cve
stringlengths
13
16
affected_component
stringlengths
0
177
summary
stringlengths
0
227
severity
stringclasses
5 values
cvss_v2
stringclasses
244 values
cvss_v3
stringlengths
37
48
description
stringlengths
30
4k
statement
stringlengths
31
2.49k
release_date
stringlengths
25
25
fixed_products
sequencelengths
0
28.2k
known_affected_products
sequencelengths
0
594
known_not_affected_products
sequencelengths
0
30k
under_investigation_products
sequencelengths
0
77
threat_categories
sequencelengths
0
4
threat_details
sequencelengths
0
4
threat_dates
sequencelengths
0
4
remediation_categories
sequencelengths
0
215
remediation_details
sequencelengths
0
215
remediation_dates
sequencelengths
0
215
CVE-2001-0843
security flaw
None
null
null
Squid proxy server 2.4 and earlier allows remote attackers to cause a denial of service (crash) via a mkdir-only FTP PUT request.
null
2025-01-08T20:33:18+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-04T21:34:00+00:00" ]
CVE-2001-0906
security flaw
None
null
null
teTeX filter before 1.0.7 allows local users to gain privileges via a symlink attack on temporary files that are produced when printing .dvi files using lpr.
null
2025-01-08T20:28:00+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.0j", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find RHN to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will ultimately upgrade the\nappropriate RPMs on your system." ]
[ "2001-10-30T11:23:00+00:00" ]
CVE-2001-0117
security flaw
Low
null
null
sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack.
null
2025-01-08T20:30:36+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-19T07:47:00+00:00" ]
CVE-2001-1593
a2ps
insecure temporary file use
Low
2.1/AV:L/AC:L/Au:N/C:N/I:P/A:N
null
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.
null
2025-01-08T06:03:44+00:00
[]
[]
[ "red_hat_enterprise_linux_5:a2ps", "red_hat_enterprise_linux_6:a2ps", "red_hat_enterprise_linux_7:a2ps" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-0414
ntpd security hole
None
null
null
Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.
null
2025-01-09T02:16:36+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-04-05T00:00:00+00:00" ]
CVE-2001-0013
security flaw
None
null
null
Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
null
2025-01-08T20:29:52+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-01-29T00:00:00+00:00" ]
CVE-2001-1229
security flaw
None
null
null
Buffer overflows in (1) Icecast before 1.3.9 and (2) libshout before 1.0.4 allow remote attackers to cause a denial of service (crash) and execute arbitrary code.
null
2025-01-08T20:24:30+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-04-25T22:08:00+00:00" ]
CVE-2001-1383
security flaw
None
null
null
initscript in setserial 2.17-4 and earlier uses predictable temporary file names, which could allow local users to conduct unauthorized operations on files.
null
2025-01-08T20:26:30+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Do not use the initscript supplied with setserial. To disable it, use \nthe following command:\n\n/sbin/chkconfig serial off\n\nAlternatively, if your system needs manual adjustment of its serial\nport settings and you wish to have those adjustments re-applied\nautomatically on boot, be sure to use a kernel that has non-modular\nserial port support, such as those supplied by Red Hat, Inc." ]
[ "2001-10-02T18:46:00+00:00" ]
CVE-2001-0316
security flaw
None
null
null
Linux kernel 2.4 and 2.2 allows local users to read kernel memory and possibly gain privileges via a negative argument to the sysctl call.
null
2025-01-08T20:33:14+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Upgrade to kernel-2.2.17-14\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-02-08T00:00:00+00:00" ]
CVE-2001-1268
security flaw
None
null
null
Directory traversal vulnerability in Info-ZIP UnZip 5.42 and earlier allows attackers to overwrite arbitrary files during archive extraction via a .. (dot dot) in an extracted filename.
null
2025-01-08T20:26:44+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-10-02T18:44:00+00:00", "2002-09-29T08:40:00+00:00" ]
CVE-2001-0496
security flaw
None
null
null
kdesu in kdelibs package creates world readable temporary files containing authentication info, which can allow local users to gain privileges.
null
2025-01-08T20:32:52+00:00
[ "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-04-30T17:32:00+00:00" ]
CVE-2001-1403
security flaw
None
null
null
Bugzilla before 2.14 includes the username and password in URLs, which could allow attackers to gain privileges by reading the information from the web server logs, or by "shoulder-surfing" and observing the web browser's location bar.
null
2025-01-08T20:24:12+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-1395
security flaw
None
null
null
Unknown vulnerability in sockfilter for Linux kernel before 2.2.19 related to "boundary cases," with unknown impact.
null
2025-01-08T20:27:54+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-0635
security flaw
Important
null
null
Red Hat Linux 7.1 sets insecure permissions on swap files created during installation, which can allow a local attacker to gain additional privileges by reading sensitive information from the swap file, such as passwords.
null
2025-01-08T20:31:00+00:00
[ "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-02T20:50:00+00:00" ]
CVE-2001-0731
security flaw
Important
null
null
Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string.
null
2025-01-07T15:34:49+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Secure Web Server 3.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Note: The updated apache (and apache-devel) packages for Red Hat Linux 7,\n7.1, and 7.2 require installation of mm and expat (as well as mm-devel and\nexpat-devel for apache-devel). Because mm and expat were not previously\nreleased for Red Hat Linux 7, and mm was not previously released for Red\nHat Linux 7.1, they will need to either be installed simultaneously with or\nbefore the apache packages.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Users of Red Hat Linux 7 and\n7.1 will find that the mod_bandwidth, mod_put, and mod_throttle packages\nare now built as separate packages, and that they will need to manually\ninstall these packages as well.\n\nTo update all other RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nUsers of Red Hat Linux 7 will find that these updates enable the suexec\nfeature by default, which was not the case in previous versions of this\npackage. Administrators who have configured their servers to run CGI\nscripts from user home directories should read the suexec documentation\nincluded in the apache-manual package.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "The main secureweb package is provided as an rhmask file. In order to\ngenerate the actual secureweb RPM package, you will need the\nsecureweb-3.2-12 package file from the Secure Web Server CD. Then, using\nthe rhmask command, generate the secureweb RPM package:\n\nrhmask secureweb-3.2-12.i386.rpm secureweb-3.2.4-1.i386.rpm.rhmask\n\nBefore applying this update, make sure you have applied all previously\nreleased errata relevant to your system.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs." ]
[ "2001-12-04T22:29:00+00:00", "2002-07-01T10:35:00+00:00" ]
CVE-2001-0859
security flaw
None
null
null
2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions.
null
2025-01-08T20:28:32+00:00
[ "Red Hat Linux 7.1k" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "If you have not installed:\n--------------------------\n\nDownload the update disk image and create an update disk. This can be\ndone by using the same procedure used to create a boot diskette.\n\nFor more information, refer to\n\nhttp://www.redhat.com/docs/manuals/linux/RHL-7.1-Manual/install-guide/s1-steps-install-cdrom.html#S2-STEPS-MAKE-DISKS\n\nPlease note that you must substitute the update disk image filename for the\nfilename used in the example.\n\nWhen booting into the installation program, type \"linux updates\"\nat the boot prompt, followed by any other installation options (such as\n\"expert\" or \"text\" or \"ks\"). The installation process\nwill prompt you to insert the update disk when it is required, and the\ninstallation will then proceed as normal.\n\nIf you have already installed:\n------------------------------\nCheck the permissions on the affected files and change them as appropriate.\nOr install the upgraded redhat-release; this will change the the\npermissions during its postinstall phase.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs." ]
[ "2001-11-13T01:44:00+00:00" ]
CVE-2001-0072
security flaw
None
null
null
gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.
null
2025-01-08T20:33:20+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-19T00:00:00+00:00" ]
CVE-2001-1399
security flaw
None
null
null
Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka "User access asm bug on x86."
null
2025-01-08T20:25:00+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1376
security flaw
None
null
null
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.
null
2025-01-08T20:26:37+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is currently not available through Red Hat Network.\nDue to a bug in previously released versions, the original package must be\nremoved, and the new package must be installed to apply this update (as root):\n\n # /sbin/service radiusd stop\n # /sbin/chkconfig --del radiusd\n # rpm -e --noscripts radiusd-cistron\n # rpm -ivh radiusd-cistron-1.6.6-2.[arch].rpm\n\nwhere [arch] is the architecture." ]
[ "2002-03-06T15:58:00+00:00" ]
CVE-2001-0834
security flaw
None
null
null
htsearch CGI program in htdig (ht://Dig) 3.1.5 and earlier allows remote attackers to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero, or (2) read arbitrary files by uploading an alternate configuration file that specifies the target file.
null
2025-01-08T20:32:10+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-08T14:17:00+00:00" ]
CVE-2001-0567
security flaw
None
null
null
Digital Creations Zope 2.3.2 and earlier allows a local attacker to gain additional privileges via the changing of ZClass permission mappings for objects and methods in the ZClass.
null
2025-01-08T20:31:00+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-14T23:31:00+00:00" ]
CVE-2001-1398
security flaw
None
null
null
Masquerading code for Linux kernel before 2.2.19 does not fully check packet lengths in certain cases, which may lead to a vulnerability.
null
2025-01-08T20:27:08+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1377
security flaw
None
null
null
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
null
2025-01-08T20:27:17+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is currently not available through Red Hat Network.\nDue to a bug in previously released versions, the original package must be\nremoved, and the new package must be installed to apply this update (as root):\n\n # /sbin/service radiusd stop\n # /sbin/chkconfig --del radiusd\n # rpm -e --noscripts radiusd-cistron\n # rpm -ivh radiusd-cistron-1.6.6-2.[arch].rpm\n\nwhere [arch] is the architecture." ]
[ "2002-03-06T15:58:00+00:00" ]
CVE-2001-0835
security flaw
None
null
null
Cross-site scripting vulnerability in Webalizer 2.01-06, and possibly other versions, allows remote attackers to inject arbitrary HTML tags by specifying them in (1) search keywords embedded in HTTP referrer information, or (2) host names that are retrieved via a reverse DNS lookup.
null
2025-01-08T20:33:40+00:00
[ "Red Hat Linux 7.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-30T19:55:00+00:00", "2001-10-30T19:52:00+00:00" ]
CVE-2001-1009
security flaw
None
null
null
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
null
2025-01-08T20:23:24+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T15:46:00+00:00" ]
CVE-2001-1273
security flaw
None
null
null
The "mxcsr P4" vulnerability in the Linux kernel before 2.2.17-14, when running on certain Intel CPUs, allows local users to cause a denial of service (system halt).
null
2025-01-08T20:29:03+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Upgrade to kernel-2.2.17-14\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-02-08T00:00:00+00:00" ]
CVE-2001-0570
security flaw
None
null
null
minicom 1.83.1 and earlier allows a local attacker to gain additional privileges via numerous format string attacks.
null
2025-01-08T20:30:14+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-10T19:12:00+00:00" ]
CVE-2001-0730
security flaw
Moderate
null
null
split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header.
null
2025-01-08T20:29:44+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Secure Web Server 3.2" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Note: The updated apache (and apache-devel) packages for Red Hat Linux 7,\n7.1, and 7.2 require installation of mm and expat (as well as mm-devel and\nexpat-devel for apache-devel). Because mm and expat were not previously\nreleased for Red Hat Linux 7, and mm was not previously released for Red\nHat Linux 7.1, they will need to either be installed simultaneously with or\nbefore the apache packages.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Users of Red Hat Linux 7 and\n7.1 will find that the mod_bandwidth, mod_put, and mod_throttle packages\nare now built as separate packages, and that they will need to manually\ninstall these packages as well.\n\nTo update all other RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nUsers of Red Hat Linux 7 will find that these updates enable the suexec\nfeature by default, which was not the case in previous versions of this\npackage. Administrators who have configured their servers to run CGI\nscripts from user home directories should read the suexec documentation\nincluded in the apache-manual package.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "The main secureweb package is provided as an rhmask file. In order to\ngenerate the actual secureweb RPM package, you will need the\nsecureweb-3.2-12 package file from the Secure Web Server CD. Then, using\nthe rhmask command, generate the secureweb RPM package:\n\nrhmask secureweb-3.2-12.i386.rpm secureweb-3.2.4-1.i386.rpm.rhmask\n\nBefore applying this update, make sure you have applied all previously\nreleased errata relevant to your system.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs." ]
[ "2001-12-04T22:29:00+00:00", "2002-07-01T10:35:00+00:00" ]
CVE-2001-0233
security flaw
None
null
null
Buffer overflow in micq client 0.4.6 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Description field.
null
2025-01-08T20:31:40+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-01-25T00:00:00+00:00" ]
CVE-2001-0819
security flaw
None
null
null
A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header.
null
2025-01-08T20:29:50+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T15:46:00+00:00" ]
CVE-2001-1394
security flaw
None
null
null
Signedness error in (1) getsockopt and (2) setsockopt for Linux kernel before 2.2.19 allows local users to cause a denial of service.
null
2025-01-08T20:24:32+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1402
security flaw
None
null
null
Bugzilla before 2.14 does not properly escape untrusted parameters, which could allow remote attackers to conduct unauthorized activities via cross-site scripting (CSS) and possibly SQL injection attacks on (1) the product or output form variables for reports.cgi, (2) the voteon, bug_id, and user variables for showvotes.cgi, (3) an invalid email address in createaccount.cgi, (4) an invalid ID in showdependencytree.cgi, (5) invalid usernames and other fields in process_bug.cgi, and (6) error messages in buglist.cgi.
null
2025-01-08T20:29:13+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-1269
security flaw
None
null
null
Info-ZIP UnZip 5.42 and earlier allows attackers to overwrite arbitrary files during archive extraction via filenames in the archive that begin with the '/' (slash) character.
null
2025-01-08T20:24:50+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-10-02T18:44:00+00:00", "2002-09-29T08:40:00+00:00" ]
CVE-2001-0301
security flaw
None
null
null
Buffer overflow in Analog before 4.16 allows remote attackers to execute arbitrary commands by using the ALIAS command to construct large strings.
null
2025-01-08T20:33:37+00:00
[ "Red Hat Secure Web Server 2.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe desired RPMs." ]
[ "2001-02-23T00:00:00+00:00" ]
CVE-2001-0317
security flaw
None
null
null
Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.
null
2025-01-08T20:30:28+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Upgrade to kernel-2.2.17-14\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-02-08T00:00:00+00:00" ]
CVE-2001-0439
security flaw
None
null
null
licq before 1.0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
null
2025-01-08T20:29:38+00:00
[ "Red Hat Linux 7.0", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-28T00:00:00+00:00" ]
CVE-2001-0012
security flaw
None
null
null
BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.
null
2025-01-08T20:32:06+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-01-29T00:00:00+00:00" ]
CVE-2001-0784
security flaw
None
null
null
Directory traversal vulnerability in Icecast 1.3.10 and earlier allows remote attackers to read arbitrary files via a modified .. (dot dot) attack using encoded URL characters.
null
2025-01-08T20:29:52+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-04-25T22:08:00+00:00" ]
CVE-2001-0550
security flaw
Critical
null
null
wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).
null
2025-01-08T20:32:54+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-27T23:35:00+00:00" ]
CVE-2001-0141
security flaw
None
null
null
mgetty 1.1.22 allows local users to overwrite arbitrary files via a symlink attack in some configurations.
null
2025-01-08T20:31:46+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-04-16T00:00:00+00:00" ]
CVE-2001-1022
security flaw
Important
null
null
Format string vulnerability in pic utility in groff 1.16.1 and other versions, and jgroff before 1.15, allows remote attackers to bypass the -S option and execute arbitrary commands via format string specifiers in the plot command.
null
2025-01-08T20:26:48+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-01-14T16:16:00+00:00" ]
CVE-2001-0408
security flaw
None
null
null
vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
null
2025-01-08T20:30:54+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-10T22:19:00+00:00" ]
CVE-2001-1389
security flaw
None
null
null
Multiple vulnerabilities in xinetd 2.3.0 and earlier, and additional variants until 2.3.3, may allow remote attackers to cause a denial of service or execute arbitrary code, primarily via buffer overflows or improper NULL termination.
null
2025-01-08T20:29:18+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T14:31:00+00:00" ]
CVE-2001-1274
security flaw
None
null
null
Buffer overflow in MySQL before 3.23.31 allows attackers to cause a denial of service and possibly gain privileges.
null
2025-01-08T20:27:30+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Because of dependencies, the packages must be installed as a group.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Uvh mysql*\n\nNote that in rare cases, the shutdown of the old database fails after\nupgrade - to ensure a smooth upgrade, shut the database down before\nupgrading:\n\nservice mysqld stop" ]
[ "2001-01-18T00:00:00+00:00" ]
CVE-2001-0170
security flaw
None
null
null
glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.
null
2025-01-08T20:31:22+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Pick packages for your architecture and run:\n\nrpm -Uvh glibc-[2c]*\nrpm -Fvh glibc-[dp]* nscd-*" ]
[ "2001-01-11T00:00:00+00:00" ]
CVE-2001-0873
security flaw
None
null
null
uuxqt in Taylor UUCP package does not properly remove dangerous long options, which allows local users to gain privileges by calling uux and specifying an alternate configuration file with the --config option.
null
2025-01-08T20:23:06+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-01-17T17:35:00+00:00" ]
CVE-2001-0473
security flaw
None
null
null
Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands.
null
2025-01-08T20:32:04+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-09T00:00:00+00:00" ]
CVE-2001-0977
security flaw
None
null
null
slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field.
null
2025-01-08T20:24:20+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains \nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nUsers of Red Hat Linux 6.2 should note that the openldap package has been\nsplit into the openldap, openldap-servers, and openldap-clients packages.\nUsers may need to manually select the openldap-servers and\nopenldap-clients packages to ensure that they are upgraded properly.\n\nThis update also transitions users of Red Hat Linux 7 to OpenLDAP 2.0,\nwhich uses a different on-disk format for storing the LDBM databases\nwhich are used by slapd, the standalone LDAP server. Users who are\nrunning an OpenLDAP server will need to dump out their old databases by\nrunning \"ldbmcat -n\" and reload them using the \"slapadd\" command. They\nalso should ensuring that the \"ldap\" user continues to have read/write\naccess to the database files." ]
[ "2001-08-09T21:38:00+00:00" ]
CVE-2001-0131
httpd
allows local users to overwrite arbitrary files via a symlink attack
Low
null
2.8/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.
All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
2025-01-09T05:24:00+00:00
[]
[ "red_hat_jboss_enterprise_web_server_2:httpd", "red_hat_jboss_enterprise_web_server_2:httpd22" ]
[ "red_hat_enterprise_linux_5:httpd", "red_hat_enterprise_linux_6:httpd", "red_hat_enterprise_linux_7:httpd", "red_hat_enterprise_linux_8:httpd:2.4/httpd", "red_hat_jboss_core_services:httpd", "red_hat_software_collections:httpd24-httpd" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned" ]
[ "Out of support scope" ]
[ null ]
CVE-2001-1409
security flaw
Low
null
null
dexconf in XFree86 Xserver 4.1.0-2 creates the /dev/dri directory with insecure permissions (666), which allows local users to replace or create files in the root file system.
null
2025-01-08T20:23:37+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-06-25T12:23:00+00:00", "2003-06-25T15:51:00+00:00", "2003-06-25T15:52:00+00:00", "2003-06-25T12:49:00+00:00" ]
CVE-2001-1350
security flaw
None
null
null
Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter.
null
2025-01-08T20:24:36+00:00
[ "Red Hat Linux 7.0j" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-07-09T12:40:00+00:00" ]
CVE-2001-0691
security flaw
None
null
null
Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
null
2025-01-08T20:31:00+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-18T22:06:00+00:00" ]
CVE-2001-0279
security flaw
None
null
null
Buffer overflow in sudo earlier than 1.6.3p6 allows local users to gain root privileges.
null
2025-01-08T20:30:08+00:00
[ "Red Hat Linux 7.0", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-23T00:00:00+00:00" ]
CVE-2001-1413
security flaw
Moderate
null
null
Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument.
null
2025-01-08T20:26:54+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/" ]
[ "2004-12-13T19:31:00+00:00" ]
CVE-2001-1556
httpd
log files contain information directly supplied by clients and does not filter or quote control characters
Low
null
3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083.
2025-01-09T05:24:08+00:00
[]
[]
[ "red_hat_enterprise_linux_5:httpd", "red_hat_enterprise_linux_6:httpd", "red_hat_enterprise_linux_7:httpd", "red_hat_enterprise_linux_8:httpd:2.4/httpd", "red_hat_jboss_core_services:httpd", "red_hat_jboss_enterprise_web_server_2:httpd", "red_hat_jboss_enterprise_web_server_2:httpd22", "red_hat_software_collections:httpd24-httpd" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-1385
security flaw
None
null
null
The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts.
null
2025-01-08T20:25:22+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Because of dependencies, the packages must be installed as a group. No\nupdate for the mod_php package is provided for Red Hat Linux 7; it has been\nmerged into the updated php package.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Fvh php*\n\nThen restart your web server:\n\n/etc/rc.d/init.d/httpd restart" ]
[ "2000-12-20T00:00:00+00:00" ]
CVE-2001-0890
security flaw
None
null
null
Certain backend drivers in the SANE library 1.0.3 and earlier, as used in frontend software such as XSane, allows local users to modify files via a symlink attack on temporary files.
null
2025-01-08T20:27:42+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Powertools 6.0", "Red Hat Powertools 6.1", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-01-08T12:49:00+00:00", "2002-01-08T12:48:00+00:00" ]
CVE-2001-1002
security flaw
None
null
null
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands.
null
2025-01-08T20:23:31+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.0j", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find RHN to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will ultimately upgrade the\nappropriate RPMs on your system." ]
[ "2001-10-30T11:23:00+00:00" ]
CVE-2001-1147
security flaw
Important
null
null
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
null
2025-01-08T20:24:07+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-16T19:15:00+00:00" ]
CVE-2001-0886
security flaw
None
null
null
Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character.
null
2025-01-08T20:24:26+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-12-14T21:36:00+00:00" ]
CVE-2001-0869
security flaw
None
null
null
Format string vulnerability in the default logging callback function _sasl_syslog in common.c in Cyrus SASL library (cyrus-sasl) may allow remote attackers to execute arbitrary commands.
null
2025-01-08T20:27:54+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-29T18:51:00+00:00", "2001-11-29T18:55:00+00:00" ]
CVE-2001-1405
security flaw
None
null
null
Bugzilla before 2.14 does not restrict access to sanitycheck.cgi, which allows local users to cause a denial of service (CPU consumption) via a flood of requests to sanitycheck.cgi.
null
2025-01-08T20:25:46+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-1393
security flaw
None
null
null
Unknown vulnerability in classifier code for Linux kernel before 2.2.19 could result in denial of service (hang).
null
2025-01-08T20:26:18+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1392
security flaw
None
null
null
The Linux kernel before 2.2.19 does not have unregister calls for (1) CPUID and (2) MSR drivers, which could cause a DoS (crash) by unloading and reloading the drivers.
null
2025-01-08T20:23:20+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1404
security flaw
None
null
null
Bugzilla before 2.14 stores user passwords in plaintext and sends password requests in an email message, which could allow attackers to gain privileges.
null
2025-01-08T20:28:42+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-0887
security flaw
None
null
null
xSANE 0.81 and earlier allows local users to modify files of other xSANE users via a symlink attack on temporary files.
null
2025-01-08T20:24:04+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Powertools 6.0", "Red Hat Powertools 6.1", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-01-08T12:49:00+00:00", "2002-01-08T12:48:00+00:00" ]
CVE-2001-1279
security flaw
None
null
null
Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026.
null
2025-01-08T20:26:08+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-04-09T18:30:00+00:00" ]
CVE-2001-1384
security flaw
Important
null
null
ptrace in Linux 2.2.x through 2.2.19, and 2.4.x through 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp.
null
2025-01-08T20:28:42+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2001-10-18T22:31:00+00:00", "2001-10-23T07:44:00+00:00" ]
CVE-2001-0653
security flaw
None
null
null
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.
null
2025-01-08T20:29:28+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-13T20:25:00+00:00" ]
CVE-2001-0852
security flaw
Important
null
null
TUX HTTP server 2.1.0-2 in Red Hat Linux allows remote attackers to cause a denial of service via a long Host: header.
null
2025-01-08T20:33:40+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2001-11-02T20:08:00+00:00" ]
CVE-2001-0556
security flaw
None
null
null
The Nirvana Editor (NEdit) 5.1.1 and earlier allows a local attacker to overwrite other users' files via a symlink attack on (1) backup files or (2) temporary files used when nedit prints a file or portions of a file.
null
2025-01-08T20:31:46+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-08T14:04:00+00:00" ]
CVE-2001-0690
security flaw
None
null
null
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
null
2025-01-08T20:31:00+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-26T19:22:00+00:00" ]
CVE-2001-1351
security flaw
None
null
null
Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers.
null
2025-01-08T20:24:54+00:00
[ "Red Hat Linux 7.0j" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-07-09T12:40:00+00:00" ]
CVE-2001-0405
security flaw
Important
null
null
ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall.
null
2025-01-08T20:33:38+00:00
[ "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-22T21:12:00+00:00" ]
CVE-2001-0560
security flaw
None
null
null
Buffer overflow in Vixie cron 3.0.1-56 and earlier could allow a local attacker to gain additional privileges via a long username (> 20 characters).
null
2025-01-08T20:33:14+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-12T00:00:00+00:00" ]
CVE-2001-1275
security flaw
None
null
null
MySQL before 3.23.31 allows users with a MySQL account to use the SHOW GRANTS command to obtain the encrypted administrator password from the mysql.user table and possibly gain privileges via password cracking.
null
2025-01-08T20:25:00+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Because of dependencies, the packages must be installed as a group.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Uvh mysql*\n\nNote that in rare cases, the shutdown of the old database fails after\nupgrade - to ensure a smooth upgrade, shut the database down before\nupgrading:\n\nservice mysqld stop" ]
[ "2001-01-18T00:00:00+00:00" ]
CVE-2001-0872
security flaw
None
null
null
OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.
null
2025-01-08T20:24:14+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-12-05T01:13:00+00:00" ]
CVE-2001-1388
security flaw
None
null
null
iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.
null
2025-01-08T20:28:23+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-07T14:10:00+00:00" ]
CVE-2001-0825
security flaw
None
null
null
Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
null
2025-01-08T20:30:36+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-06T19:13:00+00:00" ]
CVE-2001-0736
security flaw
None
null
null
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
null
2025-01-08T20:30:14+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-31T00:00:00+00:00" ]
CVE-2001-1333
security flaw
None
null
null
Linux CUPS before 1.1.6 does not securely handle temporary files, possibly due to a symlink vulnerability that could allow local users to overwrite files.
null
2025-01-08T20:28:48+00:00
[ "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Uvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-03-15T12:36:00+00:00" ]
CVE-2001-0522
security flaw
None
null
null
Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an attacker to gain privileges via format strings in the original filename that is stored in an encrypted file.
null
2025-01-08T20:32:52+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-07T19:53:00+00:00" ]
CVE-2001-1276
security flaw
None
null
null
ispell before 3.1.20 allows local users to overwrite files of other users via a symlink attack on a temporary file.
null
2025-01-08T20:26:04+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-10T22:27:00+00:00" ]
CVE-2001-0060
security flaw
None
null
null
Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username.
null
2025-01-08T20:30:04+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-19T00:00:00+00:00" ]
CVE-2001-0670
security flaw
None
null
null
Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue.
null
2025-01-08T20:29:20+00:00
[ "Red Hat Linux 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-02T20:48:00+00:00" ]
CVE-2001-1391
security flaw
None
null
null
Off-by-one vulnerability in CPIA driver of Linux kernel before 2.2.19 allows users to modify kernel memory.
null
2025-01-08T20:24:03+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1407
security flaw
None
null
null
Bugzilla before 2.14 allows Bugzilla users to bypass group security checks by marking a bug as the duplicate of a restricted bug, which adds the user to the CC list of the restricted bug and allows the user to view the bug.
null
2025-01-08T20:26:51+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-0884
security flaw
None
null
null
Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users.
null
2025-01-08T20:24:43+00:00
[ "Red Hat Linux 7.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1", "Red Hat Secure Web Server 3.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe] desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-12-21T14:06:00+00:00", "2001-12-21T14:10:00+00:00", "2002-01-02T15:23:00+00:00" ]
CVE-2001-0191
security flaw
None
null
null
gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length.
null
2025-01-08T20:33:22+00:00
[ "Red Hat Linux 7.0", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-02T00:00:00+00:00", "2001-02-02T00:00:00+00:00" ]
CVE-2001-0596
security flaw
None
null
null
Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript.
null
2025-01-08T20:30:28+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-04-09T00:00:00+00:00" ]
CVE-2001-1387
security flaw
None
null
null
iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak.
null
2025-01-08T20:29:06+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-07T14:10:00+00:00" ]
CVE-2001-0851
security flaw
Important
null
null
Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.
null
2025-01-08T20:32:54+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2001-11-02T20:08:00+00:00" ]
CVE-2001-0406
security flaw
None
null
null
Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient.
null
2025-01-08T20:30:50+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAgain, note that the packages for Red Hat Linux 6.2 requre an updated\nlogrotate package." ]
[ "2001-05-15T02:21:00+00:00" ]
CVE-2001-1352
security flaw
None
null
null
Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter.
null
2025-01-08T20:28:18+00:00
[ "Red Hat Linux 7.0j" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-07-09T12:40:00+00:00" ]
CVE-2001-0328
kernel
TCP connection ISN hijacks
Low
2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N
null
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
2025-01-08T05:24:01+00:00
[]
[]
[ "red_hat_enterprise_linux_5:kernel", "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_mrg_2:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-1353
security flaw
None
null
null
ghostscript before 6.51 allows local users to read and write arbitrary files as the 'lp' user via the file operator, even with -dSAFER enabled.
null
2025-01-08T20:27:04+00:00
[ "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nAfter updating the rpms, you will need to restart your print server, by\nrunning:\n\n/sbin/service lpd restart\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-31T22:59:00+00:00" ]
CVE-2001-1083
security flaw
None
null
null
Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash).
null
2025-01-08T20:24:38+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-04-25T22:08:00+00:00" ]
CVE-2001-0554
security flaw
Critical
null
null
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
null
2025-01-08T20:31:18+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-08-09T22:14:00+00:00" ]
CVE-2001-0128
security flaw
None
null
null
Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
null
2025-01-08T20:32:31+00:00
[ "Red Hat Powertools 6.1", "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM.\n\nAfter you have applied the update, restart Zope." ]
[ "2000-12-18T00:00:00+00:00" ]
CVE-2001-0169
security flaw
None
null
null
When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
null
2025-01-08T20:29:28+00:00
[ "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2001-01-15T00:00:00+00:00" ]