cve
stringlengths 13
16
| affected_component
stringlengths 0
177
| summary
stringlengths 0
227
| severity
stringclasses 5
values | cvss_v2
stringclasses 244
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 30
4k
| statement
stringlengths 31
2.49k
⌀ | release_date
stringlengths 25
25
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
594
| known_not_affected_products
sequencelengths 0
30k
| under_investigation_products
sequencelengths 0
77
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
215
| remediation_details
sequencelengths 0
215
| remediation_dates
sequencelengths 0
215
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2001-0843 | security flaw | None | null | null | Squid proxy server 2.4 and earlier allows remote attackers to cause a denial of service (crash) via a mkdir-only FTP PUT request. | null | 2025-01-08T20:33:18+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-04T21:34:00+00:00"
] |
|
CVE-2001-0906 | security flaw | None | null | null | teTeX filter before 1.0.7 allows local users to gain privileges via a symlink attack on temporary files that are produced when printing .dvi files using lpr. | null | 2025-01-08T20:28:00+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.0j",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find RHN to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will ultimately upgrade the\nappropriate RPMs on your system."
] | [
"2001-10-30T11:23:00+00:00"
] |
|
CVE-2001-0117 | security flaw | Low | null | null | sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack. | null | 2025-01-08T20:30:36+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-19T07:47:00+00:00"
] |
|
CVE-2001-1593 | a2ps | insecure temporary file use | Low | 2.1/AV:L/AC:L/Au:N/C:N/I:P/A:N | null | The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file. | null | 2025-01-08T06:03:44+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:a2ps",
"red_hat_enterprise_linux_6:a2ps",
"red_hat_enterprise_linux_7:a2ps"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2001-0414 | ntpd security hole | None | null | null | Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument. | null | 2025-01-09T02:16:36+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-04-05T00:00:00+00:00"
] |
|
CVE-2001-0013 | security flaw | None | null | null | Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges. | null | 2025-01-08T20:29:52+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-01-29T00:00:00+00:00"
] |
|
CVE-2001-1229 | security flaw | None | null | null | Buffer overflows in (1) Icecast before 1.3.9 and (2) libshout before 1.0.4 allow remote attackers to cause a denial of service (crash) and execute arbitrary code. | null | 2025-01-08T20:24:30+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-25T22:08:00+00:00"
] |
|
CVE-2001-1383 | security flaw | None | null | null | initscript in setserial 2.17-4 and earlier uses predictable temporary file names, which could allow local users to conduct unauthorized operations on files. | null | 2025-01-08T20:26:30+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Do not use the initscript supplied with setserial. To disable it, use \nthe following command:\n\n/sbin/chkconfig serial off\n\nAlternatively, if your system needs manual adjustment of its serial\nport settings and you wish to have those adjustments re-applied\nautomatically on boot, be sure to use a kernel that has non-modular\nserial port support, such as those supplied by Red Hat, Inc."
] | [
"2001-10-02T18:46:00+00:00"
] |
|
CVE-2001-0316 | security flaw | None | null | null | Linux kernel 2.4 and 2.2 allows local users to read kernel memory and possibly gain privileges via a negative argument to the sysctl call. | null | 2025-01-08T20:33:14+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Upgrade to kernel-2.2.17-14\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-02-08T00:00:00+00:00"
] |
|
CVE-2001-1268 | security flaw | None | null | null | Directory traversal vulnerability in Info-ZIP UnZip 5.42 and earlier allows attackers to overwrite arbitrary files during archive extraction via a .. (dot dot) in an extracted filename. | null | 2025-01-08T20:26:44+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-02T18:44:00+00:00",
"2002-09-29T08:40:00+00:00"
] |
|
CVE-2001-0496 | security flaw | None | null | null | kdesu in kdelibs package creates world readable temporary files containing authentication info, which can allow local users to gain privileges. | null | 2025-01-08T20:32:52+00:00 | [
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-04-30T17:32:00+00:00"
] |
|
CVE-2001-1403 | security flaw | None | null | null | Bugzilla before 2.14 includes the username and password in URLs, which could allow attackers to gain privileges by reading the information from the web server logs, or by "shoulder-surfing" and observing the web browser's location bar. | null | 2025-01-08T20:24:12+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-1395 | security flaw | None | null | null | Unknown vulnerability in sockfilter for Linux kernel before 2.2.19 related to "boundary cases," with unknown impact. | null | 2025-01-08T20:27:54+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-0635 | security flaw | Important | null | null | Red Hat Linux 7.1 sets insecure permissions on swap files created during installation, which can allow a local attacker to gain additional privileges by reading sensitive information from the swap file, such as passwords. | null | 2025-01-08T20:31:00+00:00 | [
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-02T20:50:00+00:00"
] |
|
CVE-2001-0731 | security flaw | Important | null | null | Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string. | null | 2025-01-07T15:34:49+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Secure Web Server 3.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Note: The updated apache (and apache-devel) packages for Red Hat Linux 7,\n7.1, and 7.2 require installation of mm and expat (as well as mm-devel and\nexpat-devel for apache-devel). Because mm and expat were not previously\nreleased for Red Hat Linux 7, and mm was not previously released for Red\nHat Linux 7.1, they will need to either be installed simultaneously with or\nbefore the apache packages.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Users of Red Hat Linux 7 and\n7.1 will find that the mod_bandwidth, mod_put, and mod_throttle packages\nare now built as separate packages, and that they will need to manually\ninstall these packages as well.\n\nTo update all other RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nUsers of Red Hat Linux 7 will find that these updates enable the suexec\nfeature by default, which was not the case in previous versions of this\npackage. Administrators who have configured their servers to run CGI\nscripts from user home directories should read the suexec documentation\nincluded in the apache-manual package.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"The main secureweb package is provided as an rhmask file. In order to\ngenerate the actual secureweb RPM package, you will need the\nsecureweb-3.2-12 package file from the Secure Web Server CD. Then, using\nthe rhmask command, generate the secureweb RPM package:\n\nrhmask secureweb-3.2-12.i386.rpm secureweb-3.2.4-1.i386.rpm.rhmask\n\nBefore applying this update, make sure you have applied all previously\nreleased errata relevant to your system.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs."
] | [
"2001-12-04T22:29:00+00:00",
"2002-07-01T10:35:00+00:00"
] |
|
CVE-2001-0859 | security flaw | None | null | null | 2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions. | null | 2025-01-08T20:28:32+00:00 | [
"Red Hat Linux 7.1k"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"If you have not installed:\n--------------------------\n\nDownload the update disk image and create an update disk. This can be\ndone by using the same procedure used to create a boot diskette.\n\nFor more information, refer to\n\nhttp://www.redhat.com/docs/manuals/linux/RHL-7.1-Manual/install-guide/s1-steps-install-cdrom.html#S2-STEPS-MAKE-DISKS\n\nPlease note that you must substitute the update disk image filename for the\nfilename used in the example.\n\nWhen booting into the installation program, type \"linux updates\"\nat the boot prompt, followed by any other installation options (such as\n\"expert\" or \"text\" or \"ks\"). The installation process\nwill prompt you to insert the update disk when it is required, and the\ninstallation will then proceed as normal.\n\nIf you have already installed:\n------------------------------\nCheck the permissions on the affected files and change them as appropriate.\nOr install the upgraded redhat-release; this will change the the\npermissions during its postinstall phase.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs."
] | [
"2001-11-13T01:44:00+00:00"
] |
|
CVE-2001-0072 | security flaw | None | null | null | gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust. | null | 2025-01-08T20:33:20+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-19T00:00:00+00:00"
] |
|
CVE-2001-1399 | security flaw | None | null | null | Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka "User access asm bug on x86." | null | 2025-01-08T20:25:00+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1376 | security flaw | None | null | null | Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data. | null | 2025-01-08T20:26:37+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is currently not available through Red Hat Network.\nDue to a bug in previously released versions, the original package must be\nremoved, and the new package must be installed to apply this update (as root):\n\n # /sbin/service radiusd stop\n # /sbin/chkconfig --del radiusd\n # rpm -e --noscripts radiusd-cistron\n # rpm -ivh radiusd-cistron-1.6.6-2.[arch].rpm\n\nwhere [arch] is the architecture."
] | [
"2002-03-06T15:58:00+00:00"
] |
|
CVE-2001-0834 | security flaw | None | null | null | htsearch CGI program in htdig (ht://Dig) 3.1.5 and earlier allows remote attackers to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero, or (2) read arbitrary files by uploading an alternate configuration file that specifies the target file. | null | 2025-01-08T20:32:10+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-08T14:17:00+00:00"
] |
|
CVE-2001-0567 | security flaw | None | null | null | Digital Creations Zope 2.3.2 and earlier allows a local attacker to gain additional privileges via the changing of ZClass permission mappings for objects and methods in the ZClass. | null | 2025-01-08T20:31:00+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-14T23:31:00+00:00"
] |
|
CVE-2001-1398 | security flaw | None | null | null | Masquerading code for Linux kernel before 2.2.19 does not fully check packet lengths in certain cases, which may lead to a vulnerability. | null | 2025-01-08T20:27:08+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1377 | security flaw | None | null | null | Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2. | null | 2025-01-08T20:27:17+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is currently not available through Red Hat Network.\nDue to a bug in previously released versions, the original package must be\nremoved, and the new package must be installed to apply this update (as root):\n\n # /sbin/service radiusd stop\n # /sbin/chkconfig --del radiusd\n # rpm -e --noscripts radiusd-cistron\n # rpm -ivh radiusd-cistron-1.6.6-2.[arch].rpm\n\nwhere [arch] is the architecture."
] | [
"2002-03-06T15:58:00+00:00"
] |
|
CVE-2001-0835 | security flaw | None | null | null | Cross-site scripting vulnerability in Webalizer 2.01-06, and possibly other versions, allows remote attackers to inject arbitrary HTML tags by specifying them in (1) search keywords embedded in HTTP referrer information, or (2) host names that are retrieved via a reverse DNS lookup. | null | 2025-01-08T20:33:40+00:00 | [
"Red Hat Linux 7.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-30T19:55:00+00:00",
"2001-10-30T19:52:00+00:00"
] |
|
CVE-2001-1009 | security flaw | None | null | null | Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request. | null | 2025-01-08T20:23:24+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T15:46:00+00:00"
] |
|
CVE-2001-1273 | security flaw | None | null | null | The "mxcsr P4" vulnerability in the Linux kernel before 2.2.17-14, when running on certain Intel CPUs, allows local users to cause a denial of service (system halt). | null | 2025-01-08T20:29:03+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Upgrade to kernel-2.2.17-14\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-02-08T00:00:00+00:00"
] |
|
CVE-2001-0570 | security flaw | None | null | null | minicom 1.83.1 and earlier allows a local attacker to gain additional privileges via numerous format string attacks. | null | 2025-01-08T20:30:14+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-10T19:12:00+00:00"
] |
|
CVE-2001-0730 | security flaw | Moderate | null | null | split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header. | null | 2025-01-08T20:29:44+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Secure Web Server 3.2"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Note: The updated apache (and apache-devel) packages for Red Hat Linux 7,\n7.1, and 7.2 require installation of mm and expat (as well as mm-devel and\nexpat-devel for apache-devel). Because mm and expat were not previously\nreleased for Red Hat Linux 7, and mm was not previously released for Red\nHat Linux 7.1, they will need to either be installed simultaneously with or\nbefore the apache packages.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Users of Red Hat Linux 7 and\n7.1 will find that the mod_bandwidth, mod_put, and mod_throttle packages\nare now built as separate packages, and that they will need to manually\ninstall these packages as well.\n\nTo update all other RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nUsers of Red Hat Linux 7 will find that these updates enable the suexec\nfeature by default, which was not the case in previous versions of this\npackage. Administrators who have configured their servers to run CGI\nscripts from user home directories should read the suexec documentation\nincluded in the apache-manual package.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"The main secureweb package is provided as an rhmask file. In order to\ngenerate the actual secureweb RPM package, you will need the\nsecureweb-3.2-12 package file from the Secure Web Server CD. Then, using\nthe rhmask command, generate the secureweb RPM package:\n\nrhmask secureweb-3.2-12.i386.rpm secureweb-3.2.4-1.i386.rpm.rhmask\n\nBefore applying this update, make sure you have applied all previously\nreleased errata relevant to your system.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs."
] | [
"2001-12-04T22:29:00+00:00",
"2002-07-01T10:35:00+00:00"
] |
|
CVE-2001-0233 | security flaw | None | null | null | Buffer overflow in micq client 0.4.6 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Description field. | null | 2025-01-08T20:31:40+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-01-25T00:00:00+00:00"
] |
|
CVE-2001-0819 | security flaw | None | null | null | A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header. | null | 2025-01-08T20:29:50+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T15:46:00+00:00"
] |
|
CVE-2001-1394 | security flaw | None | null | null | Signedness error in (1) getsockopt and (2) setsockopt for Linux kernel before 2.2.19 allows local users to cause a denial of service. | null | 2025-01-08T20:24:32+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1402 | security flaw | None | null | null | Bugzilla before 2.14 does not properly escape untrusted parameters, which could allow remote attackers to conduct unauthorized activities via cross-site scripting (CSS) and possibly SQL injection attacks on (1) the product or output form variables for reports.cgi, (2) the voteon, bug_id, and user variables for showvotes.cgi, (3) an invalid email address in createaccount.cgi, (4) an invalid ID in showdependencytree.cgi, (5) invalid usernames and other fields in process_bug.cgi, and (6) error messages in buglist.cgi. | null | 2025-01-08T20:29:13+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-1269 | security flaw | None | null | null | Info-ZIP UnZip 5.42 and earlier allows attackers to overwrite arbitrary files during archive extraction via filenames in the archive that begin with the '/' (slash) character. | null | 2025-01-08T20:24:50+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-10-02T18:44:00+00:00",
"2002-09-29T08:40:00+00:00"
] |
|
CVE-2001-0301 | security flaw | None | null | null | Buffer overflow in Analog before 4.16 allows remote attackers to execute arbitrary commands by using the ALIAS command to construct large strings. | null | 2025-01-08T20:33:37+00:00 | [
"Red Hat Secure Web Server 2.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe desired RPMs."
] | [
"2001-02-23T00:00:00+00:00"
] |
|
CVE-2001-0317 | security flaw | None | null | null | Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process. | null | 2025-01-08T20:30:28+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Upgrade to kernel-2.2.17-14\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-02-08T00:00:00+00:00"
] |
|
CVE-2001-0439 | security flaw | None | null | null | licq before 1.0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | null | 2025-01-08T20:29:38+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-28T00:00:00+00:00"
] |
|
CVE-2001-0012 | security flaw | None | null | null | BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables. | null | 2025-01-08T20:32:06+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-01-29T00:00:00+00:00"
] |
|
CVE-2001-0784 | security flaw | None | null | null | Directory traversal vulnerability in Icecast 1.3.10 and earlier allows remote attackers to read arbitrary files via a modified .. (dot dot) attack using encoded URL characters. | null | 2025-01-08T20:29:52+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-25T22:08:00+00:00"
] |
|
CVE-2001-0550 | security flaw | Critical | null | null | wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob). | null | 2025-01-08T20:32:54+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-27T23:35:00+00:00"
] |
|
CVE-2001-0141 | security flaw | None | null | null | mgetty 1.1.22 allows local users to overwrite arbitrary files via a symlink attack in some configurations. | null | 2025-01-08T20:31:46+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-04-16T00:00:00+00:00"
] |
|
CVE-2001-1022 | security flaw | Important | null | null | Format string vulnerability in pic utility in groff 1.16.1 and other versions, and jgroff before 1.15, allows remote attackers to bypass the -S option and execute arbitrary commands via format string specifiers in the plot command. | null | 2025-01-08T20:26:48+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-14T16:16:00+00:00"
] |
|
CVE-2001-0408 | security flaw | None | null | null | vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes. | null | 2025-01-08T20:30:54+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-10T22:19:00+00:00"
] |
|
CVE-2001-1389 | security flaw | None | null | null | Multiple vulnerabilities in xinetd 2.3.0 and earlier, and additional variants until 2.3.3, may allow remote attackers to cause a denial of service or execute arbitrary code, primarily via buffer overflows or improper NULL termination. | null | 2025-01-08T20:29:18+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T14:31:00+00:00"
] |
|
CVE-2001-1274 | security flaw | None | null | null | Buffer overflow in MySQL before 3.23.31 allows attackers to cause a denial of service and possibly gain privileges. | null | 2025-01-08T20:27:30+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Because of dependencies, the packages must be installed as a group.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Uvh mysql*\n\nNote that in rare cases, the shutdown of the old database fails after\nupgrade - to ensure a smooth upgrade, shut the database down before\nupgrading:\n\nservice mysqld stop"
] | [
"2001-01-18T00:00:00+00:00"
] |
|
CVE-2001-0170 | security flaw | None | null | null | glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files. | null | 2025-01-08T20:31:22+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Pick packages for your architecture and run:\n\nrpm -Uvh glibc-[2c]*\nrpm -Fvh glibc-[dp]* nscd-*"
] | [
"2001-01-11T00:00:00+00:00"
] |
|
CVE-2001-0873 | security flaw | None | null | null | uuxqt in Taylor UUCP package does not properly remove dangerous long options, which allows local users to gain privileges by calling uux and specifying an alternate configuration file with the --config option. | null | 2025-01-08T20:23:06+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-17T17:35:00+00:00"
] |
|
CVE-2001-0473 | security flaw | None | null | null | Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands. | null | 2025-01-08T20:32:04+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-09T00:00:00+00:00"
] |
|
CVE-2001-0977 | security flaw | None | null | null | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field. | null | 2025-01-08T20:24:20+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains \nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nUsers of Red Hat Linux 6.2 should note that the openldap package has been\nsplit into the openldap, openldap-servers, and openldap-clients packages.\nUsers may need to manually select the openldap-servers and\nopenldap-clients packages to ensure that they are upgraded properly.\n\nThis update also transitions users of Red Hat Linux 7 to OpenLDAP 2.0,\nwhich uses a different on-disk format for storing the LDBM databases\nwhich are used by slapd, the standalone LDAP server. Users who are\nrunning an OpenLDAP server will need to dump out their old databases by\nrunning \"ldbmcat -n\" and reload them using the \"slapadd\" command. They\nalso should ensuring that the \"ldap\" user continues to have read/write\naccess to the database files."
] | [
"2001-08-09T21:38:00+00:00"
] |
|
CVE-2001-0131 | httpd | allows local users to overwrite arbitrary files via a symlink attack | Low | null | 2.8/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N | A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity. | All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw | 2025-01-09T05:24:00+00:00 | [] | [
"red_hat_jboss_enterprise_web_server_2:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd22"
] | [
"red_hat_enterprise_linux_5:httpd",
"red_hat_enterprise_linux_6:httpd",
"red_hat_enterprise_linux_7:httpd",
"red_hat_enterprise_linux_8:httpd:2.4/httpd",
"red_hat_jboss_core_services:httpd",
"red_hat_software_collections:httpd24-httpd"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned"
] | [
"Out of support scope"
] | [
null
] |
CVE-2001-1409 | security flaw | Low | null | null | dexconf in XFree86 Xserver 4.1.0-2 creates the /dev/dri directory with insecure permissions (666), which allows local users to replace or create files in the root file system. | null | 2025-01-08T20:23:37+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-06-25T12:23:00+00:00",
"2003-06-25T15:51:00+00:00",
"2003-06-25T15:52:00+00:00",
"2003-06-25T12:49:00+00:00"
] |
|
CVE-2001-1350 | security flaw | None | null | null | Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter. | null | 2025-01-08T20:24:36+00:00 | [
"Red Hat Linux 7.0j"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-07-09T12:40:00+00:00"
] |
|
CVE-2001-0691 | security flaw | None | null | null | Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations. | null | 2025-01-08T20:31:00+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-18T22:06:00+00:00"
] |
|
CVE-2001-0279 | security flaw | None | null | null | Buffer overflow in sudo earlier than 1.6.3p6 allows local users to gain root privileges. | null | 2025-01-08T20:30:08+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-23T00:00:00+00:00"
] |
|
CVE-2001-1413 | security flaw | Moderate | null | null | Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument. | null | 2025-01-08T20:26:54+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] | [
"2004-12-13T19:31:00+00:00"
] |
|
CVE-2001-1556 | httpd | log files contain information directly supplied by clients and does not filter or quote control characters | Low | null | 3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N | The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep. | This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083. | 2025-01-09T05:24:08+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:httpd",
"red_hat_enterprise_linux_6:httpd",
"red_hat_enterprise_linux_7:httpd",
"red_hat_enterprise_linux_8:httpd:2.4/httpd",
"red_hat_jboss_core_services:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd22",
"red_hat_software_collections:httpd24-httpd"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2001-1385 | security flaw | None | null | null | The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts. | null | 2025-01-08T20:25:22+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Because of dependencies, the packages must be installed as a group. No\nupdate for the mod_php package is provided for Red Hat Linux 7; it has been\nmerged into the updated php package.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Fvh php*\n\nThen restart your web server:\n\n/etc/rc.d/init.d/httpd restart"
] | [
"2000-12-20T00:00:00+00:00"
] |
|
CVE-2001-0890 | security flaw | None | null | null | Certain backend drivers in the SANE library 1.0.3 and earlier, as used in frontend software such as XSane, allows local users to modify files via a symlink attack on temporary files. | null | 2025-01-08T20:27:42+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.0",
"Red Hat Powertools 6.1",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-08T12:49:00+00:00",
"2002-01-08T12:48:00+00:00"
] |
|
CVE-2001-1002 | security flaw | None | null | null | The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands. | null | 2025-01-08T20:23:31+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.0j",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find RHN to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will ultimately upgrade the\nappropriate RPMs on your system."
] | [
"2001-10-30T11:23:00+00:00"
] |
|
CVE-2001-1147 | security flaw | Important | null | null | The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits. | null | 2025-01-08T20:24:07+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-16T19:15:00+00:00"
] |
|
CVE-2001-0886 | security flaw | None | null | null | Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character. | null | 2025-01-08T20:24:26+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-12-14T21:36:00+00:00"
] |
|
CVE-2001-0869 | security flaw | None | null | null | Format string vulnerability in the default logging callback function _sasl_syslog in common.c in Cyrus SASL library (cyrus-sasl) may allow remote attackers to execute arbitrary commands. | null | 2025-01-08T20:27:54+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-29T18:51:00+00:00",
"2001-11-29T18:55:00+00:00"
] |
|
CVE-2001-1405 | security flaw | None | null | null | Bugzilla before 2.14 does not restrict access to sanitycheck.cgi, which allows local users to cause a denial of service (CPU consumption) via a flood of requests to sanitycheck.cgi. | null | 2025-01-08T20:25:46+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-1393 | security flaw | None | null | null | Unknown vulnerability in classifier code for Linux kernel before 2.2.19 could result in denial of service (hang). | null | 2025-01-08T20:26:18+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1392 | security flaw | None | null | null | The Linux kernel before 2.2.19 does not have unregister calls for (1) CPUID and (2) MSR drivers, which could cause a DoS (crash) by unloading and reloading the drivers. | null | 2025-01-08T20:23:20+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1404 | security flaw | None | null | null | Bugzilla before 2.14 stores user passwords in plaintext and sends password requests in an email message, which could allow attackers to gain privileges. | null | 2025-01-08T20:28:42+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-0887 | security flaw | None | null | null | xSANE 0.81 and earlier allows local users to modify files of other xSANE users via a symlink attack on temporary files. | null | 2025-01-08T20:24:04+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.0",
"Red Hat Powertools 6.1",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-01-08T12:49:00+00:00",
"2002-01-08T12:48:00+00:00"
] |
|
CVE-2001-1279 | security flaw | None | null | null | Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026. | null | 2025-01-08T20:26:08+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-09T18:30:00+00:00"
] |
|
CVE-2001-1384 | security flaw | Important | null | null | ptrace in Linux 2.2.x through 2.2.19, and 2.4.x through 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp. | null | 2025-01-08T20:28:42+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2001-10-18T22:31:00+00:00",
"2001-10-23T07:44:00+00:00"
] |
|
CVE-2001-0653 | security flaw | None | null | null | Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number. | null | 2025-01-08T20:29:28+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-13T20:25:00+00:00"
] |
|
CVE-2001-0852 | security flaw | Important | null | null | TUX HTTP server 2.1.0-2 in Red Hat Linux allows remote attackers to cause a denial of service via a long Host: header. | null | 2025-01-08T20:33:40+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2001-11-02T20:08:00+00:00"
] |
|
CVE-2001-0556 | security flaw | None | null | null | The Nirvana Editor (NEdit) 5.1.1 and earlier allows a local attacker to overwrite other users' files via a symlink attack on (1) backup files or (2) temporary files used when nedit prints a file or portions of a file. | null | 2025-01-08T20:31:46+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-05-08T14:04:00+00:00"
] |
|
CVE-2001-0690 | security flaw | None | null | null | Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers. | null | 2025-01-08T20:31:00+00:00 | [
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-26T19:22:00+00:00"
] |
|
CVE-2001-1351 | security flaw | None | null | null | Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers. | null | 2025-01-08T20:24:54+00:00 | [
"Red Hat Linux 7.0j"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-07-09T12:40:00+00:00"
] |
|
CVE-2001-0405 | security flaw | Important | null | null | ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall. | null | 2025-01-08T20:33:38+00:00 | [
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-22T21:12:00+00:00"
] |
|
CVE-2001-0560 | security flaw | None | null | null | Buffer overflow in Vixie cron 3.0.1-56 and earlier could allow a local attacker to gain additional privileges via a long username (> 20 characters). | null | 2025-01-08T20:33:14+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-12T00:00:00+00:00"
] |
|
CVE-2001-1275 | security flaw | None | null | null | MySQL before 3.23.31 allows users with a MySQL account to use the SHOW GRANTS command to obtain the encrypted administrator password from the mysql.user table and possibly gain privileges via password cracking. | null | 2025-01-08T20:25:00+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Because of dependencies, the packages must be installed as a group.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Uvh mysql*\n\nNote that in rare cases, the shutdown of the old database fails after\nupgrade - to ensure a smooth upgrade, shut the database down before\nupgrading:\n\nservice mysqld stop"
] | [
"2001-01-18T00:00:00+00:00"
] |
|
CVE-2001-0872 | security flaw | None | null | null | OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges. | null | 2025-01-08T20:24:14+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-12-05T01:13:00+00:00"
] |
|
CVE-2001-1388 | security flaw | None | null | null | iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator. | null | 2025-01-08T20:28:23+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-07T14:10:00+00:00"
] |
|
CVE-2001-0825 | security flaw | None | null | null | Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check. | null | 2025-01-08T20:30:36+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-06T19:13:00+00:00"
] |
|
CVE-2001-0736 | security flaw | None | null | null | Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack. | null | 2025-01-08T20:30:14+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-03-31T00:00:00+00:00"
] |
|
CVE-2001-1333 | security flaw | None | null | null | Linux CUPS before 1.1.6 does not securely handle temporary files, possibly due to a symlink vulnerability that could allow local users to overwrite files. | null | 2025-01-08T20:28:48+00:00 | [
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Uvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-03-15T12:36:00+00:00"
] |
|
CVE-2001-0522 | security flaw | None | null | null | Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an attacker to gain privileges via format strings in the original filename that is stored in an encrypted file. | null | 2025-01-08T20:32:52+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-06-07T19:53:00+00:00"
] |
|
CVE-2001-1276 | security flaw | None | null | null | ispell before 3.1.20 allows local users to overwrite files of other users via a symlink attack on a temporary file. | null | 2025-01-08T20:26:04+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-07-10T22:27:00+00:00"
] |
|
CVE-2001-0060 | security flaw | None | null | null | Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username. | null | 2025-01-08T20:30:04+00:00 | [
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2000-12-19T00:00:00+00:00"
] |
|
CVE-2001-0670 | security flaw | None | null | null | Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue. | null | 2025-01-08T20:29:20+00:00 | [
"Red Hat Linux 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-02T20:48:00+00:00"
] |
|
CVE-2001-1391 | security flaw | None | null | null | Off-by-one vulnerability in CPIA driver of Linux kernel before 2.2.19 allows users to modify kernel memory. | null | 2025-01-08T20:24:03+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade."
] | [
"2001-04-10T00:00:00+00:00"
] |
|
CVE-2001-1407 | security flaw | None | null | null | Bugzilla before 2.14 allows Bugzilla users to bypass group security checks by marking a bug as the duplicate of a restricted bug, which adds the user to the CC list of the restricted bug and allows the user to view the bug. | null | 2025-01-08T20:26:51+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-09-10T18:45:00+00:00"
] |
|
CVE-2001-0884 | security flaw | None | null | null | Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users. | null | 2025-01-08T20:24:43+00:00 | [
"Red Hat Linux 7.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1",
"Red Hat Secure Web Server 3.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe] desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-12-21T14:06:00+00:00",
"2001-12-21T14:10:00+00:00",
"2002-01-02T15:23:00+00:00"
] |
|
CVE-2001-0191 | security flaw | None | null | null | gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length. | null | 2025-01-08T20:33:22+00:00 | [
"Red Hat Linux 7.0",
"Red Hat Powertools 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-02-02T00:00:00+00:00",
"2001-02-02T00:00:00+00:00"
] |
|
CVE-2001-0596 | security flaw | None | null | null | Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript. | null | 2025-01-08T20:30:28+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-04-09T00:00:00+00:00"
] |
|
CVE-2001-1387 | security flaw | None | null | null | iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak. | null | 2025-01-08T20:29:06+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-11-07T14:10:00+00:00"
] |
|
CVE-2001-0851 | security flaw | Important | null | null | Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie. | null | 2025-01-08T20:32:54+00:00 | [
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2001-11-02T20:08:00+00:00"
] |
|
CVE-2001-0406 | security flaw | None | null | null | Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient. | null | 2025-01-08T20:30:50+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAgain, note that the packages for Red Hat Linux 6.2 requre an updated\nlogrotate package."
] | [
"2001-05-15T02:21:00+00:00"
] |
|
CVE-2001-1352 | security flaw | None | null | null | Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter. | null | 2025-01-08T20:28:18+00:00 | [
"Red Hat Linux 7.0j"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-07-09T12:40:00+00:00"
] |
|
CVE-2001-0328 | kernel | TCP connection ISN hijacks | Low | 2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N | null | TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. | This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. | 2025-01-08T05:24:01+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:kernel",
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_mrg_2:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2001-1353 | security flaw | None | null | null | ghostscript before 6.51 allows local users to read and write arbitrary files as the 'lp' user via the file operator, even with -dSAFER enabled. | null | 2025-01-08T20:27:04+00:00 | [
"Red Hat Linux 7.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nAfter updating the rpms, you will need to restart your print server, by\nrunning:\n\n/sbin/service lpd restart\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-10-31T22:59:00+00:00"
] |
|
CVE-2001-1083 | security flaw | None | null | null | Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash). | null | 2025-01-08T20:24:38+00:00 | [
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2002-04-25T22:08:00+00:00"
] |
|
CVE-2001-0554 | security flaw | Critical | null | null | Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. | null | 2025-01-08T20:31:18+00:00 | [
"Red Hat Linux 5.2",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2001-08-09T22:14:00+00:00"
] |
|
CVE-2001-0128 | security flaw | None | null | null | Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. | null | 2025-01-08T20:32:31+00:00 | [
"Red Hat Powertools 6.1",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM.\n\nAfter you have applied the update, restart Zope."
] | [
"2000-12-18T00:00:00+00:00"
] |
|
CVE-2001-0169 | security flaw | None | null | null | When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib. | null | 2025-01-08T20:29:28+00:00 | [
"Red Hat Linux 6.0",
"Red Hat Linux 6.1",
"Red Hat Linux 6.2"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM."
] | [
"2001-01-15T00:00:00+00:00"
] |