cve
stringlengths 13
16
| cwe
stringclasses 484
values | affected_component
stringlengths 0
177
| summary
stringlengths 0
227
| severity
stringclasses 5
values | cvss_v2
stringclasses 250
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 30
4k
| statement
stringlengths 1
3.47k
⌀ | discovery_date
stringdate 2001-01-05 00:00:00
2025-05-09 00:00:00
| release_date
stringdate 1999-01-01 00:00:00
2025-05-09 00:00:00
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
599
| known_not_affected_products
sequencelengths 0
30.2k
| under_investigation_products
sequencelengths 0
78
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
218
| remediation_details
sequencelengths 0
218
| remediation_dates
sequencelengths 0
218
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2002-1914 | null | security flaw | Low | null | null | dump 0.4 b10 through b29 allows local users to cause a denial of service (execution prevention) by using flock() to lock the /etc/dumpdates file. | null | 2002-07-17T00:00:00+00:00 | 2002-07-17T00:00:00+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2005-08-03T14:12:00+00:00"
] |
|
CVE-2002-2439 | CWE-190 | gcc | Integer overflow can occur during the computation of the memory region size for new[] operator | Moderate | 3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P | null | Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts. | null | 2012-08-31T00:00:00+00:00 | 2002-08-05T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_5:compat-gcc-295",
"red_hat_enterprise_linux_5:compat-gcc-296",
"red_hat_enterprise_linux_5:compat-gcc-32",
"red_hat_enterprise_linux_5:compat-gcc-34",
"red_hat_enterprise_linux_5:gcc",
"red_hat_enterprise_linux_5:gcc43",
"red_hat_enterprise_linux_5:gcc44",
"red_hat_enterprise_linux_6:compat-gcc-295",
"red_hat_enterprise_linux_6:compat-gcc-296",
"red_hat_enterprise_linux_6:compat-gcc-32",
"red_hat_enterprise_linux_6:compat-gcc-34",
"red_hat_enterprise_linux_6:gcc"
] | [
"red_hat_enterprise_linux_7:gcc"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned"
] | [
"Will not fix"
] | [
null
] |
CVE-2002-2443 | null | krb5 | UDP ping-pong flaw in kpasswd | Moderate | 5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P | null | schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103. | null | 2013-05-01T00:00:00+00:00 | 2002-06-16T00:00:00+00:00 | [
"5Server-5.9.Z:krb5-0:1.6.1-70.el5_9.2.src",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc64",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc64",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc64",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.x86_64",
"6Client-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258"
] | [
"2013-06-12T16:46:00+00:00"
] |
CVE-2002-0059 | CWE-416 | zlib | Double free in inflateEnd | Moderate | null | 6.9/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H | The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data. | null | 2002-03-09T00:00:00+00:00 | 2002-03-09T00:00:00+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [
"red_hat_enterprise_linux_6:zlib",
"red_hat_enterprise_linux_7:zlib",
"red_hat_enterprise_linux_8:zlib",
"red_hat_enterprise_linux_9:zlib",
"red_hat_jboss_enterprise_application_platform_6:zlib",
"red_hat_software_collections:rh-nodejs12-nodejs",
"red_hat_software_collections:rh-nodejs14-nodejs"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nThe procedure for upgrading the kernel is documented at:\n\n http://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-03-11T20:15:00+00:00",
"2002-03-11T18:09:00+00:00"
] |
CVE-2002-0389 | null | mailman | Local users able to read private mailing list archives | Low | 2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N | null | It was found that mailman stored private email messages in a world-readable directory. A local user could use this flaw to read private mailing list archives. | null | 2011-06-13T00:00:00+00:00 | 2002-01-01T00:00:00+00:00 | [
"6Server:mailman-3:2.1.12-25.el6.i686",
"6Server:mailman-3:2.1.12-25.el6.ppc64",
"6Server:mailman-3:2.1.12-25.el6.s390x",
"6Server:mailman-3:2.1.12-25.el6.src",
"6Server:mailman-3:2.1.12-25.el6.x86_64",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.i686",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.ppc64",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.s390x",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.x86_64",
"6Workstation:mailman-3:2.1.12-25.el6.i686",
"6Workstation:mailman-3:2.1.12-25.el6.ppc64",
"6Workstation:mailman-3:2.1.12-25.el6.s390x",
"6Workstation:mailman-3:2.1.12-25.el6.src",
"6Workstation:mailman-3:2.1.12-25.el6.x86_64",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.i686",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.ppc64",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.s390x",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.x86_64"
] | [
"red_hat_enterprise_linux_4:mailman",
"red_hat_enterprise_linux_5:mailman"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"no_fix_planned"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Will not fix"
] | [
"2015-07-20T14:06:40+00:00",
null
] |
CVE-2002-2215 | null | security flaw | Moderate | null | null | The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of "To" addresses, which triggers an error in the rfc822_write_address function. | null | 2002-09-07T00:00:00+00:00 | 2002-09-07T00:00:00+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2006-05-23T20:09:00+00:00"
] |
|
CVE-2002-2185 | null | security flaw | Moderate | null | null | The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network. | null | 2005-12-02T00:00:00+00:00 | 2002-06-25T00:00:00+00:00 | [
"3AS:kernel-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3AS:kernel-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3AS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3AS:kernel-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-0:2.4.21-37.0.1.EL.src",
"3AS:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.src",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3ES:kernel-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3ES:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3ES:kernel-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-0:2.4.21-37.0.1.EL.src",
"3ES:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3WS:kernel-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3WS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3WS:kernel-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-0:2.4.21-37.0.1.EL.src",
"3WS:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2006-01-19T16:03:00+00:00",
"2006-01-17T08:36:00+00:00",
"2006-02-01T17:48:00+00:00",
"2006-02-01T17:57:00+00:00"
] |
|
CVE-2002-2214 | null | security flaw | Moderate | null | null | The php_if_imap_mime_header_decode function in the IMAP functionality in PHP before 4.2.2 allows remote attackers to cause a denial of service (crash) via an e-mail header with a long "To" header. | null | 2006-05-31T00:00:00+00:00 | 2002-02-18T00:00:00+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2006-07-25T12:14:00+00:00"
] |
|
CVE-2001-1593 | CWE-367 | a2ps | insecure temporary file use | Low | 2.1/AV:L/AC:L/Au:N/C:N/I:P/A:N | null | The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file. | null | 2001-01-05T00:00:00+00:00 | 2001-01-05T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:a2ps",
"red_hat_enterprise_linux_6:a2ps",
"red_hat_enterprise_linux_7:a2ps"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2001-0131 | CWE-59 | httpd | allows local users to overwrite arbitrary files via a symlink attack | Low | null | 2.8/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N | A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity. | All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw | 2020-10-09T00:00:00+00:00 | 2001-01-10T00:00:00+00:00 | [] | [
"red_hat_jboss_enterprise_web_server_2:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd22"
] | [
"red_hat_enterprise_linux_5:httpd",
"red_hat_enterprise_linux_6:httpd",
"red_hat_enterprise_linux_7:httpd",
"red_hat_enterprise_linux_8:httpd:2.4/httpd",
"red_hat_jboss_core_services:httpd",
"red_hat_software_collections:httpd24-httpd"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned"
] | [
"Out of support scope"
] | [
null
] |
CVE-2001-1556 | CWE-532 | httpd | log files contain information directly supplied by clients and does not filter or quote control characters | Low | null | 3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N | The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep. | This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083. | 2020-10-14T00:00:00+00:00 | 2001-12-31T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:httpd",
"red_hat_enterprise_linux_6:httpd",
"red_hat_enterprise_linux_7:httpd",
"red_hat_enterprise_linux_8:httpd:2.4/httpd",
"red_hat_jboss_core_services:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd22",
"red_hat_software_collections:httpd24-httpd"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2001-0328 | null | kernel | TCP connection ISN hijacks | Low | 2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N | null | TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. | This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. | 2013-05-16T00:00:00+00:00 | 2001-05-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:kernel",
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_mrg_2:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2001-1494 | null | security flaw | Low | null | null | script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command. | null | 2005-06-21T00:00:00+00:00 | 2001-12-12T00:00:00+00:00 | [
"3AS:losetup-0:2.11y-31.11.i386",
"3AS:losetup-0:2.11y-31.11.ia64",
"3AS:losetup-0:2.11y-31.11.ppc",
"3AS:losetup-0:2.11y-31.11.s390",
"3AS:losetup-0:2.11y-31.11.s390x",
"3AS:losetup-0:2.11y-31.11.x86_64",
"3AS:mount-0:2.11y-31.11.i386",
"3AS:mount-0:2.11y-31.11.ia64",
"3AS:mount-0:2.11y-31.11.ppc",
"3AS:mount-0:2.11y-31.11.s390",
"3AS:mount-0:2.11y-31.11.s390x",
"3AS:mount-0:2.11y-31.11.x86_64",
"3AS:util-linux-0:2.11y-31.11.i386",
"3AS:util-linux-0:2.11y-31.11.ia64",
"3AS:util-linux-0:2.11y-31.11.ppc",
"3AS:util-linux-0:2.11y-31.11.s390",
"3AS:util-linux-0:2.11y-31.11.s390x",
"3AS:util-linux-0:2.11y-31.11.src",
"3AS:util-linux-0:2.11y-31.11.x86_64",
"3AS:util-linux-debuginfo-0:2.11y-31.11.i386",
"3AS:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3AS:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3AS:util-linux-debuginfo-0:2.11y-31.11.s390",
"3AS:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3AS:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3Desktop:losetup-0:2.11y-31.11.i386",
"3Desktop:losetup-0:2.11y-31.11.ia64",
"3Desktop:losetup-0:2.11y-31.11.ppc",
"3Desktop:losetup-0:2.11y-31.11.s390",
"3Desktop:losetup-0:2.11y-31.11.s390x",
"3Desktop:losetup-0:2.11y-31.11.x86_64",
"3Desktop:mount-0:2.11y-31.11.i386",
"3Desktop:mount-0:2.11y-31.11.ia64",
"3Desktop:mount-0:2.11y-31.11.ppc",
"3Desktop:mount-0:2.11y-31.11.s390",
"3Desktop:mount-0:2.11y-31.11.s390x",
"3Desktop:mount-0:2.11y-31.11.x86_64",
"3Desktop:util-linux-0:2.11y-31.11.i386",
"3Desktop:util-linux-0:2.11y-31.11.ia64",
"3Desktop:util-linux-0:2.11y-31.11.ppc",
"3Desktop:util-linux-0:2.11y-31.11.s390",
"3Desktop:util-linux-0:2.11y-31.11.s390x",
"3Desktop:util-linux-0:2.11y-31.11.src",
"3Desktop:util-linux-0:2.11y-31.11.x86_64",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.i386",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3ES:losetup-0:2.11y-31.11.i386",
"3ES:losetup-0:2.11y-31.11.ia64",
"3ES:losetup-0:2.11y-31.11.ppc",
"3ES:losetup-0:2.11y-31.11.s390",
"3ES:losetup-0:2.11y-31.11.s390x",
"3ES:losetup-0:2.11y-31.11.x86_64",
"3ES:mount-0:2.11y-31.11.i386",
"3ES:mount-0:2.11y-31.11.ia64",
"3ES:mount-0:2.11y-31.11.ppc",
"3ES:mount-0:2.11y-31.11.s390",
"3ES:mount-0:2.11y-31.11.s390x",
"3ES:mount-0:2.11y-31.11.x86_64",
"3ES:util-linux-0:2.11y-31.11.i386",
"3ES:util-linux-0:2.11y-31.11.ia64",
"3ES:util-linux-0:2.11y-31.11.ppc",
"3ES:util-linux-0:2.11y-31.11.s390",
"3ES:util-linux-0:2.11y-31.11.s390x",
"3ES:util-linux-0:2.11y-31.11.src",
"3ES:util-linux-0:2.11y-31.11.x86_64",
"3ES:util-linux-debuginfo-0:2.11y-31.11.i386",
"3ES:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3ES:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3ES:util-linux-debuginfo-0:2.11y-31.11.s390",
"3ES:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3ES:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3WS:losetup-0:2.11y-31.11.i386",
"3WS:losetup-0:2.11y-31.11.ia64",
"3WS:losetup-0:2.11y-31.11.ppc",
"3WS:losetup-0:2.11y-31.11.s390",
"3WS:losetup-0:2.11y-31.11.s390x",
"3WS:losetup-0:2.11y-31.11.x86_64",
"3WS:mount-0:2.11y-31.11.i386",
"3WS:mount-0:2.11y-31.11.ia64",
"3WS:mount-0:2.11y-31.11.ppc",
"3WS:mount-0:2.11y-31.11.s390",
"3WS:mount-0:2.11y-31.11.s390x",
"3WS:mount-0:2.11y-31.11.x86_64",
"3WS:util-linux-0:2.11y-31.11.i386",
"3WS:util-linux-0:2.11y-31.11.ia64",
"3WS:util-linux-0:2.11y-31.11.ppc",
"3WS:util-linux-0:2.11y-31.11.s390",
"3WS:util-linux-0:2.11y-31.11.s390x",
"3WS:util-linux-0:2.11y-31.11.src",
"3WS:util-linux-0:2.11y-31.11.x86_64",
"3WS:util-linux-debuginfo-0:2.11y-31.11.i386",
"3WS:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3WS:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3WS:util-linux-debuginfo-0:2.11y-31.11.s390",
"3WS:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3WS:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"4AS:util-linux-0:2.12a-16.EL4.12.i386",
"4AS:util-linux-0:2.12a-16.EL4.12.ia64",
"4AS:util-linux-0:2.12a-16.EL4.12.ppc",
"4AS:util-linux-0:2.12a-16.EL4.12.s390",
"4AS:util-linux-0:2.12a-16.EL4.12.s390x",
"4AS:util-linux-0:2.12a-16.EL4.12.src",
"4AS:util-linux-0:2.12a-16.EL4.12.x86_64",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4Desktop:util-linux-0:2.12a-16.EL4.12.i386",
"4Desktop:util-linux-0:2.12a-16.EL4.12.ia64",
"4Desktop:util-linux-0:2.12a-16.EL4.12.ppc",
"4Desktop:util-linux-0:2.12a-16.EL4.12.s390",
"4Desktop:util-linux-0:2.12a-16.EL4.12.s390x",
"4Desktop:util-linux-0:2.12a-16.EL4.12.src",
"4Desktop:util-linux-0:2.12a-16.EL4.12.x86_64",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4ES:util-linux-0:2.12a-16.EL4.12.i386",
"4ES:util-linux-0:2.12a-16.EL4.12.ia64",
"4ES:util-linux-0:2.12a-16.EL4.12.ppc",
"4ES:util-linux-0:2.12a-16.EL4.12.s390",
"4ES:util-linux-0:2.12a-16.EL4.12.s390x",
"4ES:util-linux-0:2.12a-16.EL4.12.src",
"4ES:util-linux-0:2.12a-16.EL4.12.x86_64",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4WS:util-linux-0:2.12a-16.EL4.12.i386",
"4WS:util-linux-0:2.12a-16.EL4.12.ia64",
"4WS:util-linux-0:2.12a-16.EL4.12.ppc",
"4WS:util-linux-0:2.12a-16.EL4.12.s390",
"4WS:util-linux-0:2.12a-16.EL4.12.s390x",
"4WS:util-linux-0:2.12a-16.EL4.12.src",
"4WS:util-linux-0:2.12a-16.EL4.12.x86_64",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2005-10-11T15:49:00+00:00"
] |
|
CVE-2000-1254 | null | openssl | Mishandling C bitwise-shift operations making easier to bypass protection mechanisms | Moderate | 4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N | null | crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms. | null | 2016-05-04T00:00:00+00:00 | 2000-06-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:openssl",
"red_hat_enterprise_linux_5:openssl097a",
"red_hat_enterprise_linux_6:openssl",
"red_hat_enterprise_linux_6:openssl098e",
"red_hat_enterprise_linux_7:openssl",
"red_hat_enterprise_linux_7:openssl098e",
"red_hat_jboss_enterprise_application_platform_6:openssl",
"red_hat_jboss_enterprise_web_server_1:openssl",
"red_hat_jboss_enterprise_web_server_2:openssl",
"red_hat_jboss_enterprise_web_server_3:openssl"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2000-1191 | null | security flaw | Low | null | null | htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path. | null | 2006-12-06T00:00:00+00:00 | 2000-04-18T00:00:00+00:00 | [
"3AS:htdig-2:3.1.6-7.el3.i386",
"3AS:htdig-2:3.1.6-7.el3.ia64",
"3AS:htdig-2:3.1.6-7.el3.ppc",
"3AS:htdig-2:3.1.6-7.el3.s390",
"3AS:htdig-2:3.1.6-7.el3.s390x",
"3AS:htdig-2:3.1.6-7.el3.src",
"3AS:htdig-2:3.1.6-7.el3.x86_64",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.x86_64",
"3Desktop:htdig-2:3.1.6-7.el3.i386",
"3Desktop:htdig-2:3.1.6-7.el3.ia64",
"3Desktop:htdig-2:3.1.6-7.el3.ppc",
"3Desktop:htdig-2:3.1.6-7.el3.s390",
"3Desktop:htdig-2:3.1.6-7.el3.s390x",
"3Desktop:htdig-2:3.1.6-7.el3.src",
"3Desktop:htdig-2:3.1.6-7.el3.x86_64",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.x86_64",
"3ES:htdig-2:3.1.6-7.el3.i386",
"3ES:htdig-2:3.1.6-7.el3.ia64",
"3ES:htdig-2:3.1.6-7.el3.ppc",
"3ES:htdig-2:3.1.6-7.el3.s390",
"3ES:htdig-2:3.1.6-7.el3.s390x",
"3ES:htdig-2:3.1.6-7.el3.src",
"3ES:htdig-2:3.1.6-7.el3.x86_64",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.x86_64",
"3WS:htdig-2:3.1.6-7.el3.i386",
"3WS:htdig-2:3.1.6-7.el3.ia64",
"3WS:htdig-2:3.1.6-7.el3.ppc",
"3WS:htdig-2:3.1.6-7.el3.s390",
"3WS:htdig-2:3.1.6-7.el3.s390x",
"3WS:htdig-2:3.1.6-7.el3.src",
"3WS:htdig-2:3.1.6-7.el3.x86_64",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2007-06-11T00:00:00+00:00"
] |
|
CVE-1999-1572 | null | security flaw | Low | null | null | cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files. | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. | 2005-11-01T00:00:00+00:00 | 1999-01-01T00:00:00+00:00 | [
"3AS:cpio-0:2.5-3e.3.i386",
"3AS:cpio-0:2.5-3e.3.ia64",
"3AS:cpio-0:2.5-3e.3.ppc",
"3AS:cpio-0:2.5-3e.3.s390",
"3AS:cpio-0:2.5-3e.3.s390x",
"3AS:cpio-0:2.5-3e.3.src",
"3AS:cpio-0:2.5-3e.3.x86_64",
"3AS:cpio-debuginfo-0:2.5-3e.3.i386",
"3AS:cpio-debuginfo-0:2.5-3e.3.ia64",
"3AS:cpio-debuginfo-0:2.5-3e.3.ppc",
"3AS:cpio-debuginfo-0:2.5-3e.3.s390",
"3AS:cpio-debuginfo-0:2.5-3e.3.s390x",
"3AS:cpio-debuginfo-0:2.5-3e.3.x86_64",
"3Desktop:cpio-0:2.5-3e.3.i386",
"3Desktop:cpio-0:2.5-3e.3.ia64",
"3Desktop:cpio-0:2.5-3e.3.ppc",
"3Desktop:cpio-0:2.5-3e.3.s390",
"3Desktop:cpio-0:2.5-3e.3.s390x",
"3Desktop:cpio-0:2.5-3e.3.src",
"3Desktop:cpio-0:2.5-3e.3.x86_64",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.i386",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.ia64",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.ppc",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.s390",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.s390x",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.x86_64",
"3ES:cpio-0:2.5-3e.3.i386",
"3ES:cpio-0:2.5-3e.3.ia64",
"3ES:cpio-0:2.5-3e.3.ppc",
"3ES:cpio-0:2.5-3e.3.s390",
"3ES:cpio-0:2.5-3e.3.s390x",
"3ES:cpio-0:2.5-3e.3.src",
"3ES:cpio-0:2.5-3e.3.x86_64",
"3ES:cpio-debuginfo-0:2.5-3e.3.i386",
"3ES:cpio-debuginfo-0:2.5-3e.3.ia64",
"3ES:cpio-debuginfo-0:2.5-3e.3.ppc",
"3ES:cpio-debuginfo-0:2.5-3e.3.s390",
"3ES:cpio-debuginfo-0:2.5-3e.3.s390x",
"3ES:cpio-debuginfo-0:2.5-3e.3.x86_64",
"3WS:cpio-0:2.5-3e.3.i386",
"3WS:cpio-0:2.5-3e.3.ia64",
"3WS:cpio-0:2.5-3e.3.ppc",
"3WS:cpio-0:2.5-3e.3.s390",
"3WS:cpio-0:2.5-3e.3.s390x",
"3WS:cpio-0:2.5-3e.3.src",
"3WS:cpio-0:2.5-3e.3.x86_64",
"3WS:cpio-debuginfo-0:2.5-3e.3.i386",
"3WS:cpio-debuginfo-0:2.5-3e.3.ia64",
"3WS:cpio-debuginfo-0:2.5-3e.3.ppc",
"3WS:cpio-debuginfo-0:2.5-3e.3.s390",
"3WS:cpio-debuginfo-0:2.5-3e.3.s390x",
"3WS:cpio-debuginfo-0:2.5-3e.3.x86_64",
"4AS:cpio-0:2.5-7.EL4.1.i386",
"4AS:cpio-0:2.5-7.EL4.1.ia64",
"4AS:cpio-0:2.5-7.EL4.1.ppc",
"4AS:cpio-0:2.5-7.EL4.1.s390",
"4AS:cpio-0:2.5-7.EL4.1.s390x",
"4AS:cpio-0:2.5-7.EL4.1.src",
"4AS:cpio-0:2.5-7.EL4.1.x86_64",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.i386",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.ia64",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.ppc",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.s390",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.s390x",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.x86_64",
"4Desktop:cpio-0:2.5-7.EL4.1.i386",
"4Desktop:cpio-0:2.5-7.EL4.1.ia64",
"4Desktop:cpio-0:2.5-7.EL4.1.ppc",
"4Desktop:cpio-0:2.5-7.EL4.1.s390",
"4Desktop:cpio-0:2.5-7.EL4.1.s390x",
"4Desktop:cpio-0:2.5-7.EL4.1.src",
"4Desktop:cpio-0:2.5-7.EL4.1.x86_64",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.i386",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.ia64",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.ppc",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.s390",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.s390x",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.x86_64",
"4ES:cpio-0:2.5-7.EL4.1.i386",
"4ES:cpio-0:2.5-7.EL4.1.ia64",
"4ES:cpio-0:2.5-7.EL4.1.ppc",
"4ES:cpio-0:2.5-7.EL4.1.s390",
"4ES:cpio-0:2.5-7.EL4.1.s390x",
"4ES:cpio-0:2.5-7.EL4.1.src",
"4ES:cpio-0:2.5-7.EL4.1.x86_64",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.i386",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.ia64",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.ppc",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.s390",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.s390x",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.x86_64",
"4WS:cpio-0:2.5-7.EL4.1.i386",
"4WS:cpio-0:2.5-7.EL4.1.ia64",
"4WS:cpio-0:2.5-7.EL4.1.ppc",
"4WS:cpio-0:2.5-7.EL4.1.s390",
"4WS:cpio-0:2.5-7.EL4.1.s390x",
"4WS:cpio-0:2.5-7.EL4.1.src",
"4WS:cpio-0:2.5-7.EL4.1.x86_64",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.i386",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.ia64",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.ppc",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.s390",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.s390x",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2005-02-18T15:28:00+00:00",
"2005-02-15T10:13:00+00:00",
"2005-11-10T19:01:00+00:00"
] |
|
CVE-1999-0710 | null | security flaw | Low | null | null | The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems. | null | 2005-04-26T00:00:00+00:00 | 1999-07-25T00:00:00+00:00 | [
"3AS:squid-7:2.5.STABLE3-6.3E.13.i386",
"3AS:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3AS:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3AS:squid-7:2.5.STABLE3-6.3E.13.s390",
"3AS:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3AS:squid-7:2.5.STABLE3-6.3E.13.src",
"3AS:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.i386",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.src",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"3ES:squid-7:2.5.STABLE3-6.3E.13.i386",
"3ES:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3ES:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3ES:squid-7:2.5.STABLE3-6.3E.13.s390",
"3ES:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3ES:squid-7:2.5.STABLE3-6.3E.13.src",
"3ES:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"3WS:squid-7:2.5.STABLE3-6.3E.13.i386",
"3WS:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3WS:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3WS:squid-7:2.5.STABLE3-6.3E.13.s390",
"3WS:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3WS:squid-7:2.5.STABLE3-6.3E.13.src",
"3WS:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"4AS:squid-7:2.5.STABLE6-3.4E.9.i386",
"4AS:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4AS:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4AS:squid-7:2.5.STABLE6-3.4E.9.s390",
"4AS:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4AS:squid-7:2.5.STABLE6-3.4E.9.src",
"4AS:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.i386",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.src",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"4ES:squid-7:2.5.STABLE6-3.4E.9.i386",
"4ES:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4ES:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4ES:squid-7:2.5.STABLE6-3.4E.9.s390",
"4ES:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4ES:squid-7:2.5.STABLE6-3.4E.9.src",
"4ES:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"4WS:squid-7:2.5.STABLE6-3.4E.9.i386",
"4WS:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4WS:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4WS:squid-7:2.5.STABLE6-3.4E.9.s390",
"4WS:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4WS:squid-7:2.5.STABLE6-3.4E.9.src",
"4WS:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] | [
"2005-06-14T19:40:00+00:00",
"2005-06-13T12:08:00+00:00"
] |
|
CVE-1999-0199 | CWE-1053 | glibc | manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root | None | null | 0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N | manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999. | Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue.
This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage. | 2020-10-06T00:00:00+00:00 | 1999-11-09T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:glibc",
"red_hat_enterprise_linux_6:glibc",
"red_hat_enterprise_linux_7:glibc",
"red_hat_enterprise_linux_8:glibc"
] | [] | [] | [] | [] | [] | [] | [] |
CVE-1999-0428 | CWE-384 | openssl | allow remote attackers to reuse SSL sessions and bypass access controls | Moderate | null | 6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls. | OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. | 2020-10-13T00:00:00+00:00 | 1999-03-22T00:00:00+00:00 | [] | [] | [
"red_hat_advanced_cluster_management_for_kubernetes_2:openssl",
"red_hat_enterprise_linux_5:openssl",
"red_hat_enterprise_linux_5:openssl097a",
"red_hat_enterprise_linux_6:openssl",
"red_hat_enterprise_linux_6:openssl098e",
"red_hat_enterprise_linux_7:openssl",
"red_hat_enterprise_linux_7:openssl098e",
"red_hat_enterprise_linux_7:ovmf",
"red_hat_enterprise_linux_8:compat-openssl10",
"red_hat_enterprise_linux_8:mingw-openssl",
"red_hat_enterprise_linux_8:openssl",
"red_hat_jboss_core_services:jbcs-httpd24-openssl",
"red_hat_jboss_core_services:openssl",
"red_hat_jboss_enterprise_application_platform_5:openssl",
"red_hat_jboss_enterprise_application_platform_6:openssl",
"red_hat_jboss_enterprise_web_server_2:jbcs-httpd24-openssl",
"red_hat_jboss_enterprise_web_server_2:openssl"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.