12.x86_64", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4ES:util-linux-0:2.12a-16.EL4.12.i386", "4ES:util-linux-0:2.12a-16.EL4.12.ia64", "4ES:util-linux-0:2.12a-16.EL4.12.ppc", "4ES:util-linux-0:2.12a-16.EL4.12.s390", "4ES:util-linux-0:2.12a-16.EL4.12.s390x", "4ES:util-linux-0:2.12a-16.EL4.12.src", "4ES:util-linux-0:2.12a-16.EL4.12.x86_64", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4WS:util-linux-0:2.12a-16.EL4.12.i386", "4WS:util-linux-0:2.12a-16.EL4.12.ia64", "4WS:util-linux-0:2.12a-16.EL4.12.ppc", "4WS:util-linux-0:2.12a-16.EL4.12.s390", "4WS:util-linux-0:2.12a-16.EL4.12.s390x", "4WS:util-linux-0:2.12a-16.EL4.12.src", "4WS:util-linux-0:2.12a-16.EL4.12.x86_64", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2005-10-11T15:49:00+00:00" ]
CVE-2000-1254
null
openssl
Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Moderate
4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N
null
crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.
null
2016-05-04T00:00:00+00:00
2000-06-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:openssl", "red_hat_enterprise_linux_5:openssl097a", "red_hat_enterprise_linux_6:openssl", "red_hat_enterprise_linux_6:openssl098e", "red_hat_enterprise_linux_7:openssl", "red_hat_enterprise_linux_7:openssl098e", "red_hat_jboss_enterprise_application_platform_6:openssl", "red_hat_jboss_enterprise_web_server_1:openssl", "red_hat_jboss_enterprise_web_server_2:openssl", "red_hat_jboss_enterprise_web_server_3:openssl" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2000-1191
null
security flaw
Low
null
null
htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.
null
2006-12-06T00:00:00+00:00
2000-04-18T00:00:00+00:00
[ "3AS:htdig-2:3.1.6-7.el3.i386", "3AS:htdig-2:3.1.6-7.el3.ia64", "3AS:htdig-2:3.1.6-7.el3.ppc", "3AS:htdig-2:3.1.6-7.el3.s390", "3AS:htdig-2:3.1.6-7.el3.s390x", "3AS:htdig-2:3.1.6-7.el3.src", "3AS:htdig-2:3.1.6-7.el3.x86_64", "3AS:htdig-debuginfo-2:3.1.6-7.el3.i386", "3AS:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3AS:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3AS:htdig-debuginfo-2:3.1.6-7.el3.s390", "3AS:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3AS:htdig-debuginfo-2:3.1.6-7.el3.x86_64", "3Desktop:htdig-2:3.1.6-7.el3.i386", "3Desktop:htdig-2:3.1.6-7.el3.ia64", "3Desktop:htdig-2:3.1.6-7.el3.ppc", "3Desktop:htdig-2:3.1.6-7.el3.s390", "3Desktop:htdig-2:3.1.6-7.el3.s390x", "3Desktop:htdig-2:3.1.6-7.el3.src", "3Desktop:htdig-2:3.1.6-7.el3.x86_64", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.i386", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.x86_64", "3ES:htdig-2:3.1.6-7.el3.i386", "3ES:htdig-2:3.1.6-7.el3.ia64", "3ES:htdig-2:3.1.6-7.el3.ppc", "3ES:htdig-2:3.1.6-7.el3.s390", "3ES:htdig-2:3.1.6-7.el3.s390x", "3ES:htdig-2:3.1.6-7.el3.src", "3ES:htdig-2:3.1.6-7.el3.x86_64", "3ES:htdig-debuginfo-2:3.1.6-7.el3.i386", "3ES:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3ES:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3ES:htdig-debuginfo-2:3.1.6-7.el3.s390", "3ES:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3ES:htdig-debuginfo-2:3.1.6-7.el3.x86_64", "3WS:htdig-2:3.1.6-7.el3.i386", "3WS:htdig-2:3.1.6-7.el3.ia64", "3WS:htdig-2:3.1.6-7.el3.ppc", "3WS:htdig-2:3.1.6-7.el3.s390", "3WS:htdig-2:3.1.6-7.el3.s390x", "3WS:htdig-2:3.1.6-7.el3.src", "3WS:htdig-2:3.1.6-7.el3.x86_64", "3WS:htdig-debuginfo-2:3.1.6-7.el3.i386", "3WS:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3WS:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3WS:htdig-debuginfo-2:3.1.6-7.el3.s390", "3WS:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3WS:htdig-debuginfo-2:3.1.6-7.el3.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2007-06-11T00:00:00+00:00" ]
CVE-1999-1572
null
security flaw
Low
null
null
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
2005-11-01T00:00:00+00:00
1999-01-01T00:00:00+00:00
[ "3AS:cpio-0:2.5-3e.3.i386", "3AS:cpio-0:2.5-3e.3.ia64", "3AS:cpio-0:2.5-3e.3.ppc", "3AS:cpio-0:2.5-3e.3.s390", "3AS:cpio-0:2.5-3e.3.s390x", "3AS:cpio-0:2.5-3e.3.src", "3AS:cpio-0:2.5-3e.3.x86_64", "3AS:cpio-debuginfo-0:2.5-3e.3.i386", "3AS:cpio-debuginfo-0:2.5-3e.3.ia64", "3AS:cpio-debuginfo-0:2.5-3e.3.ppc", "3AS:cpio-debuginfo-0:2.5-3e.3.s390", "3AS:cpio-debuginfo-0:2.5-3e.3.s390x", "3AS:cpio-debuginfo-0:2.5-3e.3.x86_64", "3Desktop:cpio-0:2.5-3e.3.i386", "3Desktop:cpio-0:2.5-3e.3.ia64", "3Desktop:cpio-0:2.5-3e.3.ppc", "3Desktop:cpio-0:2.5-3e.3.s390", "3Desktop:cpio-0:2.5-3e.3.s390x", "3Desktop:cpio-0:2.5-3e.3.src", "3Desktop:cpio-0:2.5-3e.3.x86_64", "3Desktop:cpio-debuginfo-0:2.5-3e.3.i386", "3Desktop:cpio-debuginfo-0:2.5-3e.3.ia64", "3Desktop:cpio-debuginfo-0:2.5-3e.3.ppc", "3Desktop:cpio-debuginfo-0:2.5-3e.3.s390", "3Desktop:cpio-debuginfo-0:2.5-3e.3.s390x", "3Desktop:cpio-debuginfo-0:2.5-3e.3.x86_64", "3ES:cpio-0:2.5-3e.3.i386", "3ES:cpio-0:2.5-3e.3.ia64", "3ES:cpio-0:2.5-3e.3.ppc", "3ES:cpio-0:2.5-3e.3.s390", "3ES:cpio-0:2.5-3e.3.s390x", "3ES:cpio-0:2.5-3e.3.src", "3ES:cpio-0:2.5-3e.3.x86_64", "3ES:cpio-debuginfo-0:2.5-3e.3.i386", "3ES:cpio-debuginfo-0:2.5-3e.3.ia64", "3ES:cpio-debuginfo-0:2.5-3e.3.ppc", "3ES:cpio-debuginfo-0:2.5-3e.3.s390", "3ES:cpio-debuginfo-0:2.5-3e.3.s390x", "3ES:cpio-debuginfo-0:2.5-3e.3.x86_64", "3WS:cpio-0:2.5-3e.3.i386", "3WS:cpio-0:2.5-3e.3.ia64", "3WS:cpio-0:2.5-3e.3.ppc", "3WS:cpio-0:2.5-3e.3.s390", "3WS:cpio-0:2.5-3e.3.s390x", "3WS:cpio-0:2.5-3e.3.src", "3WS:cpio-0:2.5-3e.3.x86_64", "3WS:cpio-debuginfo-0:2.5-3e.3.i386", "3WS:cpio-debuginfo-0:2.5-3e.3.ia64", "3WS:cpio-debuginfo-0:2.5-3e.3.ppc", "3WS:cpio-debuginfo-0:2.5-3e.3.s390", "3WS:cpio-debuginfo-0:2.5-3e.3.s390x", "3WS:cpio-debuginfo-0:2.5-3e.3.x86_64", "4AS:cpio-0:2.5-7.EL4.1.i386", "4AS:cpio-0:2.5-7.EL4.1.ia64", "4AS:cpio-0:2.5-7.EL4.1.ppc", "4AS:cpio-0:2.5-7.EL4.1.s390", "4AS:cpio-0:2.5-7.EL4.1.s390x", "4AS:cpio-0:2.5-7.EL4.1.src", "4AS:cpio-0:2.5-7.EL4.1.x86_64", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.i386", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.ia64", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.ppc", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.s390", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.s390x", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.x86_64", "4Desktop:cpio-0:2.5-7.EL4.1.i386", "4Desktop:cpio-0:2.5-7.EL4.1.ia64", "4Desktop:cpio-0:2.5-7.EL4.1.ppc", "4Desktop:cpio-0:2.5-7.EL4.1.s390", "4Desktop:cpio-0:2.5-7.EL4.1.s390x", "4Desktop:cpio-0:2.5-7.EL4.1.src", "4Desktop:cpio-0:2.5-7.EL4.1.x86_64", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.i386", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.ia64", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.ppc", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.s390", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.s390x", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.x86_64", "4ES:cpio-0:2.5-7.EL4.1.i386", "4ES:cpio-0:2.5-7.EL4.1.ia64", "4ES:cpio-0:2.5-7.EL4.1.ppc", "4ES:cpio-0:2.5-7.EL4.1.s390", "4ES:cpio-0:2.5-7.EL4.1.s390x", "4ES:cpio-0:2.5-7.EL4.1.src", "4ES:cpio-0:2.5-7.EL4.1.x86_64", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.i386", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.ia64", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.ppc", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.s390", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.s390x", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.x86_64", "4WS:cpio-0:2.5-7.EL4.1.i386", "4WS:cpio-0:2.5-7.EL4.1.ia64", "4WS:cpio-0:2.5-7.EL4.1.ppc", "4WS:cpio-0:2.5-7.EL4.1.s390", "4WS:cpio-0:2.5-7.EL4.1.s390x", "4WS:cpio-0:2.5-7.EL4.1.src", "4WS:cpio-0:2.5-7.EL4.1.x86_64", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.i386", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.ia64", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.ppc", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.s390", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.s390x", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2005-02-18T15:28:00+00:00", "2005-02-15T10:13:00+00:00", "2005-11-10T19:01:00+00:00" ]
CVE-1999-0710
null
security flaw
Low
null
null
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
null
2005-04-26T00:00:00+00:00
1999-07-25T00:00:00+00:00
[ "3AS:squid-7:2.5.STABLE3-6.3E.13.i386", "3AS:squid-7:2.5.STABLE3-6.3E.13.ia64", "3AS:squid-7:2.5.STABLE3-6.3E.13.ppc", "3AS:squid-7:2.5.STABLE3-6.3E.13.s390", "3AS:squid-7:2.5.STABLE3-6.3E.13.s390x", "3AS:squid-7:2.5.STABLE3-6.3E.13.src", "3AS:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.i386", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.ia64", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.ppc", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390x", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.src", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "3ES:squid-7:2.5.STABLE3-6.3E.13.i386", "3ES:squid-7:2.5.STABLE3-6.3E.13.ia64", "3ES:squid-7:2.5.STABLE3-6.3E.13.ppc", "3ES:squid-7:2.5.STABLE3-6.3E.13.s390", "3ES:squid-7:2.5.STABLE3-6.3E.13.s390x", "3ES:squid-7:2.5.STABLE3-6.3E.13.src", "3ES:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "3WS:squid-7:2.5.STABLE3-6.3E.13.i386", "3WS:squid-7:2.5.STABLE3-6.3E.13.ia64", "3WS:squid-7:2.5.STABLE3-6.3E.13.ppc", "3WS:squid-7:2.5.STABLE3-6.3E.13.s390", "3WS:squid-7:2.5.STABLE3-6.3E.13.s390x", "3WS:squid-7:2.5.STABLE3-6.3E.13.src", "3WS:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "4AS:squid-7:2.5.STABLE6-3.4E.9.i386", "4AS:squid-7:2.5.STABLE6-3.4E.9.ia64", "4AS:squid-7:2.5.STABLE6-3.4E.9.ppc", "4AS:squid-7:2.5.STABLE6-3.4E.9.s390", "4AS:squid-7:2.5.STABLE6-3.4E.9.s390x", "4AS:squid-7:2.5.STABLE6-3.4E.9.src", "4AS:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.i386", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.ia64", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.ppc", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390x", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.src", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "4ES:squid-7:2.5.STABLE6-3.4E.9.i386", "4ES:squid-7:2.5.STABLE6-3.4E.9.ia64", "4ES:squid-7:2.5.STABLE6-3.4E.9.ppc", "4ES:squid-7:2.5.STABLE6-3.4E.9.s390", "4ES:squid-7:2.5.STABLE6-3.4E.9.s390x", "4ES:squid-7:2.5.STABLE6-3.4E.9.src", "4ES:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "4WS:squid-7:2.5.STABLE6-3.4E.9.i386", "4WS:squid-7:2.5.STABLE6-3.4E.9.ia64", "4WS:squid-7:2.5.STABLE6-3.4E.9.ppc", "4WS:squid-7:2.5.STABLE6-3.4E.9.s390", "4WS:squid-7:2.5.STABLE6-3.4E.9.s390x", "4WS:squid-7:2.5.STABLE6-3.4E.9.src", "4WS:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/" ]
[ "2005-06-14T19:40:00+00:00", "2005-06-13T12:08:00+00:00" ]
CVE-1999-0199
CWE-1053
glibc
manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
None
null
0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.
Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue. This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage.
2020-10-06T00:00:00+00:00
1999-11-09T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:glibc", "red_hat_enterprise_linux_6:glibc", "red_hat_enterprise_linux_7:glibc", "red_hat_enterprise_linux_8:glibc" ]
[]
[]
[]
[]
[]
[]
[]
CVE-1999-0428
CWE-384
openssl
allow remote attackers to reuse SSL sessions and bypass access controls
Moderate
null
6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
2020-10-13T00:00:00+00:00
1999-03-22T00:00:00+00:00
[]
[]
[ "red_hat_advanced_cluster_management_for_kubernetes_2:openssl", "red_hat_enterprise_linux_5:openssl", "red_hat_enterprise_linux_5:openssl097a", "red_hat_enterprise_linux_6:openssl", "red_hat_enterprise_linux_6:openssl098e", "red_hat_enterprise_linux_7:openssl", "red_hat_enterprise_linux_7:openssl098e", "red_hat_enterprise_linux_7:ovmf", "red_hat_enterprise_linux_8:compat-openssl10", "red_hat_enterprise_linux_8:mingw-openssl", "red_hat_enterprise_linux_8:openssl", "red_hat_jboss_core_services:jbcs-httpd24-openssl", "red_hat_jboss_core_services:openssl", "red_hat_jboss_enterprise_application_platform_5:openssl", "red_hat_jboss_enterprise_application_platform_6:openssl", "red_hat_jboss_enterprise_web_server_2:jbcs-httpd24-openssl", "red_hat_jboss_enterprise_web_server_2:openssl" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]