cve
stringlengths 13
16
| affected_component
stringlengths 0
177
| summary
stringlengths 0
227
| severity
stringclasses 5
values | cvss_v2
stringclasses 244
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 30
4k
| statement
stringlengths 31
2.49k
⌀ | release_date
stringlengths 25
25
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
597
| known_not_affected_products
sequencelengths 0
30k
| under_investigation_products
sequencelengths 0
77
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
215
| remediation_details
sequencelengths 0
215
| remediation_dates
sequencelengths 0
215
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2001-1413 | security flaw | Moderate | null | null | Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument. | null | 2025-01-08T20:26:54+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] | [
"2004-12-13T19:31:00+00:00"
] |
|
CVE-2001-1556 | httpd | log files contain information directly supplied by clients and does not filter or quote control characters | Low | null | 3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N | The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep. | This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083. | 2025-01-09T05:24:08+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:httpd",
"red_hat_enterprise_linux_6:httpd",
"red_hat_enterprise_linux_7:httpd",
"red_hat_enterprise_linux_8:httpd:2.4/httpd",
"red_hat_jboss_core_services:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd22",
"red_hat_software_collections:httpd24-httpd"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2001-1385 | security flaw | None | null | null | The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts. | null | 2025-01-08T20:25:22+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Because of dependencies, the packages must be installed as a group. No\nupdate for the mod_php package is provided for Red Hat Linux 7; it has been\nmerged into the updated php package.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Fvh php*\n\nThen restart your web server:\n\n/etc/rc.d/init.d/httpd restart"
] | [
"2000-12-20T00:00:00+00:00"
] |
|
CVE-2001-0890 | security flaw | None | null | null | Certain backend drivers in the SANE library 1.0.3 and earlier, as used in frontend software such as XSane, allows local users to modify files via a symlink attack on temporary files. | null | 2025-01-08T20:27:42+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.0",
"Red Hat Powertools 6.1",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-08T12:49:00+00:00",
"2002-01-08T12:48:00+00:00"
] |
|
CVE-2001-1002 | security flaw | None | null | null | The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands. | null | 2025-01-08T20:23:31+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.0j",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find RHN to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will ultimately upgrade the\nappropriate RPMs on your system."
] | [
"2001-10-30T11:23:00+00:00"
] |
|
CVE-2001-1147 | security flaw | Important | null | null | The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits. | null | 2025-01-08T20:24:07+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-16T19:15:00+00:00"
] |
|
CVE-2001-0886 | security flaw | None | null | null | Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character. | null | 2025-01-08T20:24:26+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-12-14T21:36:00+00:00"
] |
|
CVE-2001-0869 | security flaw | None | null | null | Format string vulnerability in the default logging callback function _sasl_syslog in common.c in Cyrus SASL library (cyrus-sasl) may allow remote attackers to execute arbitrary commands. | null | 2025-01-08T20:27:54+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-29T18:51:00+00:00",
"2001-11-29T18:55:00+00:00"
] |
|
CVE-2001-1405 | security flaw | None | null | null | Bugzilla before 2.14 does not restrict access to sanitycheck.cgi, which allows local users to cause a denial of service (CPU consumption) via a flood of requests to sanitycheck.cgi. | null | 2025-01-08T20:25:46+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-1393 | security flaw | None | null | null | Unknown vulnerability in classifier code for Linux kernel before 2.2.19 could result in denial of service (hang). | null | 2025-01-08T20:26:18+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1392 | security flaw | None | null | null | The Linux kernel before 2.2.19 does not have unregister calls for (1) CPUID and (2) MSR drivers, which could cause a DoS (crash) by unloading and reloading the drivers. | null | 2025-01-08T20:23:20+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1404 | security flaw | None | null | null | Bugzilla before 2.14 stores user passwords in plaintext and sends password requests in an email message, which could allow attackers to gain privileges. | null | 2025-01-08T20:28:42+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-0887 | security flaw | None | null | null | xSANE 0.81 and earlier allows local users to modify files of other xSANE users via a symlink attack on temporary files. | null | 2025-01-08T20:24:04+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.0",
"Red Hat Powertools 6.1",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-08T12:49:00+00:00",
"2002-01-08T12:48:00+00:00"
] |
|
CVE-2001-1279 | security flaw | None | null | null | Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026. | null | 2025-01-08T20:26:08+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-09T18:30:00+00:00"
] |
|
CVE-2001-1384 | security flaw | Important | null | null | ptrace in Linux 2.2.x through 2.2.19, and 2.4.x through 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp. | null | 2025-01-08T20:28:42+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2001-10-18T22:31:00+00:00",
"2001-10-23T07:44:00+00:00"
] |
|
CVE-2001-0653 | security flaw | None | null | null | Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number. | null | 2025-01-08T20:29:28+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-13T20:25:00+00:00"
] |
|
CVE-2001-0852 | security flaw | Important | null | null | TUX HTTP server 2.1.0-2 in Red Hat Linux allows remote attackers to cause a denial of service via a long Host: header. | null | 2025-01-08T20:33:40+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2001-11-02T20:08:00+00:00"
] |
|
CVE-2001-0556 | security flaw | None | null | null | The Nirvana Editor (NEdit) 5.1.1 and earlier allows a local attacker to overwrite other users' files via a symlink attack on (1) backup files or (2) temporary files used when nedit prints a file or portions of a file. | null | 2025-01-08T20:31:46+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-08T14:04:00+00:00"
] |
|
CVE-2001-0690 | security flaw | None | null | null | Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers. | null | 2025-01-08T20:31:00+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-26T19:22:00+00:00"
] |
|
CVE-2001-1351 | security flaw | None | null | null | Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers. | null | 2025-01-08T20:24:54+00:00 | [
"Red Hat Linux 7.0j"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-07-09T12:40:00+00:00"
] |
|
CVE-2001-0405 | security flaw | Important | null | null | ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall. | null | 2025-01-08T20:33:38+00:00 | [
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-22T21:12:00+00:00"
] |
|
CVE-2001-0560 | security flaw | None | null | null | Buffer overflow in Vixie cron 3.0.1-56 and earlier could allow a local attacker to gain additional privileges via a long username (> 20 characters). | null | 2025-01-08T20:33:14+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-12T00:00:00+00:00"
] |
|
CVE-2001-1275 | security flaw | None | null | null | MySQL before 3.23.31 allows users with a MySQL account to use the SHOW GRANTS command to obtain the encrypted administrator password from the mysql.user table and possibly gain privileges via password cracking. | null | 2025-01-08T20:25:00+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Because of dependencies, the packages must be installed as a group.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Uvh mysql*\n\nNote that in rare cases, the shutdown of the old database fails after\nupgrade - to ensure a smooth upgrade, shut the database down before\nupgrading:\n\nservice mysqld stop"
] | [
"2001-01-18T00:00:00+00:00"
] |
|
CVE-2001-0872 | security flaw | None | null | null | OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges. | null | 2025-01-08T20:24:14+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-12-05T01:13:00+00:00"
] |
|
CVE-2001-1388 | security flaw | None | null | null | iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator. | null | 2025-01-08T20:28:23+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-07T14:10:00+00:00"
] |
|
CVE-2001-0825 | security flaw | None | null | null | Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check. | null | 2025-01-08T20:30:36+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-06T19:13:00+00:00"
] |
|
CVE-2001-0736 | security flaw | None | null | null | Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack. | null | 2025-01-08T20:30:14+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-31T00:00:00+00:00"
] |
|
CVE-2001-1333 | security flaw | None | null | null | Linux CUPS before 1.1.6 does not securely handle temporary files, possibly due to a symlink vulnerability that could allow local users to overwrite files. | null | 2025-01-08T20:28:48+00:00 | [
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Uvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-03-15T12:36:00+00:00"
] |
|
CVE-2001-0522 | security flaw | None | null | null | Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an attacker to gain privileges via format strings in the original filename that is stored in an encrypted file. | null | 2025-01-08T20:32:52+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-07T19:53:00+00:00"
] |
|
CVE-2001-1276 | security flaw | None | null | null | ispell before 3.1.20 allows local users to overwrite files of other users via a symlink attack on a temporary file. | null | 2025-01-08T20:26:04+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-10T22:27:00+00:00"
] |
|
CVE-2001-0060 | security flaw | None | null | null | Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username. | null | 2025-01-08T20:30:04+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-19T00:00:00+00:00"
] |
|
CVE-2001-0670 | security flaw | None | null | null | Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue. | null | 2025-01-08T20:29:20+00:00 | [
"Red Hat Linux 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-02T20:48:00+00:00"
] |
|
CVE-2001-1391 | security flaw | None | null | null | Off-by-one vulnerability in CPIA driver of Linux kernel before 2.2.19 allows users to modify kernel memory. | null | 2025-01-08T20:24:03+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1407 | security flaw | None | null | null | Bugzilla before 2.14 allows Bugzilla users to bypass group security checks by marking a bug as the duplicate of a restricted bug, which adds the user to the CC list of the restricted bug and allows the user to view the bug. | null | 2025-01-08T20:26:51+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-0884 | security flaw | None | null | null | Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users. | null | 2025-01-08T20:24:43+00:00 | [
"Red Hat Linux 7.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1",
"Red Hat Secure Web Server 3.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe] desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-12-21T14:06:00+00:00",
"2001-12-21T14:10:00+00:00",
"2002-01-02T15:23:00+00:00"
] |
|
CVE-2001-0191 | security flaw | None | null | null | gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length. | null | 2025-01-08T20:33:22+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-02T00:00:00+00:00",
"2001-02-02T00:00:00+00:00"
] |
|
CVE-2001-0596 | security flaw | None | null | null | Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript. | null | 2025-01-08T20:30:28+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-04-09T00:00:00+00:00"
] |
|
CVE-2001-1387 | security flaw | None | null | null | iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak. | null | 2025-01-08T20:29:06+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-07T14:10:00+00:00"
] |
|
CVE-2001-0851 | security flaw | Important | null | null | Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie. | null | 2025-01-08T20:32:54+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2001-11-02T20:08:00+00:00"
] |
|
CVE-2001-0406 | security flaw | None | null | null | Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient. | null | 2025-01-08T20:30:50+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAgain, note that the packages for Red Hat Linux 6.2 requre an updated\nlogrotate package."
] | [
"2001-05-15T02:21:00+00:00"
] |
|
CVE-2001-1352 | security flaw | None | null | null | Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter. | null | 2025-01-08T20:28:18+00:00 | [
"Red Hat Linux 7.0j"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-07-09T12:40:00+00:00"
] |
|
CVE-2001-0328 | kernel | TCP connection ISN hijacks | Low | 2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N | null | TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. | This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. | 2025-01-08T05:24:01+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:kernel",
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_mrg_2:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2001-1353 | security flaw | None | null | null | ghostscript before 6.51 allows local users to read and write arbitrary files as the 'lp' user via the file operator, even with -dSAFER enabled. | null | 2025-01-08T20:27:04+00:00 | [
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nAfter updating the rpms, you will need to restart your print server, by\nrunning:\n\n/sbin/service lpd restart\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-31T22:59:00+00:00"
] |
|
CVE-2001-1083 | security flaw | None | null | null | Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash). | null | 2025-01-08T20:24:38+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-25T22:08:00+00:00"
] |
|
CVE-2001-0554 | security flaw | Critical | null | null | Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. | null | 2025-01-08T20:31:18+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-08-09T22:14:00+00:00"
] |
|
CVE-2001-0128 | security flaw | None | null | null | Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. | null | 2025-01-08T20:32:31+00:00 | [
"Red Hat Powertools 6.1",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM.\n\nAfter you have applied the update, restart Zope."
] | [
"2000-12-18T00:00:00+00:00"
] |
|
CVE-2001-0169 | security flaw | None | null | null | When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib. | null | 2025-01-08T20:29:28+00:00 | [
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2001-01-15T00:00:00+00:00"
] |
|
CVE-2001-1406 | security flaw | None | null | null | process_bug.cgi in Bugzilla before 2.14 does not set the "groupset" bit when a bug is moved between product groups, which will cause the bug to have the old group's restrictions, which might not be as stringent. | null | 2025-01-08T20:25:46+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-1390 | security flaw | None | null | null | Unknown vulnerability in binfmt_misc in the Linux kernel before 2.2.19, related to user pages. | null | 2025-01-08T20:23:26+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-0775 | security flaw | Important | null | null | Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field. | null | 2025-01-08T20:32:32+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-09T23:39:00+00:00"
] |
|
CVE-2001-1349 | security flaw | None | null | null | Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers. | null | 2025-01-08T20:27:10+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-13T20:25:00+00:00"
] |
|
CVE-2001-0108 | security flaw | None | null | null | PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested. | null | 2025-01-08T20:29:42+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Because of dependencies, the packages must be installed as a group. No\nupdate for the mod_php package is provided for Red Hat Linux 7; it has been\nmerged into the updated php package.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Fvh php*\n\nThen restart your web server:\n\n/etc/rc.d/init.d/httpd restart"
] | [
"2000-12-20T00:00:00+00:00"
] |
|
CVE-2001-0763 | security flaw | None | null | null | Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function. | null | 2025-01-08T20:32:10+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-07T23:14:00+00:00"
] |
|
CVE-2001-1332 | security flaw | None | null | null | Buffer overflows in Linux CUPS before 1.1.6 may allow remote attackers to execute arbitrary code. | null | 2025-01-08T20:24:54+00:00 | [
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Uvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-03-15T12:36:00+00:00"
] |
|
CVE-2001-0489 | security flaw | None | null | null | Format string vulnerability in gftp prior to 2.0.8 allows remote malicious FTP servers to execute arbitrary commands. | null | 2025-01-08T20:32:32+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-04-25T23:27:00+00:00"
] |
|
CVE-2001-0036 | security flaw | None | null | null | KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file. | null | 2025-01-08T20:31:47+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-08T00:00:00+00:00"
] |
|
CVE-2001-0889 | security flaw | None | null | null | Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters. | null | 2025-01-08T20:23:02+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-08T11:44:00+00:00"
] |
|
CVE-2001-0309 | security flaw | None | null | null | inetd in Red Hat 6.2 does not properly close sockets for internal services such as chargen, daytime, echo, etc., which allows remote attackers to cause a denial of service via a series of connections to the internal services. | null | 2025-01-08T20:31:24+00:00 | [
"Red Hat Linux 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-01-29T00:00:00+00:00"
] |
|
CVE-2001-1378 | security flaw | None | null | null | fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files. | null | 2025-01-08T20:25:06+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T15:46:00+00:00"
] |
|
CVE-2001-0569 | security flaw | None | null | null | Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet. | null | 2025-01-08T20:31:46+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"*NOTE* This advisory supercedes all other Zope and Zope-Hotfix advisories \nfrom Red Hat, Inc.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-24T00:00:00+00:00"
] |
|
CVE-2001-1397 | security flaw | None | null | null | The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory. | null | 2025-01-08T20:28:06+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1401 | security flaw | None | null | null | Bugzilla before 2.14 does not properly restrict access to confidential bugs, which could allow Bugzilla users to bypass viewing permissions via modified bug id parameters in (1) process_bug.cgi, (2) show_activity.cgi, (3) showvotes.cgi, (4) showdependencytree.cgi, (5) showdependencygraph.cgi, (6) showattachment.cgi, or (7) describecomponents.cgi. | null | 2025-01-08T20:26:47+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-0197 | security flaw | None | null | null | Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands. | null | 2025-01-08T20:31:42+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2001-01-23T00:00:00+00:00"
] |
|
CVE-2001-0894 | security flaw | None | null | null | Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large. | null | 2025-01-08T20:26:08+00:00 | [
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-27T23:32:00+00:00"
] |
|
CVE-2001-0441 | security flaw | None | null | null | Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header. | null | 2025-01-08T20:32:28+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-09T00:00:00+00:00"
] |
|
CVE-2001-0011 | security flaw | None | null | null | Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges. | null | 2025-01-08T20:30:36+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-01-29T00:00:00+00:00"
] |
|
CVE-2001-0787 | security flaw | Important | null | null | LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges. | null | 2025-01-08T20:32:56+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-12T20:23:00+00:00"
] |
|
CVE-2001-0416 | security flaw | None | null | null | sgml-tools (aka sgmltools) before 1.0.9-15 creates temporary files with insecure permissions, which allows other users to read files that are being processed by sgml-tools. | null | 2025-01-08T20:32:07+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-09T00:00:00+00:00"
] |
|
CVE-2001-0816 | security flaw | None | null | null | OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands. | null | 2025-01-08T20:31:16+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-30T17:09:00+00:00"
] |
|
CVE-2001-1246 | security flaw | Important | null | null | PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters. | null | 2025-01-08T20:25:56+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Please Note:\n\nThe /etc/php.ini configuration file is not replaced or\noverwritten. You should carefully review your configuration file and adapt\nit to your server or service functions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Please note that the /etc/php.ini configuration file is not replaced or\noverwritten. You should carefully review your configuration file and adapt\nit to your server or service functions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-06-26T00:00:00+00:00",
"2002-08-20T15:16:00+00:00"
] |
|
CVE-2001-1374 | security flaw | None | null | null | expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd. | null | 2025-01-08T20:26:30+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-12T19:38:00+00:00"
] |
|
CVE-2001-1323 | security flaw | Critical | null | null | Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function. | null | 2025-01-08T20:23:50+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-17T01:32:00+00:00"
] |
|
CVE-2001-0066 | security flaw | None | null | null | Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer. | null | 2025-01-08T20:29:28+00:00 | [
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-19T00:00:00+00:00"
] |
|
CVE-2001-1227 | security flaw | Moderate | null | null | Zope before 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags. | null | 2025-01-08T20:25:17+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter you have updated the packages, you must restart zope:\n\n /etc/rc.d/init.d/zope restart"
] | [
"2001-09-18T08:22:00+00:00",
"2001-10-10T22:16:00+00:00"
] |
|
CVE-2001-1030 | security flaw | None | null | null | Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. | null | 2025-01-08T20:23:50+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-19T20:30:00+00:00"
] |
|
CVE-2001-1175 | security flaw | Moderate | null | null | vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing. | null | 2025-01-08T20:23:42+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAlso note that users of vipw may want to run (as root):\n\nchmod 0400 /etc/shadow\n\nto ensure that the file has the correct permissions.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-16T16:51:00+00:00",
"2001-10-16T19:15:00+00:00"
] |
|
CVE-2001-1572 | security flaw | Moderate | null | null | The MAC module in Netfilter in Linux kernel 2.4.1 through 2.4.11, when configured to filter based on MAC addresses, allows remote attackers to bypass packet filters via small packets. | null | 2025-01-08T20:26:26+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2003-06-19T13:55:00+00:00"
] |
|
CVE-2001-1162 | security flaw | None | null | null | Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file. | null | 2025-01-08T20:28:56+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-26T19:00:00+00:00"
] |
|
CVE-2001-0289 | security flaw | None | null | null | Joe text editor 2.8 searches the current working directory (CWD) for the .joerc configuration file, which could allow local users to gain privileges of other users by placing a Trojan Horse .joerc file into a directory, then waiting for users to execute joe from that directory. | null | 2025-01-08T20:30:13+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-28T00:00:00+00:00"
] |
|
CVE-2001-1174 | security flaw | None | null | null | Buffer overflow in Elm 2.5.5 and earlier allows remote attackers to execute arbitrary code via a long Message-ID header. | null | 2025-01-08T20:23:56+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-16T22:07:00+00:00"
] |
|
CVE-2001-0572 | security flaw | None | null | null | The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands. | null | 2025-01-08T20:32:32+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-23T00:00:00+00:00"
] |
|
CVE-2001-1322 | security flaw | None | null | null | xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask. | null | 2025-01-08T20:26:12+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-07T23:14:00+00:00"
] |
|
CVE-2001-1267 | security flaw | Low | null | null | Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot). | null | 2025-01-08T20:23:20+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-02T18:44:00+00:00",
"2002-09-29T08:40:00+00:00"
] |
|
CVE-2001-1375 | security flaw | None | null | null | tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory. | null | 2025-01-08T20:25:40+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-08-12T19:38:00+00:00"
] |
|
CVE-2001-1230 | security flaw | None | null | null | Buffer overflows in Icecast before 1.3.10 allow remote attackers to cause a denial of service (crash) and execute arbitrary code. | null | 2025-01-08T20:23:15+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-25T22:08:00+00:00"
] |
|
CVE-2001-0071 | security flaw | None | null | null | gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection. | null | 2025-01-08T20:30:02+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-19T00:00:00+00:00"
] |
|
CVE-2001-1494 | security flaw | Low | null | null | script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command. | null | 2025-01-08T20:27:10+00:00 | [
"3AS:losetup-0:2.11y-31.11.i386",
"3AS:losetup-0:2.11y-31.11.ia64",
"3AS:losetup-0:2.11y-31.11.ppc",
"3AS:losetup-0:2.11y-31.11.s390",
"3AS:losetup-0:2.11y-31.11.s390x",
"3AS:losetup-0:2.11y-31.11.x86_64",
"3AS:mount-0:2.11y-31.11.i386",
"3AS:mount-0:2.11y-31.11.ia64",
"3AS:mount-0:2.11y-31.11.ppc",
"3AS:mount-0:2.11y-31.11.s390",
"3AS:mount-0:2.11y-31.11.s390x",
"3AS:mount-0:2.11y-31.11.x86_64",
"3AS:util-linux-0:2.11y-31.11.i386",
"3AS:util-linux-0:2.11y-31.11.ia64",
"3AS:util-linux-0:2.11y-31.11.ppc",
"3AS:util-linux-0:2.11y-31.11.s390",
"3AS:util-linux-0:2.11y-31.11.s390x",
"3AS:util-linux-0:2.11y-31.11.src",
"3AS:util-linux-0:2.11y-31.11.x86_64",
"3AS:util-linux-debuginfo-0:2.11y-31.11.i386",
"3AS:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3AS:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3AS:util-linux-debuginfo-0:2.11y-31.11.s390",
"3AS:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3AS:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3Desktop:losetup-0:2.11y-31.11.i386",
"3Desktop:losetup-0:2.11y-31.11.ia64",
"3Desktop:losetup-0:2.11y-31.11.ppc",
"3Desktop:losetup-0:2.11y-31.11.s390",
"3Desktop:losetup-0:2.11y-31.11.s390x",
"3Desktop:losetup-0:2.11y-31.11.x86_64",
"3Desktop:mount-0:2.11y-31.11.i386",
"3Desktop:mount-0:2.11y-31.11.ia64",
"3Desktop:mount-0:2.11y-31.11.ppc",
"3Desktop:mount-0:2.11y-31.11.s390",
"3Desktop:mount-0:2.11y-31.11.s390x",
"3Desktop:mount-0:2.11y-31.11.x86_64",
"3Desktop:util-linux-0:2.11y-31.11.i386",
"3Desktop:util-linux-0:2.11y-31.11.ia64",
"3Desktop:util-linux-0:2.11y-31.11.ppc",
"3Desktop:util-linux-0:2.11y-31.11.s390",
"3Desktop:util-linux-0:2.11y-31.11.s390x",
"3Desktop:util-linux-0:2.11y-31.11.src",
"3Desktop:util-linux-0:2.11y-31.11.x86_64",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.i386",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3ES:losetup-0:2.11y-31.11.i386",
"3ES:losetup-0:2.11y-31.11.ia64",
"3ES:losetup-0:2.11y-31.11.ppc",
"3ES:losetup-0:2.11y-31.11.s390",
"3ES:losetup-0:2.11y-31.11.s390x",
"3ES:losetup-0:2.11y-31.11.x86_64",
"3ES:mount-0:2.11y-31.11.i386",
"3ES:mount-0:2.11y-31.11.ia64",
"3ES:mount-0:2.11y-31.11.ppc",
"3ES:mount-0:2.11y-31.11.s390",
"3ES:mount-0:2.11y-31.11.s390x",
"3ES:mount-0:2.11y-31.11.x86_64",
"3ES:util-linux-0:2.11y-31.11.i386",
"3ES:util-linux-0:2.11y-31.11.ia64",
"3ES:util-linux-0:2.11y-31.11.ppc",
"3ES:util-linux-0:2.11y-31.11.s390",
"3ES:util-linux-0:2.11y-31.11.s390x",
"3ES:util-linux-0:2.11y-31.11.src",
"3ES:util-linux-0:2.11y-31.11.x86_64",
"3ES:util-linux-debuginfo-0:2.11y-31.11.i386",
"3ES:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3ES:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3ES:util-linux-debuginfo-0:2.11y-31.11.s390",
"3ES:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3ES:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3WS:losetup-0:2.11y-31.11.i386",
"3WS:losetup-0:2.11y-31.11.ia64",
"3WS:losetup-0:2.11y-31.11.ppc",
"3WS:losetup-0:2.11y-31.11.s390",
"3WS:losetup-0:2.11y-31.11.s390x",
"3WS:losetup-0:2.11y-31.11.x86_64",
"3WS:mount-0:2.11y-31.11.i386",
"3WS:mount-0:2.11y-31.11.ia64",
"3WS:mount-0:2.11y-31.11.ppc",
"3WS:mount-0:2.11y-31.11.s390",
"3WS:mount-0:2.11y-31.11.s390x",
"3WS:mount-0:2.11y-31.11.x86_64",
"3WS:util-linux-0:2.11y-31.11.i386",
"3WS:util-linux-0:2.11y-31.11.ia64",
"3WS:util-linux-0:2.11y-31.11.ppc",
"3WS:util-linux-0:2.11y-31.11.s390",
"3WS:util-linux-0:2.11y-31.11.s390x",
"3WS:util-linux-0:2.11y-31.11.src",
"3WS:util-linux-0:2.11y-31.11.x86_64",
"3WS:util-linux-debuginfo-0:2.11y-31.11.i386",
"3WS:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3WS:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3WS:util-linux-debuginfo-0:2.11y-31.11.s390",
"3WS:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3WS:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"4AS:util-linux-0:2.12a-16.EL4.12.i386",
"4AS:util-linux-0:2.12a-16.EL4.12.ia64",
"4AS:util-linux-0:2.12a-16.EL4.12.ppc",
"4AS:util-linux-0:2.12a-16.EL4.12.s390",
"4AS:util-linux-0:2.12a-16.EL4.12.s390x",
"4AS:util-linux-0:2.12a-16.EL4.12.src",
"4AS:util-linux-0:2.12a-16.EL4.12.x86_64",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4Desktop:util-linux-0:2.12a-16.EL4.12.i386",
"4Desktop:util-linux-0:2.12a-16.EL4.12.ia64",
"4Desktop:util-linux-0:2.12a-16.EL4.12.ppc",
"4Desktop:util-linux-0:2.12a-16.EL4.12.s390",
"4Desktop:util-linux-0:2.12a-16.EL4.12.s390x",
"4Desktop:util-linux-0:2.12a-16.EL4.12.src",
"4Desktop:util-linux-0:2.12a-16.EL4.12.x86_64",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4ES:util-linux-0:2.12a-16.EL4.12.i386",
"4ES:util-linux-0:2.12a-16.EL4.12.ia64",
"4ES:util-linux-0:2.12a-16.EL4.12.ppc",
"4ES:util-linux-0:2.12a-16.EL4.12.s390",
"4ES:util-linux-0:2.12a-16.EL4.12.s390x",
"4ES:util-linux-0:2.12a-16.EL4.12.src",
"4ES:util-linux-0:2.12a-16.EL4.12.x86_64",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4WS:util-linux-0:2.12a-16.EL4.12.i386",
"4WS:util-linux-0:2.12a-16.EL4.12.ia64",
"4WS:util-linux-0:2.12a-16.EL4.12.ppc",
"4WS:util-linux-0:2.12a-16.EL4.12.s390",
"4WS:util-linux-0:2.12a-16.EL4.12.s390x",
"4WS:util-linux-0:2.12a-16.EL4.12.src",
"4WS:util-linux-0:2.12a-16.EL4.12.x86_64",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2005-10-11T15:49:00+00:00"
] |
|
CVE-2001-0905 | security flaw | None | null | null | Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running. | null | 2025-01-08T20:27:33+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-19T04:48:00+00:00"
] |
|
CVE-2001-1247 | security flaw | None | null | null | PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files. | null | 2025-01-08T20:28:56+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter applying these updates you will need to restart your web server if it\nwas running before the update was applied."
] | [
"2002-02-28T17:54:00+00:00"
] |
|
CVE-2001-0381 | security flaw | None | null | null | The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key. | null | 2025-01-08T20:31:24+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-17T01:32:00+00:00"
] |
|
CVE-2001-0440 | security flaw | None | null | null | Buffer overflow in logging functions of licq before 1.0.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands. | null | 2025-01-08T20:31:24+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-28T00:00:00+00:00"
] |
|
CVE-2001-0010 | security flaw | None | null | null | Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges. | null | 2025-01-08T20:33:16+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-01-29T00:00:00+00:00"
] |
|
CVE-2001-1380 | security flaw | None | null | null | OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses. | null | 2025-01-08T20:26:04+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-16T16:25:00+00:00"
] |
|
CVE-2001-1400 | security flaw | None | null | null | Unknown vulnerabilities in the UDP port allocation for Linux kernel before 2.2.19 could allow local users to cause a denial of service (deadlock). | null | 2025-01-08T20:27:56+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-0641 | security flaw | None | null | null | Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option. | null | 2025-01-08T20:32:10+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nIn particular, if you are running Red Hat Linux 5.x or 6.x, you need to\ninstall the mktemp errata (RHSA-2001:070) before applying this update.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-21T18:38:00+00:00"
] |
|
CVE-2001-1379 | security flaw | None | null | null | The PostgreSQL authentication modules (1) mod_auth_pgsql 0.9.5, and (2) mod_auth_pgsql_sys 0.9.4, allow remote attackers to bypass authentication and execute arbitrary SQL via a SQL injection attack on the user name. | null | 2025-01-08T20:23:44+00:00 | [
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-24T14:39:00+00:00"
] |
|
CVE-2001-0568 | security flaw | None | null | null | Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes. | null | 2025-01-08T20:32:30+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"*NOTE* This advisory supercedes all other Zope and Zope-Hotfix advisories \nfrom Red Hat, Inc.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-24T00:00:00+00:00"
] |
|
CVE-2001-1396 | security flaw | None | null | null | Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact. | null | 2025-01-08T20:22:58+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2000-1254 | openssl | Mishandling C bitwise-shift operations making easier to bypass protection mechanisms | Moderate | 4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N | null | crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms. | null | 2025-01-08T22:34:12+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:openssl",
"red_hat_enterprise_linux_5:openssl097a",
"red_hat_enterprise_linux_6:openssl",
"red_hat_enterprise_linux_6:openssl098e",
"red_hat_enterprise_linux_7:openssl",
"red_hat_enterprise_linux_7:openssl098e",
"red_hat_jboss_enterprise_application_platform_6:openssl",
"red_hat_jboss_enterprise_web_server_1:openssl",
"red_hat_jboss_enterprise_web_server_2:openssl",
"red_hat_jboss_enterprise_web_server_3:openssl"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2000-1137 | security flaw | None | null | null | GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack. | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. | 2025-01-08T13:35:22+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-06T00:00:00+00:00"
] |