cve
stringlengths
13
16
cwe
stringclasses
474 values
affected_component
stringlengths
0
177
summary
stringlengths
0
227
severity
stringclasses
5 values
cvss_v2
stringclasses
250 values
cvss_v3
stringlengths
37
48
description
stringlengths
30
4k
statement
stringlengths
1
3.47k
discovery_date
stringdate
2001-01-05 00:00:00
2025-07-18 20:00:43
release_date
stringdate
1999-01-01 00:00:00
2025-07-18 17:10:11
fixed_products
listlengths
0
28.2k
known_affected_products
listlengths
0
617
known_not_affected_products
listlengths
0
30.2k
under_investigation_products
listlengths
0
78
threat_categories
listlengths
0
4
threat_details
listlengths
0
4
threat_dates
listlengths
0
4
remediation_categories
listlengths
0
218
remediation_details
listlengths
0
218
remediation_dates
listlengths
0
218
CVE-2003-1332
null
samba
stack-based buffer overflow in the reply_nttrans()
Important
null
null
Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201.
null
2003-12-31T00:00:00+00:00
2003-12-31T00:00:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-20T21:19:00+00:00" ]
CVE-2003-0427
null
security flaw
Low
null
null
Buffer overflow in mikmod 3.1.6 and earlier allows remote attackers to execute arbitrary code via an archive file that contains a file with a long filename.
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
2003-06-13T00:00:00+00:00
2003-06-13T00:00:00+00:00
[ "3AS:mikmod-0:3.1.6-22.EL3.i386", "3AS:mikmod-0:3.1.6-22.EL3.ia64", "3AS:mikmod-0:3.1.6-22.EL3.ppc", "3AS:mikmod-0:3.1.6-22.EL3.ppc64", "3AS:mikmod-0:3.1.6-22.EL3.s390", "3AS:mikmod-0:3.1.6-22.EL3.s390x", "3AS:mikmod-0:3.1.6-22.EL3.src", "3AS:mikmod-0:3.1.6-22.EL3.x86_64", "3AS:mikmod-debuginfo-0:3.1.6-22.EL3.i386", "3AS:mikmod-debuginfo-0:3.1.6-22.EL3.ia64", "3AS:mikmod-debuginfo-0:3.1.6-22.EL3.ppc", "3AS:mikmod-debuginfo-0:3.1.6-22.EL3.ppc64", "3AS:mikmod-debuginfo-0:3.1.6-22.EL3.s390", "3AS:mikmod-debuginfo-0:3.1.6-22.EL3.s390x", "3AS:mikmod-debuginfo-0:3.1.6-22.EL3.x86_64", "3AS:mikmod-devel-0:3.1.6-22.EL3.i386", "3AS:mikmod-devel-0:3.1.6-22.EL3.ia64", "3AS:mikmod-devel-0:3.1.6-22.EL3.ppc", "3AS:mikmod-devel-0:3.1.6-22.EL3.s390", "3AS:mikmod-devel-0:3.1.6-22.EL3.s390x", "3AS:mikmod-devel-0:3.1.6-22.EL3.x86_64", "3Desktop:mikmod-0:3.1.6-22.EL3.i386", "3Desktop:mikmod-0:3.1.6-22.EL3.ia64", "3Desktop:mikmod-0:3.1.6-22.EL3.ppc", "3Desktop:mikmod-0:3.1.6-22.EL3.ppc64", "3Desktop:mikmod-0:3.1.6-22.EL3.s390", "3Desktop:mikmod-0:3.1.6-22.EL3.s390x", "3Desktop:mikmod-0:3.1.6-22.EL3.src", "3Desktop:mikmod-0:3.1.6-22.EL3.x86_64", "3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.i386", "3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.ia64", "3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.ppc", "3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.ppc64", "3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.s390", "3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.s390x", "3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.x86_64", "3Desktop:mikmod-devel-0:3.1.6-22.EL3.i386", "3Desktop:mikmod-devel-0:3.1.6-22.EL3.ia64", "3Desktop:mikmod-devel-0:3.1.6-22.EL3.ppc", "3Desktop:mikmod-devel-0:3.1.6-22.EL3.s390", "3Desktop:mikmod-devel-0:3.1.6-22.EL3.s390x", "3Desktop:mikmod-devel-0:3.1.6-22.EL3.x86_64", "3ES:mikmod-0:3.1.6-22.EL3.i386", "3ES:mikmod-0:3.1.6-22.EL3.ia64", "3ES:mikmod-0:3.1.6-22.EL3.ppc", "3ES:mikmod-0:3.1.6-22.EL3.ppc64", "3ES:mikmod-0:3.1.6-22.EL3.s390", "3ES:mikmod-0:3.1.6-22.EL3.s390x", "3ES:mikmod-0:3.1.6-22.EL3.src", "3ES:mikmod-0:3.1.6-22.EL3.x86_64", "3ES:mikmod-debuginfo-0:3.1.6-22.EL3.i386", "3ES:mikmod-debuginfo-0:3.1.6-22.EL3.ia64", "3ES:mikmod-debuginfo-0:3.1.6-22.EL3.ppc", "3ES:mikmod-debuginfo-0:3.1.6-22.EL3.ppc64", "3ES:mikmod-debuginfo-0:3.1.6-22.EL3.s390", "3ES:mikmod-debuginfo-0:3.1.6-22.EL3.s390x", "3ES:mikmod-debuginfo-0:3.1.6-22.EL3.x86_64", "3ES:mikmod-devel-0:3.1.6-22.EL3.i386", "3ES:mikmod-devel-0:3.1.6-22.EL3.ia64", "3ES:mikmod-devel-0:3.1.6-22.EL3.ppc", "3ES:mikmod-devel-0:3.1.6-22.EL3.s390", "3ES:mikmod-devel-0:3.1.6-22.EL3.s390x", "3ES:mikmod-devel-0:3.1.6-22.EL3.x86_64", "3WS:mikmod-0:3.1.6-22.EL3.i386", "3WS:mikmod-0:3.1.6-22.EL3.ia64", "3WS:mikmod-0:3.1.6-22.EL3.ppc", "3WS:mikmod-0:3.1.6-22.EL3.ppc64", "3WS:mikmod-0:3.1.6-22.EL3.s390", "3WS:mikmod-0:3.1.6-22.EL3.s390x", "3WS:mikmod-0:3.1.6-22.EL3.src", "3WS:mikmod-0:3.1.6-22.EL3.x86_64", "3WS:mikmod-debuginfo-0:3.1.6-22.EL3.i386", "3WS:mikmod-debuginfo-0:3.1.6-22.EL3.ia64", "3WS:mikmod-debuginfo-0:3.1.6-22.EL3.ppc", "3WS:mikmod-debuginfo-0:3.1.6-22.EL3.ppc64", "3WS:mikmod-debuginfo-0:3.1.6-22.EL3.s390", "3WS:mikmod-debuginfo-0:3.1.6-22.EL3.s390x", "3WS:mikmod-debuginfo-0:3.1.6-22.EL3.x86_64", "3WS:mikmod-devel-0:3.1.6-22.EL3.i386", "3WS:mikmod-devel-0:3.1.6-22.EL3.ia64", "3WS:mikmod-devel-0:3.1.6-22.EL3.ppc", "3WS:mikmod-devel-0:3.1.6-22.EL3.s390", "3WS:mikmod-devel-0:3.1.6-22.EL3.s390x", "3WS:mikmod-devel-0:3.1.6-22.EL3.x86_64", "4AS:mikmod-0:3.1.6-32.EL4.i386", "4AS:mikmod-0:3.1.6-32.EL4.ia64", "4AS:mikmod-0:3.1.6-32.EL4.ppc", "4AS:mikmod-0:3.1.6-32.EL4.ppc64", "4AS:mikmod-0:3.1.6-32.EL4.s390", "4AS:mikmod-0:3.1.6-32.EL4.s390x", "4AS:mikmod-0:3.1.6-32.EL4.src", "4AS:mikmod-0:3.1.6-32.EL4.x86_64", "4AS:mikmod-debuginfo-0:3.1.6-32.EL4.i386", "4AS:mikmod-debuginfo-0:3.1.6-32.EL4.ia64", "4AS:mikmod-debuginfo-0:3.1.6-32.EL4.ppc", "4AS:mikmod-debuginfo-0:3.1.6-32.EL4.ppc64", "4AS:mikmod-debuginfo-0:3.1.6-32.EL4.s390", "4AS:mikmod-debuginfo-0:3.1.6-32.EL4.s390x", "4AS:mikmod-debuginfo-0:3.1.6-32.EL4.x86_64", "4AS:mikmod-devel-0:3.1.6-32.EL4.i386", "4AS:mikmod-devel-0:3.1.6-32.EL4.ia64", "4AS:mikmod-devel-0:3.1.6-32.EL4.ppc", "4AS:mikmod-devel-0:3.1.6-32.EL4.s390", "4AS:mikmod-devel-0:3.1.6-32.EL4.s390x", "4AS:mikmod-devel-0:3.1.6-32.EL4.x86_64", "4Desktop:mikmod-0:3.1.6-32.EL4.i386", "4Desktop:mikmod-0:3.1.6-32.EL4.ia64", "4Desktop:mikmod-0:3.1.6-32.EL4.ppc", "4Desktop:mikmod-0:3.1.6-32.EL4.ppc64", "4Desktop:mikmod-0:3.1.6-32.EL4.s390", "4Desktop:mikmod-0:3.1.6-32.EL4.s390x", "4Desktop:mikmod-0:3.1.6-32.EL4.src", "4Desktop:mikmod-0:3.1.6-32.EL4.x86_64", "4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.i386", "4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.ia64", "4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.ppc", "4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.ppc64", "4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.s390", "4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.s390x", "4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.x86_64", "4Desktop:mikmod-devel-0:3.1.6-32.EL4.i386", "4Desktop:mikmod-devel-0:3.1.6-32.EL4.ia64", "4Desktop:mikmod-devel-0:3.1.6-32.EL4.ppc", "4Desktop:mikmod-devel-0:3.1.6-32.EL4.s390", "4Desktop:mikmod-devel-0:3.1.6-32.EL4.s390x", "4Desktop:mikmod-devel-0:3.1.6-32.EL4.x86_64", "4ES:mikmod-0:3.1.6-32.EL4.i386", "4ES:mikmod-0:3.1.6-32.EL4.ia64", "4ES:mikmod-0:3.1.6-32.EL4.ppc", "4ES:mikmod-0:3.1.6-32.EL4.ppc64", "4ES:mikmod-0:3.1.6-32.EL4.s390", "4ES:mikmod-0:3.1.6-32.EL4.s390x", "4ES:mikmod-0:3.1.6-32.EL4.src", "4ES:mikmod-0:3.1.6-32.EL4.x86_64", "4ES:mikmod-debuginfo-0:3.1.6-32.EL4.i386", "4ES:mikmod-debuginfo-0:3.1.6-32.EL4.ia64", "4ES:mikmod-debuginfo-0:3.1.6-32.EL4.ppc", "4ES:mikmod-debuginfo-0:3.1.6-32.EL4.ppc64", "4ES:mikmod-debuginfo-0:3.1.6-32.EL4.s390", "4ES:mikmod-debuginfo-0:3.1.6-32.EL4.s390x", "4ES:mikmod-debuginfo-0:3.1.6-32.EL4.x86_64", "4ES:mikmod-devel-0:3.1.6-32.EL4.i386", "4ES:mikmod-devel-0:3.1.6-32.EL4.ia64", "4ES:mikmod-devel-0:3.1.6-32.EL4.ppc", "4ES:mikmod-devel-0:3.1.6-32.EL4.s390", "4ES:mikmod-devel-0:3.1.6-32.EL4.s390x", "4ES:mikmod-devel-0:3.1.6-32.EL4.x86_64", "4WS:mikmod-0:3.1.6-32.EL4.i386", "4WS:mikmod-0:3.1.6-32.EL4.ia64", "4WS:mikmod-0:3.1.6-32.EL4.ppc", "4WS:mikmod-0:3.1.6-32.EL4.ppc64", "4WS:mikmod-0:3.1.6-32.EL4.s390", "4WS:mikmod-0:3.1.6-32.EL4.s390x", "4WS:mikmod-0:3.1.6-32.EL4.src", "4WS:mikmod-0:3.1.6-32.EL4.x86_64", "4WS:mikmod-debuginfo-0:3.1.6-32.EL4.i386", "4WS:mikmod-debuginfo-0:3.1.6-32.EL4.ia64", "4WS:mikmod-debuginfo-0:3.1.6-32.EL4.ppc", "4WS:mikmod-debuginfo-0:3.1.6-32.EL4.ppc64", "4WS:mikmod-debuginfo-0:3.1.6-32.EL4.s390", "4WS:mikmod-debuginfo-0:3.1.6-32.EL4.s390x", "4WS:mikmod-debuginfo-0:3.1.6-32.EL4.x86_64", "4WS:mikmod-devel-0:3.1.6-32.EL4.i386", "4WS:mikmod-devel-0:3.1.6-32.EL4.ia64", "4WS:mikmod-devel-0:3.1.6-32.EL4.ppc", "4WS:mikmod-devel-0:3.1.6-32.EL4.s390", "4WS:mikmod-devel-0:3.1.6-32.EL4.s390x", "4WS:mikmod-devel-0:3.1.6-32.EL4.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2005-06-13T12:18:00+00:00" ]
CVE-2003-1303
null
security flaw
Important
null
null
Buffer overflow in the imap_fetch_overview function in the IMAP functionality (php_imap.c) in PHP before 4.3.3 allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long e-mail address in a (1) To or (2) From header.
null
2003-06-12T00:00:00+00:00
2003-06-12T00:00:00+00:00
[ "3AS:php-0:4.3.2-30.ent.i386", "3AS:php-0:4.3.2-30.ent.ia64", "3AS:php-0:4.3.2-30.ent.ppc", "3AS:php-0:4.3.2-30.ent.s390", "3AS:php-0:4.3.2-30.ent.s390x", "3AS:php-0:4.3.2-30.ent.src", "3AS:php-0:4.3.2-30.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-30.ent.i386", "3AS:php-debuginfo-0:4.3.2-30.ent.ia64", "3AS:php-debuginfo-0:4.3.2-30.ent.ppc", "3AS:php-debuginfo-0:4.3.2-30.ent.s390", "3AS:php-debuginfo-0:4.3.2-30.ent.s390x", "3AS:php-debuginfo-0:4.3.2-30.ent.x86_64", "3AS:php-devel-0:4.3.2-30.ent.i386", "3AS:php-devel-0:4.3.2-30.ent.ia64", "3AS:php-devel-0:4.3.2-30.ent.ppc", "3AS:php-devel-0:4.3.2-30.ent.s390", "3AS:php-devel-0:4.3.2-30.ent.s390x", "3AS:php-devel-0:4.3.2-30.ent.x86_64", "3AS:php-imap-0:4.3.2-30.ent.i386", "3AS:php-imap-0:4.3.2-30.ent.ia64", "3AS:php-imap-0:4.3.2-30.ent.ppc", "3AS:php-imap-0:4.3.2-30.ent.s390", "3AS:php-imap-0:4.3.2-30.ent.s390x", "3AS:php-imap-0:4.3.2-30.ent.x86_64", "3AS:php-ldap-0:4.3.2-30.ent.i386", "3AS:php-ldap-0:4.3.2-30.ent.ia64", "3AS:php-ldap-0:4.3.2-30.ent.ppc", "3AS:php-ldap-0:4.3.2-30.ent.s390", "3AS:php-ldap-0:4.3.2-30.ent.s390x", "3AS:php-ldap-0:4.3.2-30.ent.x86_64", "3AS:php-mysql-0:4.3.2-30.ent.i386", "3AS:php-mysql-0:4.3.2-30.ent.ia64", "3AS:php-mysql-0:4.3.2-30.ent.ppc", "3AS:php-mysql-0:4.3.2-30.ent.s390", "3AS:php-mysql-0:4.3.2-30.ent.s390x", "3AS:php-mysql-0:4.3.2-30.ent.x86_64", "3AS:php-odbc-0:4.3.2-30.ent.i386", "3AS:php-odbc-0:4.3.2-30.ent.ia64", "3AS:php-odbc-0:4.3.2-30.ent.ppc", "3AS:php-odbc-0:4.3.2-30.ent.s390", "3AS:php-odbc-0:4.3.2-30.ent.s390x", "3AS:php-odbc-0:4.3.2-30.ent.x86_64", "3AS:php-pgsql-0:4.3.2-30.ent.i386", "3AS:php-pgsql-0:4.3.2-30.ent.ia64", "3AS:php-pgsql-0:4.3.2-30.ent.ppc", "3AS:php-pgsql-0:4.3.2-30.ent.s390", "3AS:php-pgsql-0:4.3.2-30.ent.s390x", "3AS:php-pgsql-0:4.3.2-30.ent.x86_64", "3Desktop:php-0:4.3.2-30.ent.i386", "3Desktop:php-0:4.3.2-30.ent.ia64", "3Desktop:php-0:4.3.2-30.ent.ppc", "3Desktop:php-0:4.3.2-30.ent.s390", "3Desktop:php-0:4.3.2-30.ent.s390x", "3Desktop:php-0:4.3.2-30.ent.src", "3Desktop:php-0:4.3.2-30.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-30.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-30.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-30.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-30.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-30.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-30.ent.x86_64", "3Desktop:php-devel-0:4.3.2-30.ent.i386", "3Desktop:php-devel-0:4.3.2-30.ent.ia64", "3Desktop:php-devel-0:4.3.2-30.ent.ppc", "3Desktop:php-devel-0:4.3.2-30.ent.s390", "3Desktop:php-devel-0:4.3.2-30.ent.s390x", "3Desktop:php-devel-0:4.3.2-30.ent.x86_64", "3Desktop:php-imap-0:4.3.2-30.ent.i386", "3Desktop:php-imap-0:4.3.2-30.ent.ia64", "3Desktop:php-imap-0:4.3.2-30.ent.ppc", "3Desktop:php-imap-0:4.3.2-30.ent.s390", "3Desktop:php-imap-0:4.3.2-30.ent.s390x", "3Desktop:php-imap-0:4.3.2-30.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-30.ent.i386", "3Desktop:php-ldap-0:4.3.2-30.ent.ia64", "3Desktop:php-ldap-0:4.3.2-30.ent.ppc", "3Desktop:php-ldap-0:4.3.2-30.ent.s390", "3Desktop:php-ldap-0:4.3.2-30.ent.s390x", "3Desktop:php-ldap-0:4.3.2-30.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-30.ent.i386", "3Desktop:php-mysql-0:4.3.2-30.ent.ia64", "3Desktop:php-mysql-0:4.3.2-30.ent.ppc", "3Desktop:php-mysql-0:4.3.2-30.ent.s390", "3Desktop:php-mysql-0:4.3.2-30.ent.s390x", "3Desktop:php-mysql-0:4.3.2-30.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-30.ent.i386", "3Desktop:php-odbc-0:4.3.2-30.ent.ia64", "3Desktop:php-odbc-0:4.3.2-30.ent.ppc", "3Desktop:php-odbc-0:4.3.2-30.ent.s390", "3Desktop:php-odbc-0:4.3.2-30.ent.s390x", "3Desktop:php-odbc-0:4.3.2-30.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-30.ent.i386", "3Desktop:php-pgsql-0:4.3.2-30.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-30.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-30.ent.s390", "3Desktop:php-pgsql-0:4.3.2-30.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-30.ent.x86_64", "3ES:php-0:4.3.2-30.ent.i386", "3ES:php-0:4.3.2-30.ent.ia64", "3ES:php-0:4.3.2-30.ent.ppc", "3ES:php-0:4.3.2-30.ent.s390", "3ES:php-0:4.3.2-30.ent.s390x", "3ES:php-0:4.3.2-30.ent.src", "3ES:php-0:4.3.2-30.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-30.ent.i386", "3ES:php-debuginfo-0:4.3.2-30.ent.ia64", "3ES:php-debuginfo-0:4.3.2-30.ent.ppc", "3ES:php-debuginfo-0:4.3.2-30.ent.s390", "3ES:php-debuginfo-0:4.3.2-30.ent.s390x", "3ES:php-debuginfo-0:4.3.2-30.ent.x86_64", "3ES:php-devel-0:4.3.2-30.ent.i386", "3ES:php-devel-0:4.3.2-30.ent.ia64", "3ES:php-devel-0:4.3.2-30.ent.ppc", "3ES:php-devel-0:4.3.2-30.ent.s390", "3ES:php-devel-0:4.3.2-30.ent.s390x", "3ES:php-devel-0:4.3.2-30.ent.x86_64", "3ES:php-imap-0:4.3.2-30.ent.i386", "3ES:php-imap-0:4.3.2-30.ent.ia64", "3ES:php-imap-0:4.3.2-30.ent.ppc", "3ES:php-imap-0:4.3.2-30.ent.s390", "3ES:php-imap-0:4.3.2-30.ent.s390x", "3ES:php-imap-0:4.3.2-30.ent.x86_64", "3ES:php-ldap-0:4.3.2-30.ent.i386", "3ES:php-ldap-0:4.3.2-30.ent.ia64", "3ES:php-ldap-0:4.3.2-30.ent.ppc", "3ES:php-ldap-0:4.3.2-30.ent.s390", "3ES:php-ldap-0:4.3.2-30.ent.s390x", "3ES:php-ldap-0:4.3.2-30.ent.x86_64", "3ES:php-mysql-0:4.3.2-30.ent.i386", "3ES:php-mysql-0:4.3.2-30.ent.ia64", "3ES:php-mysql-0:4.3.2-30.ent.ppc", "3ES:php-mysql-0:4.3.2-30.ent.s390", "3ES:php-mysql-0:4.3.2-30.ent.s390x", "3ES:php-mysql-0:4.3.2-30.ent.x86_64", "3ES:php-odbc-0:4.3.2-30.ent.i386", "3ES:php-odbc-0:4.3.2-30.ent.ia64", "3ES:php-odbc-0:4.3.2-30.ent.ppc", "3ES:php-odbc-0:4.3.2-30.ent.s390", "3ES:php-odbc-0:4.3.2-30.ent.s390x", "3ES:php-odbc-0:4.3.2-30.ent.x86_64", "3ES:php-pgsql-0:4.3.2-30.ent.i386", "3ES:php-pgsql-0:4.3.2-30.ent.ia64", "3ES:php-pgsql-0:4.3.2-30.ent.ppc", "3ES:php-pgsql-0:4.3.2-30.ent.s390", "3ES:php-pgsql-0:4.3.2-30.ent.s390x", "3ES:php-pgsql-0:4.3.2-30.ent.x86_64", "3WS:php-0:4.3.2-30.ent.i386", "3WS:php-0:4.3.2-30.ent.ia64", "3WS:php-0:4.3.2-30.ent.ppc", "3WS:php-0:4.3.2-30.ent.s390", "3WS:php-0:4.3.2-30.ent.s390x", "3WS:php-0:4.3.2-30.ent.src", "3WS:php-0:4.3.2-30.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-30.ent.i386", "3WS:php-debuginfo-0:4.3.2-30.ent.ia64", "3WS:php-debuginfo-0:4.3.2-30.ent.ppc", "3WS:php-debuginfo-0:4.3.2-30.ent.s390", "3WS:php-debuginfo-0:4.3.2-30.ent.s390x", "3WS:php-debuginfo-0:4.3.2-30.ent.x86_64", "3WS:php-devel-0:4.3.2-30.ent.i386", "3WS:php-devel-0:4.3.2-30.ent.ia64", "3WS:php-devel-0:4.3.2-30.ent.ppc", "3WS:php-devel-0:4.3.2-30.ent.s390", "3WS:php-devel-0:4.3.2-30.ent.s390x", "3WS:php-devel-0:4.3.2-30.ent.x86_64", "3WS:php-imap-0:4.3.2-30.ent.i386", "3WS:php-imap-0:4.3.2-30.ent.ia64", "3WS:php-imap-0:4.3.2-30.ent.ppc", "3WS:php-imap-0:4.3.2-30.ent.s390", "3WS:php-imap-0:4.3.2-30.ent.s390x", "3WS:php-imap-0:4.3.2-30.ent.x86_64", "3WS:php-ldap-0:4.3.2-30.ent.i386", "3WS:php-ldap-0:4.3.2-30.ent.ia64", "3WS:php-ldap-0:4.3.2-30.ent.ppc", "3WS:php-ldap-0:4.3.2-30.ent.s390", "3WS:php-ldap-0:4.3.2-30.ent.s390x", "3WS:php-ldap-0:4.3.2-30.ent.x86_64", "3WS:php-mysql-0:4.3.2-30.ent.i386", "3WS:php-mysql-0:4.3.2-30.ent.ia64", "3WS:php-mysql-0:4.3.2-30.ent.ppc", "3WS:php-mysql-0:4.3.2-30.ent.s390", "3WS:php-mysql-0:4.3.2-30.ent.s390x", "3WS:php-mysql-0:4.3.2-30.ent.x86_64", "3WS:php-odbc-0:4.3.2-30.ent.i386", "3WS:php-odbc-0:4.3.2-30.ent.ia64", "3WS:php-odbc-0:4.3.2-30.ent.ppc", "3WS:php-odbc-0:4.3.2-30.ent.s390", "3WS:php-odbc-0:4.3.2-30.ent.s390x", "3WS:php-odbc-0:4.3.2-30.ent.x86_64", "3WS:php-pgsql-0:4.3.2-30.ent.i386", "3WS:php-pgsql-0:4.3.2-30.ent.ia64", "3WS:php-pgsql-0:4.3.2-30.ent.ppc", "3WS:php-pgsql-0:4.3.2-30.ent.s390", "3WS:php-pgsql-0:4.3.2-30.ent.s390x", "3WS:php-pgsql-0:4.3.2-30.ent.x86_64", "4AS:php-0:4.3.9-3.12.i386", "4AS:php-0:4.3.9-3.12.ia64", "4AS:php-0:4.3.9-3.12.ppc", "4AS:php-0:4.3.9-3.12.s390", "4AS:php-0:4.3.9-3.12.s390x", "4AS:php-0:4.3.9-3.12.src", "4AS:php-0:4.3.9-3.12.x86_64", "4AS:php-debuginfo-0:4.3.9-3.12.i386", "4AS:php-debuginfo-0:4.3.9-3.12.ia64", "4AS:php-debuginfo-0:4.3.9-3.12.ppc", "4AS:php-debuginfo-0:4.3.9-3.12.s390", "4AS:php-debuginfo-0:4.3.9-3.12.s390x", "4AS:php-debuginfo-0:4.3.9-3.12.x86_64", "4AS:php-devel-0:4.3.9-3.12.i386", "4AS:php-devel-0:4.3.9-3.12.ia64", "4AS:php-devel-0:4.3.9-3.12.ppc", "4AS:php-devel-0:4.3.9-3.12.s390", "4AS:php-devel-0:4.3.9-3.12.s390x", "4AS:php-devel-0:4.3.9-3.12.x86_64", "4AS:php-domxml-0:4.3.9-3.12.i386", "4AS:php-domxml-0:4.3.9-3.12.ia64", "4AS:php-domxml-0:4.3.9-3.12.ppc", "4AS:php-domxml-0:4.3.9-3.12.s390", "4AS:php-domxml-0:4.3.9-3.12.s390x", "4AS:php-domxml-0:4.3.9-3.12.x86_64", "4AS:php-gd-0:4.3.9-3.12.i386", "4AS:php-gd-0:4.3.9-3.12.ia64", "4AS:php-gd-0:4.3.9-3.12.ppc", "4AS:php-gd-0:4.3.9-3.12.s390", "4AS:php-gd-0:4.3.9-3.12.s390x", "4AS:php-gd-0:4.3.9-3.12.x86_64", "4AS:php-imap-0:4.3.9-3.12.i386", "4AS:php-imap-0:4.3.9-3.12.ia64", "4AS:php-imap-0:4.3.9-3.12.ppc", "4AS:php-imap-0:4.3.9-3.12.s390", "4AS:php-imap-0:4.3.9-3.12.s390x", "4AS:php-imap-0:4.3.9-3.12.x86_64", "4AS:php-ldap-0:4.3.9-3.12.i386", "4AS:php-ldap-0:4.3.9-3.12.ia64", "4AS:php-ldap-0:4.3.9-3.12.ppc", "4AS:php-ldap-0:4.3.9-3.12.s390", "4AS:php-ldap-0:4.3.9-3.12.s390x", "4AS:php-ldap-0:4.3.9-3.12.x86_64", "4AS:php-mbstring-0:4.3.9-3.12.i386", "4AS:php-mbstring-0:4.3.9-3.12.ia64", "4AS:php-mbstring-0:4.3.9-3.12.ppc", "4AS:php-mbstring-0:4.3.9-3.12.s390", "4AS:php-mbstring-0:4.3.9-3.12.s390x", "4AS:php-mbstring-0:4.3.9-3.12.x86_64", "4AS:php-mysql-0:4.3.9-3.12.i386", "4AS:php-mysql-0:4.3.9-3.12.ia64", "4AS:php-mysql-0:4.3.9-3.12.ppc", "4AS:php-mysql-0:4.3.9-3.12.s390", "4AS:php-mysql-0:4.3.9-3.12.s390x", "4AS:php-mysql-0:4.3.9-3.12.x86_64", "4AS:php-ncurses-0:4.3.9-3.12.i386", "4AS:php-ncurses-0:4.3.9-3.12.ia64", "4AS:php-ncurses-0:4.3.9-3.12.ppc", "4AS:php-ncurses-0:4.3.9-3.12.s390", "4AS:php-ncurses-0:4.3.9-3.12.s390x", "4AS:php-ncurses-0:4.3.9-3.12.x86_64", "4AS:php-odbc-0:4.3.9-3.12.i386", "4AS:php-odbc-0:4.3.9-3.12.ia64", "4AS:php-odbc-0:4.3.9-3.12.ppc", "4AS:php-odbc-0:4.3.9-3.12.s390", "4AS:php-odbc-0:4.3.9-3.12.s390x", "4AS:php-odbc-0:4.3.9-3.12.x86_64", "4AS:php-pear-0:4.3.9-3.12.i386", "4AS:php-pear-0:4.3.9-3.12.ia64", "4AS:php-pear-0:4.3.9-3.12.ppc", "4AS:php-pear-0:4.3.9-3.12.s390", "4AS:php-pear-0:4.3.9-3.12.s390x", "4AS:php-pear-0:4.3.9-3.12.x86_64", "4AS:php-pgsql-0:4.3.9-3.12.i386", "4AS:php-pgsql-0:4.3.9-3.12.ia64", "4AS:php-pgsql-0:4.3.9-3.12.ppc", "4AS:php-pgsql-0:4.3.9-3.12.s390", "4AS:php-pgsql-0:4.3.9-3.12.s390x", "4AS:php-pgsql-0:4.3.9-3.12.x86_64", "4AS:php-snmp-0:4.3.9-3.12.i386", "4AS:php-snmp-0:4.3.9-3.12.ia64", "4AS:php-snmp-0:4.3.9-3.12.ppc", "4AS:php-snmp-0:4.3.9-3.12.s390", "4AS:php-snmp-0:4.3.9-3.12.s390x", "4AS:php-snmp-0:4.3.9-3.12.x86_64", "4AS:php-xmlrpc-0:4.3.9-3.12.i386", "4AS:php-xmlrpc-0:4.3.9-3.12.ia64", "4AS:php-xmlrpc-0:4.3.9-3.12.ppc", "4AS:php-xmlrpc-0:4.3.9-3.12.s390", "4AS:php-xmlrpc-0:4.3.9-3.12.s390x", "4AS:php-xmlrpc-0:4.3.9-3.12.x86_64", "4Desktop:php-0:4.3.9-3.12.i386", "4Desktop:php-0:4.3.9-3.12.ia64", "4Desktop:php-0:4.3.9-3.12.ppc", "4Desktop:php-0:4.3.9-3.12.s390", "4Desktop:php-0:4.3.9-3.12.s390x", "4Desktop:php-0:4.3.9-3.12.src", "4Desktop:php-0:4.3.9-3.12.x86_64", "4Desktop:php-debuginfo-0:4.3.9-3.12.i386", "4Desktop:php-debuginfo-0:4.3.9-3.12.ia64", "4Desktop:php-debuginfo-0:4.3.9-3.12.ppc", "4Desktop:php-debuginfo-0:4.3.9-3.12.s390", "4Desktop:php-debuginfo-0:4.3.9-3.12.s390x", "4Desktop:php-debuginfo-0:4.3.9-3.12.x86_64", "4Desktop:php-devel-0:4.3.9-3.12.i386", "4Desktop:php-devel-0:4.3.9-3.12.ia64", "4Desktop:php-devel-0:4.3.9-3.12.ppc", "4Desktop:php-devel-0:4.3.9-3.12.s390", "4Desktop:php-devel-0:4.3.9-3.12.s390x", "4Desktop:php-devel-0:4.3.9-3.12.x86_64", "4Desktop:php-domxml-0:4.3.9-3.12.i386", "4Desktop:php-domxml-0:4.3.9-3.12.ia64", "4Desktop:php-domxml-0:4.3.9-3.12.ppc", "4Desktop:php-domxml-0:4.3.9-3.12.s390", "4Desktop:php-domxml-0:4.3.9-3.12.s390x", "4Desktop:php-domxml-0:4.3.9-3.12.x86_64", "4Desktop:php-gd-0:4.3.9-3.12.i386", "4Desktop:php-gd-0:4.3.9-3.12.ia64", "4Desktop:php-gd-0:4.3.9-3.12.ppc", "4Desktop:php-gd-0:4.3.9-3.12.s390", "4Desktop:php-gd-0:4.3.9-3.12.s390x", "4Desktop:php-gd-0:4.3.9-3.12.x86_64", "4Desktop:php-imap-0:4.3.9-3.12.i386", "4Desktop:php-imap-0:4.3.9-3.12.ia64", "4Desktop:php-imap-0:4.3.9-3.12.ppc", "4Desktop:php-imap-0:4.3.9-3.12.s390", "4Desktop:php-imap-0:4.3.9-3.12.s390x", "4Desktop:php-imap-0:4.3.9-3.12.x86_64", "4Desktop:php-ldap-0:4.3.9-3.12.i386", "4Desktop:php-ldap-0:4.3.9-3.12.ia64", "4Desktop:php-ldap-0:4.3.9-3.12.ppc", "4Desktop:php-ldap-0:4.3.9-3.12.s390", "4Desktop:php-ldap-0:4.3.9-3.12.s390x", "4Desktop:php-ldap-0:4.3.9-3.12.x86_64", "4Desktop:php-mbstring-0:4.3.9-3.12.i386", "4Desktop:php-mbstring-0:4.3.9-3.12.ia64", "4Desktop:php-mbstring-0:4.3.9-3.12.ppc", "4Desktop:php-mbstring-0:4.3.9-3.12.s390", "4Desktop:php-mbstring-0:4.3.9-3.12.s390x", "4Desktop:php-mbstring-0:4.3.9-3.12.x86_64", "4Desktop:php-mysql-0:4.3.9-3.12.i386", "4Desktop:php-mysql-0:4.3.9-3.12.ia64", "4Desktop:php-mysql-0:4.3.9-3.12.ppc", "4Desktop:php-mysql-0:4.3.9-3.12.s390", "4Desktop:php-mysql-0:4.3.9-3.12.s390x", "4Desktop:php-mysql-0:4.3.9-3.12.x86_64", "4Desktop:php-ncurses-0:4.3.9-3.12.i386", "4Desktop:php-ncurses-0:4.3.9-3.12.ia64", "4Desktop:php-ncurses-0:4.3.9-3.12.ppc", "4Desktop:php-ncurses-0:4.3.9-3.12.s390", "4Desktop:php-ncurses-0:4.3.9-3.12.s390x", "4Desktop:php-ncurses-0:4.3.9-3.12.x86_64", "4Desktop:php-odbc-0:4.3.9-3.12.i386", "4Desktop:php-odbc-0:4.3.9-3.12.ia64", "4Desktop:php-odbc-0:4.3.9-3.12.ppc", "4Desktop:php-odbc-0:4.3.9-3.12.s390", "4Desktop:php-odbc-0:4.3.9-3.12.s390x", "4Desktop:php-odbc-0:4.3.9-3.12.x86_64", "4Desktop:php-pear-0:4.3.9-3.12.i386", "4Desktop:php-pear-0:4.3.9-3.12.ia64", "4Desktop:php-pear-0:4.3.9-3.12.ppc", "4Desktop:php-pear-0:4.3.9-3.12.s390", "4Desktop:php-pear-0:4.3.9-3.12.s390x", "4Desktop:php-pear-0:4.3.9-3.12.x86_64", "4Desktop:php-pgsql-0:4.3.9-3.12.i386", "4Desktop:php-pgsql-0:4.3.9-3.12.ia64", "4Desktop:php-pgsql-0:4.3.9-3.12.ppc", "4Desktop:php-pgsql-0:4.3.9-3.12.s390", "4Desktop:php-pgsql-0:4.3.9-3.12.s390x", "4Desktop:php-pgsql-0:4.3.9-3.12.x86_64", "4Desktop:php-snmp-0:4.3.9-3.12.i386", "4Desktop:php-snmp-0:4.3.9-3.12.ia64", "4Desktop:php-snmp-0:4.3.9-3.12.ppc", "4Desktop:php-snmp-0:4.3.9-3.12.s390", "4Desktop:php-snmp-0:4.3.9-3.12.s390x", "4Desktop:php-snmp-0:4.3.9-3.12.x86_64", "4Desktop:php-xmlrpc-0:4.3.9-3.12.i386", "4Desktop:php-xmlrpc-0:4.3.9-3.12.ia64", "4Desktop:php-xmlrpc-0:4.3.9-3.12.ppc", "4Desktop:php-xmlrpc-0:4.3.9-3.12.s390", "4Desktop:php-xmlrpc-0:4.3.9-3.12.s390x", "4Desktop:php-xmlrpc-0:4.3.9-3.12.x86_64", "4ES:php-0:4.3.9-3.12.i386", "4ES:php-0:4.3.9-3.12.ia64", "4ES:php-0:4.3.9-3.12.ppc", "4ES:php-0:4.3.9-3.12.s390", "4ES:php-0:4.3.9-3.12.s390x", "4ES:php-0:4.3.9-3.12.src", "4ES:php-0:4.3.9-3.12.x86_64", "4ES:php-debuginfo-0:4.3.9-3.12.i386", "4ES:php-debuginfo-0:4.3.9-3.12.ia64", "4ES:php-debuginfo-0:4.3.9-3.12.ppc", "4ES:php-debuginfo-0:4.3.9-3.12.s390", "4ES:php-debuginfo-0:4.3.9-3.12.s390x", "4ES:php-debuginfo-0:4.3.9-3.12.x86_64", "4ES:php-devel-0:4.3.9-3.12.i386", "4ES:php-devel-0:4.3.9-3.12.ia64", "4ES:php-devel-0:4.3.9-3.12.ppc", "4ES:php-devel-0:4.3.9-3.12.s390", "4ES:php-devel-0:4.3.9-3.12.s390x", "4ES:php-devel-0:4.3.9-3.12.x86_64", "4ES:php-domxml-0:4.3.9-3.12.i386", "4ES:php-domxml-0:4.3.9-3.12.ia64", "4ES:php-domxml-0:4.3.9-3.12.ppc", "4ES:php-domxml-0:4.3.9-3.12.s390", "4ES:php-domxml-0:4.3.9-3.12.s390x", "4ES:php-domxml-0:4.3.9-3.12.x86_64", "4ES:php-gd-0:4.3.9-3.12.i386", "4ES:php-gd-0:4.3.9-3.12.ia64", "4ES:php-gd-0:4.3.9-3.12.ppc", "4ES:php-gd-0:4.3.9-3.12.s390", "4ES:php-gd-0:4.3.9-3.12.s390x", "4ES:php-gd-0:4.3.9-3.12.x86_64", "4ES:php-imap-0:4.3.9-3.12.i386", "4ES:php-imap-0:4.3.9-3.12.ia64", "4ES:php-imap-0:4.3.9-3.12.ppc", "4ES:php-imap-0:4.3.9-3.12.s390", "4ES:php-imap-0:4.3.9-3.12.s390x", "4ES:php-imap-0:4.3.9-3.12.x86_64", "4ES:php-ldap-0:4.3.9-3.12.i386", "4ES:php-ldap-0:4.3.9-3.12.ia64", "4ES:php-ldap-0:4.3.9-3.12.ppc", "4ES:php-ldap-0:4.3.9-3.12.s390", "4ES:php-ldap-0:4.3.9-3.12.s390x", "4ES:php-ldap-0:4.3.9-3.12.x86_64", "4ES:php-mbstring-0:4.3.9-3.12.i386", "4ES:php-mbstring-0:4.3.9-3.12.ia64", "4ES:php-mbstring-0:4.3.9-3.12.ppc", "4ES:php-mbstring-0:4.3.9-3.12.s390", "4ES:php-mbstring-0:4.3.9-3.12.s390x", "4ES:php-mbstring-0:4.3.9-3.12.x86_64", "4ES:php-mysql-0:4.3.9-3.12.i386", "4ES:php-mysql-0:4.3.9-3.12.ia64", "4ES:php-mysql-0:4.3.9-3.12.ppc", "4ES:php-mysql-0:4.3.9-3.12.s390", "4ES:php-mysql-0:4.3.9-3.12.s390x", "4ES:php-mysql-0:4.3.9-3.12.x86_64", "4ES:php-ncurses-0:4.3.9-3.12.i386", "4ES:php-ncurses-0:4.3.9-3.12.ia64", "4ES:php-ncurses-0:4.3.9-3.12.ppc", "4ES:php-ncurses-0:4.3.9-3.12.s390", "4ES:php-ncurses-0:4.3.9-3.12.s390x", "4ES:php-ncurses-0:4.3.9-3.12.x86_64", "4ES:php-odbc-0:4.3.9-3.12.i386", "4ES:php-odbc-0:4.3.9-3.12.ia64", "4ES:php-odbc-0:4.3.9-3.12.ppc", "4ES:php-odbc-0:4.3.9-3.12.s390", "4ES:php-odbc-0:4.3.9-3.12.s390x", "4ES:php-odbc-0:4.3.9-3.12.x86_64", "4ES:php-pear-0:4.3.9-3.12.i386", "4ES:php-pear-0:4.3.9-3.12.ia64", "4ES:php-pear-0:4.3.9-3.12.ppc", "4ES:php-pear-0:4.3.9-3.12.s390", "4ES:php-pear-0:4.3.9-3.12.s390x", "4ES:php-pear-0:4.3.9-3.12.x86_64", "4ES:php-pgsql-0:4.3.9-3.12.i386", "4ES:php-pgsql-0:4.3.9-3.12.ia64", "4ES:php-pgsql-0:4.3.9-3.12.ppc", "4ES:php-pgsql-0:4.3.9-3.12.s390", "4ES:php-pgsql-0:4.3.9-3.12.s390x", "4ES:php-pgsql-0:4.3.9-3.12.x86_64", "4ES:php-snmp-0:4.3.9-3.12.i386", "4ES:php-snmp-0:4.3.9-3.12.ia64", "4ES:php-snmp-0:4.3.9-3.12.ppc", "4ES:php-snmp-0:4.3.9-3.12.s390", "4ES:php-snmp-0:4.3.9-3.12.s390x", "4ES:php-snmp-0:4.3.9-3.12.x86_64", "4ES:php-xmlrpc-0:4.3.9-3.12.i386", "4ES:php-xmlrpc-0:4.3.9-3.12.ia64", "4ES:php-xmlrpc-0:4.3.9-3.12.ppc", "4ES:php-xmlrpc-0:4.3.9-3.12.s390", "4ES:php-xmlrpc-0:4.3.9-3.12.s390x", "4ES:php-xmlrpc-0:4.3.9-3.12.x86_64", "4WS:php-0:4.3.9-3.12.i386", "4WS:php-0:4.3.9-3.12.ia64", "4WS:php-0:4.3.9-3.12.ppc", "4WS:php-0:4.3.9-3.12.s390", "4WS:php-0:4.3.9-3.12.s390x", "4WS:php-0:4.3.9-3.12.src", "4WS:php-0:4.3.9-3.12.x86_64", "4WS:php-debuginfo-0:4.3.9-3.12.i386", "4WS:php-debuginfo-0:4.3.9-3.12.ia64", "4WS:php-debuginfo-0:4.3.9-3.12.ppc", "4WS:php-debuginfo-0:4.3.9-3.12.s390", "4WS:php-debuginfo-0:4.3.9-3.12.s390x", "4WS:php-debuginfo-0:4.3.9-3.12.x86_64", "4WS:php-devel-0:4.3.9-3.12.i386", "4WS:php-devel-0:4.3.9-3.12.ia64", "4WS:php-devel-0:4.3.9-3.12.ppc", "4WS:php-devel-0:4.3.9-3.12.s390", "4WS:php-devel-0:4.3.9-3.12.s390x", "4WS:php-devel-0:4.3.9-3.12.x86_64", "4WS:php-domxml-0:4.3.9-3.12.i386", "4WS:php-domxml-0:4.3.9-3.12.ia64", "4WS:php-domxml-0:4.3.9-3.12.ppc", "4WS:php-domxml-0:4.3.9-3.12.s390", "4WS:php-domxml-0:4.3.9-3.12.s390x", "4WS:php-domxml-0:4.3.9-3.12.x86_64", "4WS:php-gd-0:4.3.9-3.12.i386", "4WS:php-gd-0:4.3.9-3.12.ia64", "4WS:php-gd-0:4.3.9-3.12.ppc", "4WS:php-gd-0:4.3.9-3.12.s390", "4WS:php-gd-0:4.3.9-3.12.s390x", "4WS:php-gd-0:4.3.9-3.12.x86_64", "4WS:php-imap-0:4.3.9-3.12.i386", "4WS:php-imap-0:4.3.9-3.12.ia64", "4WS:php-imap-0:4.3.9-3.12.ppc", "4WS:php-imap-0:4.3.9-3.12.s390", "4WS:php-imap-0:4.3.9-3.12.s390x", "4WS:php-imap-0:4.3.9-3.12.x86_64", "4WS:php-ldap-0:4.3.9-3.12.i386", "4WS:php-ldap-0:4.3.9-3.12.ia64", "4WS:php-ldap-0:4.3.9-3.12.ppc", "4WS:php-ldap-0:4.3.9-3.12.s390", "4WS:php-ldap-0:4.3.9-3.12.s390x", "4WS:php-ldap-0:4.3.9-3.12.x86_64", "4WS:php-mbstring-0:4.3.9-3.12.i386", "4WS:php-mbstring-0:4.3.9-3.12.ia64", "4WS:php-mbstring-0:4.3.9-3.12.ppc", "4WS:php-mbstring-0:4.3.9-3.12.s390", "4WS:php-mbstring-0:4.3.9-3.12.s390x", "4WS:php-mbstring-0:4.3.9-3.12.x86_64", "4WS:php-mysql-0:4.3.9-3.12.i386", "4WS:php-mysql-0:4.3.9-3.12.ia64", "4WS:php-mysql-0:4.3.9-3.12.ppc", "4WS:php-mysql-0:4.3.9-3.12.s390", "4WS:php-mysql-0:4.3.9-3.12.s390x", "4WS:php-mysql-0:4.3.9-3.12.x86_64", "4WS:php-ncurses-0:4.3.9-3.12.i386", "4WS:php-ncurses-0:4.3.9-3.12.ia64", "4WS:php-ncurses-0:4.3.9-3.12.ppc", "4WS:php-ncurses-0:4.3.9-3.12.s390", "4WS:php-ncurses-0:4.3.9-3.12.s390x", "4WS:php-ncurses-0:4.3.9-3.12.x86_64", "4WS:php-odbc-0:4.3.9-3.12.i386", "4WS:php-odbc-0:4.3.9-3.12.ia64", "4WS:php-odbc-0:4.3.9-3.12.ppc", "4WS:php-odbc-0:4.3.9-3.12.s390", "4WS:php-odbc-0:4.3.9-3.12.s390x", "4WS:php-odbc-0:4.3.9-3.12.x86_64", "4WS:php-pear-0:4.3.9-3.12.i386", "4WS:php-pear-0:4.3.9-3.12.ia64", "4WS:php-pear-0:4.3.9-3.12.ppc", "4WS:php-pear-0:4.3.9-3.12.s390", "4WS:php-pear-0:4.3.9-3.12.s390x", "4WS:php-pear-0:4.3.9-3.12.x86_64", "4WS:php-pgsql-0:4.3.9-3.12.i386", "4WS:php-pgsql-0:4.3.9-3.12.ia64", "4WS:php-pgsql-0:4.3.9-3.12.ppc", "4WS:php-pgsql-0:4.3.9-3.12.s390", "4WS:php-pgsql-0:4.3.9-3.12.s390x", "4WS:php-pgsql-0:4.3.9-3.12.x86_64", "4WS:php-snmp-0:4.3.9-3.12.i386", "4WS:php-snmp-0:4.3.9-3.12.ia64", "4WS:php-snmp-0:4.3.9-3.12.ppc", "4WS:php-snmp-0:4.3.9-3.12.s390", "4WS:php-snmp-0:4.3.9-3.12.s390x", "4WS:php-snmp-0:4.3.9-3.12.x86_64", "4WS:php-xmlrpc-0:4.3.9-3.12.i386", "4WS:php-xmlrpc-0:4.3.9-3.12.ia64", "4WS:php-xmlrpc-0:4.3.9-3.12.ppc", "4WS:php-xmlrpc-0:4.3.9-3.12.s390", "4WS:php-xmlrpc-0:4.3.9-3.12.s390x", "4WS:php-xmlrpc-0:4.3.9-3.12.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-04-25T14:33:00+00:00", "2006-05-23T20:09:00+00:00" ]
CVE-2003-0986
null
security flaw
Important
null
null
Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service.
null
2003-12-10T00:00:00+00:00
2003-12-15T00:00:00+00:00
[ "3AS:kernel-0:2.4.21-9.EL.athlon", "3AS:kernel-0:2.4.21-9.EL.i686", "3AS:kernel-0:2.4.21-9.EL.ia64", "3AS:kernel-0:2.4.21-9.EL.ppc64iseries", "3AS:kernel-0:2.4.21-9.EL.ppc64pseries", "3AS:kernel-0:2.4.21-9.EL.s390", "3AS:kernel-0:2.4.21-9.EL.s390x", "3AS:kernel-0:2.4.21-9.EL.src", "3AS:kernel-0:2.4.21-9.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-9.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-9.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-9.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-9.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-9.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-9.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-9.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-9.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-9.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-9.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-9.EL.x86_64", "3AS:kernel-doc-0:2.4.21-9.EL.i386", "3AS:kernel-doc-0:2.4.21-9.EL.ia64", "3AS:kernel-doc-0:2.4.21-9.EL.ppc64", "3AS:kernel-doc-0:2.4.21-9.EL.s390", "3AS:kernel-doc-0:2.4.21-9.EL.s390x", "3AS:kernel-doc-0:2.4.21-9.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-9.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-9.EL.i686", "3AS:kernel-smp-0:2.4.21-9.EL.athlon", "3AS:kernel-smp-0:2.4.21-9.EL.i686", "3AS:kernel-smp-0:2.4.21-9.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-9.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-9.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-9.EL.x86_64", "3AS:kernel-source-0:2.4.21-9.EL.i386", "3AS:kernel-source-0:2.4.21-9.EL.ia64", "3AS:kernel-source-0:2.4.21-9.EL.ppc64", "3AS:kernel-source-0:2.4.21-9.EL.s390", "3AS:kernel-source-0:2.4.21-9.EL.s390x", "3AS:kernel-source-0:2.4.21-9.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-9.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-9.EL.i686", "3AS:kernel-unsupported-0:2.4.21-9.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-9.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-9.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-9.EL.s390", "3AS:kernel-unsupported-0:2.4.21-9.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-9.EL.x86_64", "3Desktop:kernel-0:2.4.21-9.EL.athlon", "3Desktop:kernel-0:2.4.21-9.EL.i686", "3Desktop:kernel-0:2.4.21-9.EL.ia64", "3Desktop:kernel-0:2.4.21-9.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-9.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-9.EL.s390", "3Desktop:kernel-0:2.4.21-9.EL.s390x", "3Desktop:kernel-0:2.4.21-9.EL.src", "3Desktop:kernel-0:2.4.21-9.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-9.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-9.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-9.EL.i386", "3Desktop:kernel-doc-0:2.4.21-9.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-9.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-9.EL.s390", "3Desktop:kernel-doc-0:2.4.21-9.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-9.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-9.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-9.EL.i686", "3Desktop:kernel-smp-0:2.4.21-9.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-9.EL.i686", "3Desktop:kernel-smp-0:2.4.21-9.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-9.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-9.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-9.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-9.EL.i386", "3Desktop:kernel-source-0:2.4.21-9.EL.ia64", "3Desktop:kernel-source-0:2.4.21-9.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-9.EL.s390", "3Desktop:kernel-source-0:2.4.21-9.EL.s390x", "3Desktop:kernel-source-0:2.4.21-9.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-9.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-9.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-9.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-9.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-9.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-9.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-9.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-9.EL.x86_64", "3ES:kernel-0:2.4.21-9.EL.athlon", "3ES:kernel-0:2.4.21-9.EL.i686", "3ES:kernel-0:2.4.21-9.EL.ia64", "3ES:kernel-0:2.4.21-9.EL.ppc64iseries", "3ES:kernel-0:2.4.21-9.EL.ppc64pseries", "3ES:kernel-0:2.4.21-9.EL.s390", "3ES:kernel-0:2.4.21-9.EL.s390x", "3ES:kernel-0:2.4.21-9.EL.src", "3ES:kernel-0:2.4.21-9.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-9.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-9.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-9.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-9.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-9.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-9.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-9.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-9.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-9.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-9.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-9.EL.x86_64", "3ES:kernel-doc-0:2.4.21-9.EL.i386", "3ES:kernel-doc-0:2.4.21-9.EL.ia64", "3ES:kernel-doc-0:2.4.21-9.EL.ppc64", "3ES:kernel-doc-0:2.4.21-9.EL.s390", "3ES:kernel-doc-0:2.4.21-9.EL.s390x", "3ES:kernel-doc-0:2.4.21-9.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-9.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-9.EL.i686", "3ES:kernel-smp-0:2.4.21-9.EL.athlon", "3ES:kernel-smp-0:2.4.21-9.EL.i686", "3ES:kernel-smp-0:2.4.21-9.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-9.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-9.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-9.EL.x86_64", "3ES:kernel-source-0:2.4.21-9.EL.i386", "3ES:kernel-source-0:2.4.21-9.EL.ia64", "3ES:kernel-source-0:2.4.21-9.EL.ppc64", "3ES:kernel-source-0:2.4.21-9.EL.s390", "3ES:kernel-source-0:2.4.21-9.EL.s390x", "3ES:kernel-source-0:2.4.21-9.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-9.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-9.EL.i686", "3ES:kernel-unsupported-0:2.4.21-9.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-9.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-9.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-9.EL.s390", "3ES:kernel-unsupported-0:2.4.21-9.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-9.EL.x86_64", "3WS:kernel-0:2.4.21-9.EL.athlon", "3WS:kernel-0:2.4.21-9.EL.i686", "3WS:kernel-0:2.4.21-9.EL.ia64", "3WS:kernel-0:2.4.21-9.EL.ppc64iseries", "3WS:kernel-0:2.4.21-9.EL.ppc64pseries", "3WS:kernel-0:2.4.21-9.EL.s390", "3WS:kernel-0:2.4.21-9.EL.s390x", "3WS:kernel-0:2.4.21-9.EL.src", "3WS:kernel-0:2.4.21-9.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-9.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-9.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-9.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-9.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-9.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-9.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-9.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-9.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-9.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-9.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-9.EL.x86_64", "3WS:kernel-doc-0:2.4.21-9.EL.i386", "3WS:kernel-doc-0:2.4.21-9.EL.ia64", "3WS:kernel-doc-0:2.4.21-9.EL.ppc64", "3WS:kernel-doc-0:2.4.21-9.EL.s390", "3WS:kernel-doc-0:2.4.21-9.EL.s390x", "3WS:kernel-doc-0:2.4.21-9.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-9.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-9.EL.i686", "3WS:kernel-smp-0:2.4.21-9.EL.athlon", "3WS:kernel-smp-0:2.4.21-9.EL.i686", "3WS:kernel-smp-0:2.4.21-9.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-9.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-9.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-9.EL.x86_64", "3WS:kernel-source-0:2.4.21-9.EL.i386", "3WS:kernel-source-0:2.4.21-9.EL.ia64", "3WS:kernel-source-0:2.4.21-9.EL.ppc64", "3WS:kernel-source-0:2.4.21-9.EL.s390", "3WS:kernel-source-0:2.4.21-9.EL.s390x", "3WS:kernel-source-0:2.4.21-9.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-9.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-9.EL.i686", "3WS:kernel-unsupported-0:2.4.21-9.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-9.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-9.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-9.EL.s390", "3WS:kernel-unsupported-0:2.4.21-9.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-9.EL.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2004-01-16T17:01:00+00:00" ]
CVE-2003-1564
null
libxml2
billion laughs DoS attack
Moderate
null
null
libxml2, possibly before 2.5.0, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, aka the "billion laughs attack."
null
2008-09-02T00:00:00+00:00
2003-02-02T00:00:00+00:00
[ "2.1AS:libxml2-0:2.4.19-11.ent.i386", "2.1AS:libxml2-0:2.4.19-11.ent.ia64", "2.1AS:libxml2-0:2.4.19-11.ent.src", "2.1AS:libxml2-devel-0:2.4.19-11.ent.i386", "2.1AS:libxml2-devel-0:2.4.19-11.ent.ia64", "2.1AS:libxml2-python-0:2.4.19-11.ent.i386", "2.1AS:libxml2-python-0:2.4.19-11.ent.ia64", "2.1AW:libxml2-0:2.4.19-11.ent.i386", "2.1AW:libxml2-0:2.4.19-11.ent.ia64", "2.1AW:libxml2-0:2.4.19-11.ent.src", "2.1AW:libxml2-devel-0:2.4.19-11.ent.i386", "2.1AW:libxml2-devel-0:2.4.19-11.ent.ia64", "2.1AW:libxml2-python-0:2.4.19-11.ent.i386", "2.1AW:libxml2-python-0:2.4.19-11.ent.ia64", "2.1ES:libxml2-0:2.4.19-11.ent.i386", "2.1ES:libxml2-0:2.4.19-11.ent.ia64", "2.1ES:libxml2-0:2.4.19-11.ent.src", "2.1ES:libxml2-devel-0:2.4.19-11.ent.i386", "2.1ES:libxml2-devel-0:2.4.19-11.ent.ia64", "2.1ES:libxml2-python-0:2.4.19-11.ent.i386", "2.1ES:libxml2-python-0:2.4.19-11.ent.ia64", "2.1WS:libxml2-0:2.4.19-11.ent.i386", "2.1WS:libxml2-0:2.4.19-11.ent.ia64", "2.1WS:libxml2-0:2.4.19-11.ent.src", "2.1WS:libxml2-devel-0:2.4.19-11.ent.i386", "2.1WS:libxml2-devel-0:2.4.19-11.ent.ia64", "2.1WS:libxml2-python-0:2.4.19-11.ent.i386", "2.1WS:libxml2-python-0:2.4.19-11.ent.ia64" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188" ]
[ "2008-09-11T13:45:00+00:00" ]
CVE-2003-0358
null
nethack
buffer overflow via a long -s command line option
null
null
7.7/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Buffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges via a long -s command line option.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2020-12-09T00:00:00+00:00
2003-06-11T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2003-1302
null
security flaw
Moderate
null
null
The IMAP functionality in PHP before 4.3.1 allows remote attackers to cause a denial of service via an e-mail message with a (1) To or (2) From header with an address that contains a large number of "\" (backslash) characters.
null
2003-02-04T00:00:00+00:00
2003-02-04T00:00:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-05-23T20:09:00+00:00" ]
CVE-2003-0618
null
leaks file existance information
Low
null
null
Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions.
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 4.
2003-07-30T00:00:00+00:00
2003-07-30T00:00:00+00:00
[ "Red Hat Desktop version 3", "Red Hat Enterprise Linux AS version 3", "Red Hat Enterprise Linux ES version 3", "Red Hat Enterprise Linux WS version 3" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-07-20T00:00:00+00:00" ]
CVE-2003-1418
null
httpd information disclosure in FileEtag
Low
2.6/AV:N/AC:H/Au:N/C:P/I:N/A:N
null
Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).
Red Hat does not consider this to be a security issue. The information returned poses no threat to the target machine running httpd.
2011-08-24T00:00:00+00:00
2003-02-25T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_4:httpd", "red_hat_enterprise_linux_5:httpd", "red_hat_enterprise_linux_6:httpd" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned" ]
[ "Will not fix" ]
[ null ]
CVE-2003-0367
CWE-377
gzip
symlink attack on temporary files leads to arbitrary file overwrite
Moderate
null
6.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
2019-05-23T00:00:00+00:00
2003-07-02T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:gzip", "red_hat_enterprise_linux_6:gzip", "red_hat_enterprise_linux_7:gzip", "red_hat_enterprise_linux_8:gzip" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2003-0644
null
security flaw
Low
null
null
Kdbg 1.1.0 through 1.2.8 does not check permissions of the .kdbgrc file, which allows local users to execute arbitrary commands.
null
2005-04-15T00:00:00+00:00
2003-09-07T00:00:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/" ]
[ "2005-06-02T14:32:00+00:00" ]
CVE-2003-0845
null
JBoss HSQLDB component remote command injection
Moderate
null
null
Unknown vulnerability in the HSQLDB component in JBoss 3.2.1 and 3.0.8 on Java 1.4.x platforms, when running in the default configuration, allows remote attackers to conduct unauthorized activities and possibly execute arbitrary code via certain SQL statements to (1) TCP port 1701 in JBoss 3.2.1, and (2) port 1476 in JBoss 3.0.8.
null
2003-10-05T00:00:00+00:00
2003-10-05T00:00:00+00:00
[ "5Client:hsqldb-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-1:1.8.0.4-3jpp.6.src", "5Client:hsqldb-1:1.8.0.4-3jpp.6.x86_64", "5Client:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.x86_64", "5Client:hsqldb-demo-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-demo-1:1.8.0.4-3jpp.6.x86_64", "5Client:hsqldb-javadoc-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-javadoc-1:1.8.0.4-3jpp.6.x86_64", "5Client:hsqldb-manual-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-manual-1:1.8.0.4-3jpp.6.x86_64", "5Client:openoffice.org-1:2.0.4-5.4.25.src", "5Client:openoffice.org-base-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-base-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-calc-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-calc-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-core-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-core-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-debuginfo-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-debuginfo-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-draw-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-draw-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-emailmerge-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-emailmerge-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-graphicfilter-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-graphicfilter-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-impress-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-impress-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-javafilter-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-javafilter-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ar-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ar-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-bn-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-bn-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-de-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-de-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-es-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-es-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-fr-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-fr-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-it-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-it-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nl-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nl-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ru-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ru-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-sv-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-sv-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ur-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ur-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-math-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-math-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-pyuno-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-pyuno-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-testtools-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-testtools-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-writer-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-writer-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-xsltfilter-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-xsltfilter-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.src", "5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:hsqldb-demo-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-demo-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:hsqldb-javadoc-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-javadoc-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:hsqldb-manual-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-manual-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:openoffice.org-1:2.0.4-5.4.25.src", "5Server-DPAS:openoffice.org-base-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-base-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-calc-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-calc-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-core-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-core-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-debuginfo-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-debuginfo-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-draw-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-draw-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-emailmerge-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-emailmerge-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-graphicfilter-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-graphicfilter-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-impress-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-impress-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-javafilter-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-javafilter-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ar-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ar-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-bn-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-bn-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-de-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-de-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-es-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-es-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-fr-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-fr-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-it-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-it-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nl-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nl-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ru-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ru-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-sv-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-sv-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ur-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ur-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-math-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-math-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-pyuno-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-pyuno-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-testtools-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-testtools-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-writer-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-writer-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-xsltfilter-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-xsltfilter-1:2.0.4-5.4.25.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188" ]
[ "2007-12-05T14:34:00+00:00" ]
CVE-2003-1604
CWE-476
kernel
Missing NULL pointer check in nf_nat_redirect_ipv4
Moderate
5.4/AV:N/AC:H/Au:N/C:N/I:N/A:C
null
The redirect_target function in net/ipv4/netfilter/ipt_REDIRECT.c in the Linux kernel before 2.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending packets to an interface that has a 0.0.0.0 IP address, a related issue to CVE-2015-8787.
null
2016-01-27T00:00:00+00:00
2003-10-20T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:kernel", "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_mrg_2:realtime-kernel" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2002-1903
null
pine username disclosure issue
Low
null
null
Pine 4.2.1 through 4.4.4 puts Unix usernames and/or uid into Sender: and X-Sender: headers, which could allow remote attackers to obtain sensitive information.
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/
2005-07-11T00:00:00+00:00
2002-06-07T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2002-1914
null
security flaw
Low
null
null
dump 0.4 b10 through b29 allows local users to cause a denial of service (execution prevention) by using flock() to lock the /etc/dumpdates file.
null
2002-07-17T00:00:00+00:00
2002-07-17T00:00:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2005-08-03T14:12:00+00:00" ]
CVE-2002-2439
CWE-190
gcc
Integer overflow can occur during the computation of the memory region size for new[] operator
Moderate
3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P
null
Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.
null
2012-08-31T00:00:00+00:00
2002-08-05T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_5:compat-gcc-295", "red_hat_enterprise_linux_5:compat-gcc-296", "red_hat_enterprise_linux_5:compat-gcc-32", "red_hat_enterprise_linux_5:compat-gcc-34", "red_hat_enterprise_linux_5:gcc", "red_hat_enterprise_linux_5:gcc43", "red_hat_enterprise_linux_5:gcc44", "red_hat_enterprise_linux_6:compat-gcc-295", "red_hat_enterprise_linux_6:compat-gcc-296", "red_hat_enterprise_linux_6:compat-gcc-32", "red_hat_enterprise_linux_6:compat-gcc-34", "red_hat_enterprise_linux_6:gcc" ]
[ "red_hat_enterprise_linux_7:gcc" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned" ]
[ "Will not fix" ]
[ null ]
CVE-2002-2443
null
krb5
UDP ping-pong flaw in kpasswd
Moderate
5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P
null
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
null
2013-05-01T00:00:00+00:00
2002-06-16T00:00:00+00:00
[ "5Server-5.9.Z:krb5-0:1.6.1-70.el5_9.2.src", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc64", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc64", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc64", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.x86_64", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.i386", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ia64", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ppc", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.s390x", "5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.x86_64", "6Client-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-0:1.10.3-10.el6_4.3.src", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64", "6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686", "6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64", "6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x", "6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258" ]
[ "2013-06-12T16:46:00+00:00" ]
CVE-2002-0059
CWE-416
zlib
Double free in inflateEnd
Moderate
null
6.9/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
null
2002-03-09T00:00:00+00:00
2002-03-09T00:00:00+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[ "red_hat_enterprise_linux_6:zlib", "red_hat_enterprise_linux_7:zlib", "red_hat_enterprise_linux_8:zlib", "red_hat_enterprise_linux_9:zlib", "red_hat_jboss_enterprise_application_platform_6:zlib", "red_hat_software_collections:rh-nodejs12-nodejs", "red_hat_software_collections:rh-nodejs14-nodejs" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nThe procedure for upgrading the kernel is documented at:\n\n http://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-03-11T20:15:00+00:00", "2002-03-11T18:09:00+00:00" ]
CVE-2002-0389
null
mailman
Local users able to read private mailing list archives
Low
2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N
null
It was found that mailman stored private email messages in a world-readable directory. A local user could use this flaw to read private mailing list archives.
null
2011-06-13T00:00:00+00:00
2002-01-01T00:00:00+00:00
[ "6Server:mailman-3:2.1.12-25.el6.i686", "6Server:mailman-3:2.1.12-25.el6.ppc64", "6Server:mailman-3:2.1.12-25.el6.s390x", "6Server:mailman-3:2.1.12-25.el6.src", "6Server:mailman-3:2.1.12-25.el6.x86_64", "6Server:mailman-debuginfo-3:2.1.12-25.el6.i686", "6Server:mailman-debuginfo-3:2.1.12-25.el6.ppc64", "6Server:mailman-debuginfo-3:2.1.12-25.el6.s390x", "6Server:mailman-debuginfo-3:2.1.12-25.el6.x86_64", "6Workstation:mailman-3:2.1.12-25.el6.i686", "6Workstation:mailman-3:2.1.12-25.el6.ppc64", "6Workstation:mailman-3:2.1.12-25.el6.s390x", "6Workstation:mailman-3:2.1.12-25.el6.src", "6Workstation:mailman-3:2.1.12-25.el6.x86_64", "6Workstation:mailman-debuginfo-3:2.1.12-25.el6.i686", "6Workstation:mailman-debuginfo-3:2.1.12-25.el6.ppc64", "6Workstation:mailman-debuginfo-3:2.1.12-25.el6.s390x", "6Workstation:mailman-debuginfo-3:2.1.12-25.el6.x86_64" ]
[ "red_hat_enterprise_linux_4:mailman", "red_hat_enterprise_linux_5:mailman" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "no_fix_planned" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "Will not fix" ]
[ "2015-07-20T14:06:40+00:00", null ]
CVE-2002-2215
null
security flaw
Moderate
null
null
The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of "To" addresses, which triggers an error in the rfc822_write_address function.
null
2002-09-07T00:00:00+00:00
2002-09-07T00:00:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-05-23T20:09:00+00:00" ]
CVE-2002-2185
null
security flaw
Moderate
null
null
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
null
2005-12-02T00:00:00+00:00
2002-06-25T00:00:00+00:00
[ "3AS:kernel-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-0:2.4.21-37.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-0:2.4.21-37.0.1.EL.src", "3AS:kernel-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-37.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-37.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-37.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-37.0.1.EL.src", "3Desktop:kernel-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-0:2.4.21-37.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-0:2.4.21-37.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-0:2.4.21-37.0.1.EL.src", "3ES:kernel-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-37.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-37.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-0:2.4.21-37.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-0:2.4.21-37.0.1.EL.src", "3WS:kernel-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-37.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-37.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64", "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-01-19T16:03:00+00:00", "2006-01-17T08:36:00+00:00", "2006-02-01T17:48:00+00:00", "2006-02-01T17:57:00+00:00" ]
CVE-2002-2214
null
security flaw
Moderate
null
null
The php_if_imap_mime_header_decode function in the IMAP functionality in PHP before 4.2.2 allows remote attackers to cause a denial of service (crash) via an e-mail header with a long "To" header.
null
2006-05-31T00:00:00+00:00
2002-02-18T00:00:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-07-25T12:14:00+00:00" ]
CVE-2001-1593
CWE-367
a2ps
insecure temporary file use
Low
2.1/AV:L/AC:L/Au:N/C:N/I:P/A:N
null
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.
null
2001-01-05T00:00:00+00:00
2001-01-05T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:a2ps", "red_hat_enterprise_linux_6:a2ps", "red_hat_enterprise_linux_7:a2ps" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-0131
CWE-59
httpd
allows local users to overwrite arbitrary files via a symlink attack
Low
null
2.8/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.
All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
2020-10-09T00:00:00+00:00
2001-01-10T00:00:00+00:00
[]
[ "red_hat_jboss_enterprise_web_server_2:httpd", "red_hat_jboss_enterprise_web_server_2:httpd22" ]
[ "red_hat_enterprise_linux_5:httpd", "red_hat_enterprise_linux_6:httpd", "red_hat_enterprise_linux_7:httpd", "red_hat_enterprise_linux_8:httpd:2.4/httpd", "red_hat_jboss_core_services:httpd", "red_hat_software_collections:httpd24-httpd" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned" ]
[ "Out of support scope" ]
[ null ]
CVE-2001-1556
CWE-532
httpd
log files contain information directly supplied by clients and does not filter or quote control characters
Low
null
3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083.
2020-10-14T00:00:00+00:00
2001-12-31T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:httpd", "red_hat_enterprise_linux_6:httpd", "red_hat_enterprise_linux_7:httpd", "red_hat_enterprise_linux_8:httpd:2.4/httpd", "red_hat_jboss_core_services:httpd", "red_hat_jboss_enterprise_web_server_2:httpd", "red_hat_jboss_enterprise_web_server_2:httpd22", "red_hat_software_collections:httpd24-httpd" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-0328
null
kernel
TCP connection ISN hijacks
Low
2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N
null
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
2013-05-16T00:00:00+00:00
2001-05-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:kernel", "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_mrg_2:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-1494
null
security flaw
Low
null
null
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
null
2005-06-21T00:00:00+00:00
2001-12-12T00:00:00+00:00
[ "3AS:losetup-0:2.11y-31.11.i386", "3AS:losetup-0:2.11y-31.11.ia64", "3AS:losetup-0:2.11y-31.11.ppc", "3AS:losetup-0:2.11y-31.11.s390", "3AS:losetup-0:2.11y-31.11.s390x", "3AS:losetup-0:2.11y-31.11.x86_64", "3AS:mount-0:2.11y-31.11.i386", "3AS:mount-0:2.11y-31.11.ia64", "3AS:mount-0:2.11y-31.11.ppc", "3AS:mount-0:2.11y-31.11.s390", "3AS:mount-0:2.11y-31.11.s390x", "3AS:mount-0:2.11y-31.11.x86_64", "3AS:util-linux-0:2.11y-31.11.i386", "3AS:util-linux-0:2.11y-31.11.ia64", "3AS:util-linux-0:2.11y-31.11.ppc", "3AS:util-linux-0:2.11y-31.11.s390", "3AS:util-linux-0:2.11y-31.11.s390x", "3AS:util-linux-0:2.11y-31.11.src", "3AS:util-linux-0:2.11y-31.11.x86_64", "3AS:util-linux-debuginfo-0:2.11y-31.11.i386", "3AS:util-linux-debuginfo-0:2.11y-31.11.ia64", "3AS:util-linux-debuginfo-0:2.11y-31.11.ppc", "3AS:util-linux-debuginfo-0:2.11y-31.11.s390", "3AS:util-linux-debuginfo-0:2.11y-31.11.s390x", "3AS:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3Desktop:losetup-0:2.11y-31.11.i386", "3Desktop:losetup-0:2.11y-31.11.ia64", "3Desktop:losetup-0:2.11y-31.11.ppc", "3Desktop:losetup-0:2.11y-31.11.s390", "3Desktop:losetup-0:2.11y-31.11.s390x", "3Desktop:losetup-0:2.11y-31.11.x86_64", "3Desktop:mount-0:2.11y-31.11.i386", "3Desktop:mount-0:2.11y-31.11.ia64", "3Desktop:mount-0:2.11y-31.11.ppc", "3Desktop:mount-0:2.11y-31.11.s390", "3Desktop:mount-0:2.11y-31.11.s390x", "3Desktop:mount-0:2.11y-31.11.x86_64", "3Desktop:util-linux-0:2.11y-31.11.i386", "3Desktop:util-linux-0:2.11y-31.11.ia64", "3Desktop:util-linux-0:2.11y-31.11.ppc", "3Desktop:util-linux-0:2.11y-31.11.s390", "3Desktop:util-linux-0:2.11y-31.11.s390x", "3Desktop:util-linux-0:2.11y-31.11.src", "3Desktop:util-linux-0:2.11y-31.11.x86_64", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.i386", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.ia64", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.ppc", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390x", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3ES:losetup-0:2.11y-31.11.i386", "3ES:losetup-0:2.11y-31.11.ia64", "3ES:losetup-0:2.11y-31.11.ppc", "3ES:losetup-0:2.11y-31.11.s390", "3ES:losetup-0:2.11y-31.11.s390x", "3ES:losetup-0:2.11y-31.11.x86_64", "3ES:mount-0:2.11y-31.11.i386", "3ES:mount-0:2.11y-31.11.ia64", "3ES:mount-0:2.11y-31.11.ppc", "3ES:mount-0:2.11y-31.11.s390", "3ES:mount-0:2.11y-31.11.s390x", "3ES:mount-0:2.11y-31.11.x86_64", "3ES:util-linux-0:2.11y-31.11.i386", "3ES:util-linux-0:2.11y-31.11.ia64", "3ES:util-linux-0:2.11y-31.11.ppc", "3ES:util-linux-0:2.11y-31.11.s390", "3ES:util-linux-0:2.11y-31.11.s390x", "3ES:util-linux-0:2.11y-31.11.src", "3ES:util-linux-0:2.11y-31.11.x86_64", "3ES:util-linux-debuginfo-0:2.11y-31.11.i386", "3ES:util-linux-debuginfo-0:2.11y-31.11.ia64", "3ES:util-linux-debuginfo-0:2.11y-31.11.ppc", "3ES:util-linux-debuginfo-0:2.11y-31.11.s390", "3ES:util-linux-debuginfo-0:2.11y-31.11.s390x", "3ES:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3WS:losetup-0:2.11y-31.11.i386", "3WS:losetup-0:2.11y-31.11.ia64", "3WS:losetup-0:2.11y-31.11.ppc", "3WS:losetup-0:2.11y-31.11.s390", "3WS:losetup-0:2.11y-31.11.s390x", "3WS:losetup-0:2.11y-31.11.x86_64", "3WS:mount-0:2.11y-31.11.i386", "3WS:mount-0:2.11y-31.11.ia64", "3WS:mount-0:2.11y-31.11.ppc", "3WS:mount-0:2.11y-31.11.s390", "3WS:mount-0:2.11y-31.11.s390x", "3WS:mount-0:2.11y-31.11.x86_64", "3WS:util-linux-0:2.11y-31.11.i386", "3WS:util-linux-0:2.11y-31.11.ia64", "3WS:util-linux-0:2.11y-31.11.ppc", "3WS:util-linux-0:2.11y-31.11.s390", "3WS:util-linux-0:2.11y-31.11.s390x", "3WS:util-linux-0:2.11y-31.11.src", "3WS:util-linux-0:2.11y-31.11.x86_64", "3WS:util-linux-debuginfo-0:2.11y-31.11.i386", "3WS:util-linux-debuginfo-0:2.11y-31.11.ia64", "3WS:util-linux-debuginfo-0:2.11y-31.11.ppc", "3WS:util-linux-debuginfo-0:2.11y-31.11.s390", "3WS:util-linux-debuginfo-0:2.11y-31.11.s390x", "3WS:util-linux-debuginfo-0:2.11y-31.11.x86_64", "4AS:util-linux-0:2.12a-16.EL4.12.i386", "4AS:util-linux-0:2.12a-16.EL4.12.ia64", "4AS:util-linux-0:2.12a-16.EL4.12.ppc", "4AS:util-linux-0:2.12a-16.EL4.12.s390", "4AS:util-linux-0:2.12a-16.EL4.12.s390x", "4AS:util-linux-0:2.12a-16.EL4.12.src", "4AS:util-linux-0:2.12a-16.EL4.12.x86_64", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4Desktop:util-linux-0:2.12a-16.EL4.12.i386", "4Desktop:util-linux-0:2.12a-16.EL4.12.ia64", "4Desktop:util-linux-0:2.12a-16.EL4.12.ppc", "4Desktop:util-linux-0:2.12a-16.EL4.12.s390", "4Desktop:util-linux-0:2.12a-16.EL4.12.s390x", "4Desktop:util-linux-0:2.12a-16.EL4.12.src", "4Desktop:util-linux-0:2.12a-16.EL4.12.x86_64", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4ES:util-linux-0:2.12a-16.EL4.12.i386", "4ES:util-linux-0:2.12a-16.EL4.12.ia64", "4ES:util-linux-0:2.12a-16.EL4.12.ppc", "4ES:util-linux-0:2.12a-16.EL4.12.s390", "4ES:util-linux-0:2.12a-16.EL4.12.s390x", "4ES:util-linux-0:2.12a-16.EL4.12.src", "4ES:util-linux-0:2.12a-16.EL4.12.x86_64", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4WS:util-linux-0:2.12a-16.EL4.12.i386", "4WS:util-linux-0:2.12a-16.EL4.12.ia64", "4WS:util-linux-0:2.12a-16.EL4.12.ppc", "4WS:util-linux-0:2.12a-16.EL4.12.s390", "4WS:util-linux-0:2.12a-16.EL4.12.s390x", "4WS:util-linux-0:2.12a-16.EL4.12.src", "4WS:util-linux-0:2.12a-16.EL4.12.x86_64", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2005-10-11T15:49:00+00:00" ]
CVE-2000-1254
null
openssl
Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Moderate
4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N
null
crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.
null
2016-05-04T00:00:00+00:00
2000-06-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:openssl", "red_hat_enterprise_linux_5:openssl097a", "red_hat_enterprise_linux_6:openssl", "red_hat_enterprise_linux_6:openssl098e", "red_hat_enterprise_linux_7:openssl", "red_hat_enterprise_linux_7:openssl098e", "red_hat_jboss_enterprise_application_platform_6:openssl", "red_hat_jboss_enterprise_web_server_1:openssl", "red_hat_jboss_enterprise_web_server_2:openssl", "red_hat_jboss_enterprise_web_server_3:openssl" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2000-1191
null
security flaw
Low
null
null
htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.
null
2006-12-06T00:00:00+00:00
2000-04-18T00:00:00+00:00
[ "3AS:htdig-2:3.1.6-7.el3.i386", "3AS:htdig-2:3.1.6-7.el3.ia64", "3AS:htdig-2:3.1.6-7.el3.ppc", "3AS:htdig-2:3.1.6-7.el3.s390", "3AS:htdig-2:3.1.6-7.el3.s390x", "3AS:htdig-2:3.1.6-7.el3.src", "3AS:htdig-2:3.1.6-7.el3.x86_64", "3AS:htdig-debuginfo-2:3.1.6-7.el3.i386", "3AS:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3AS:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3AS:htdig-debuginfo-2:3.1.6-7.el3.s390", "3AS:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3AS:htdig-debuginfo-2:3.1.6-7.el3.x86_64", "3Desktop:htdig-2:3.1.6-7.el3.i386", "3Desktop:htdig-2:3.1.6-7.el3.ia64", "3Desktop:htdig-2:3.1.6-7.el3.ppc", "3Desktop:htdig-2:3.1.6-7.el3.s390", "3Desktop:htdig-2:3.1.6-7.el3.s390x", "3Desktop:htdig-2:3.1.6-7.el3.src", "3Desktop:htdig-2:3.1.6-7.el3.x86_64", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.i386", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3Desktop:htdig-debuginfo-2:3.1.6-7.el3.x86_64", "3ES:htdig-2:3.1.6-7.el3.i386", "3ES:htdig-2:3.1.6-7.el3.ia64", "3ES:htdig-2:3.1.6-7.el3.ppc", "3ES:htdig-2:3.1.6-7.el3.s390", "3ES:htdig-2:3.1.6-7.el3.s390x", "3ES:htdig-2:3.1.6-7.el3.src", "3ES:htdig-2:3.1.6-7.el3.x86_64", "3ES:htdig-debuginfo-2:3.1.6-7.el3.i386", "3ES:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3ES:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3ES:htdig-debuginfo-2:3.1.6-7.el3.s390", "3ES:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3ES:htdig-debuginfo-2:3.1.6-7.el3.x86_64", "3WS:htdig-2:3.1.6-7.el3.i386", "3WS:htdig-2:3.1.6-7.el3.ia64", "3WS:htdig-2:3.1.6-7.el3.ppc", "3WS:htdig-2:3.1.6-7.el3.s390", "3WS:htdig-2:3.1.6-7.el3.s390x", "3WS:htdig-2:3.1.6-7.el3.src", "3WS:htdig-2:3.1.6-7.el3.x86_64", "3WS:htdig-debuginfo-2:3.1.6-7.el3.i386", "3WS:htdig-debuginfo-2:3.1.6-7.el3.ia64", "3WS:htdig-debuginfo-2:3.1.6-7.el3.ppc", "3WS:htdig-debuginfo-2:3.1.6-7.el3.s390", "3WS:htdig-debuginfo-2:3.1.6-7.el3.s390x", "3WS:htdig-debuginfo-2:3.1.6-7.el3.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2007-06-11T00:00:00+00:00" ]
CVE-1999-1572
null
security flaw
Low
null
null
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
2005-11-01T00:00:00+00:00
1999-01-01T00:00:00+00:00
[ "3AS:cpio-0:2.5-3e.3.i386", "3AS:cpio-0:2.5-3e.3.ia64", "3AS:cpio-0:2.5-3e.3.ppc", "3AS:cpio-0:2.5-3e.3.s390", "3AS:cpio-0:2.5-3e.3.s390x", "3AS:cpio-0:2.5-3e.3.src", "3AS:cpio-0:2.5-3e.3.x86_64", "3AS:cpio-debuginfo-0:2.5-3e.3.i386", "3AS:cpio-debuginfo-0:2.5-3e.3.ia64", "3AS:cpio-debuginfo-0:2.5-3e.3.ppc", "3AS:cpio-debuginfo-0:2.5-3e.3.s390", "3AS:cpio-debuginfo-0:2.5-3e.3.s390x", "3AS:cpio-debuginfo-0:2.5-3e.3.x86_64", "3Desktop:cpio-0:2.5-3e.3.i386", "3Desktop:cpio-0:2.5-3e.3.ia64", "3Desktop:cpio-0:2.5-3e.3.ppc", "3Desktop:cpio-0:2.5-3e.3.s390", "3Desktop:cpio-0:2.5-3e.3.s390x", "3Desktop:cpio-0:2.5-3e.3.src", "3Desktop:cpio-0:2.5-3e.3.x86_64", "3Desktop:cpio-debuginfo-0:2.5-3e.3.i386", "3Desktop:cpio-debuginfo-0:2.5-3e.3.ia64", "3Desktop:cpio-debuginfo-0:2.5-3e.3.ppc", "3Desktop:cpio-debuginfo-0:2.5-3e.3.s390", "3Desktop:cpio-debuginfo-0:2.5-3e.3.s390x", "3Desktop:cpio-debuginfo-0:2.5-3e.3.x86_64", "3ES:cpio-0:2.5-3e.3.i386", "3ES:cpio-0:2.5-3e.3.ia64", "3ES:cpio-0:2.5-3e.3.ppc", "3ES:cpio-0:2.5-3e.3.s390", "3ES:cpio-0:2.5-3e.3.s390x", "3ES:cpio-0:2.5-3e.3.src", "3ES:cpio-0:2.5-3e.3.x86_64", "3ES:cpio-debuginfo-0:2.5-3e.3.i386", "3ES:cpio-debuginfo-0:2.5-3e.3.ia64", "3ES:cpio-debuginfo-0:2.5-3e.3.ppc", "3ES:cpio-debuginfo-0:2.5-3e.3.s390", "3ES:cpio-debuginfo-0:2.5-3e.3.s390x", "3ES:cpio-debuginfo-0:2.5-3e.3.x86_64", "3WS:cpio-0:2.5-3e.3.i386", "3WS:cpio-0:2.5-3e.3.ia64", "3WS:cpio-0:2.5-3e.3.ppc", "3WS:cpio-0:2.5-3e.3.s390", "3WS:cpio-0:2.5-3e.3.s390x", "3WS:cpio-0:2.5-3e.3.src", "3WS:cpio-0:2.5-3e.3.x86_64", "3WS:cpio-debuginfo-0:2.5-3e.3.i386", "3WS:cpio-debuginfo-0:2.5-3e.3.ia64", "3WS:cpio-debuginfo-0:2.5-3e.3.ppc", "3WS:cpio-debuginfo-0:2.5-3e.3.s390", "3WS:cpio-debuginfo-0:2.5-3e.3.s390x", "3WS:cpio-debuginfo-0:2.5-3e.3.x86_64", "4AS:cpio-0:2.5-7.EL4.1.i386", "4AS:cpio-0:2.5-7.EL4.1.ia64", "4AS:cpio-0:2.5-7.EL4.1.ppc", "4AS:cpio-0:2.5-7.EL4.1.s390", "4AS:cpio-0:2.5-7.EL4.1.s390x", "4AS:cpio-0:2.5-7.EL4.1.src", "4AS:cpio-0:2.5-7.EL4.1.x86_64", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.i386", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.ia64", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.ppc", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.s390", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.s390x", "4AS:cpio-debuginfo-0:2.5-7.EL4.1.x86_64", "4Desktop:cpio-0:2.5-7.EL4.1.i386", "4Desktop:cpio-0:2.5-7.EL4.1.ia64", "4Desktop:cpio-0:2.5-7.EL4.1.ppc", "4Desktop:cpio-0:2.5-7.EL4.1.s390", "4Desktop:cpio-0:2.5-7.EL4.1.s390x", "4Desktop:cpio-0:2.5-7.EL4.1.src", "4Desktop:cpio-0:2.5-7.EL4.1.x86_64", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.i386", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.ia64", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.ppc", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.s390", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.s390x", "4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.x86_64", "4ES:cpio-0:2.5-7.EL4.1.i386", "4ES:cpio-0:2.5-7.EL4.1.ia64", "4ES:cpio-0:2.5-7.EL4.1.ppc", "4ES:cpio-0:2.5-7.EL4.1.s390", "4ES:cpio-0:2.5-7.EL4.1.s390x", "4ES:cpio-0:2.5-7.EL4.1.src", "4ES:cpio-0:2.5-7.EL4.1.x86_64", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.i386", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.ia64", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.ppc", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.s390", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.s390x", "4ES:cpio-debuginfo-0:2.5-7.EL4.1.x86_64", "4WS:cpio-0:2.5-7.EL4.1.i386", "4WS:cpio-0:2.5-7.EL4.1.ia64", "4WS:cpio-0:2.5-7.EL4.1.ppc", "4WS:cpio-0:2.5-7.EL4.1.s390", "4WS:cpio-0:2.5-7.EL4.1.s390x", "4WS:cpio-0:2.5-7.EL4.1.src", "4WS:cpio-0:2.5-7.EL4.1.x86_64", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.i386", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.ia64", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.ppc", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.s390", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.s390x", "4WS:cpio-debuginfo-0:2.5-7.EL4.1.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2005-02-18T15:28:00+00:00", "2005-02-15T10:13:00+00:00", "2005-11-10T19:01:00+00:00" ]
CVE-1999-0710
null
security flaw
Low
null
null
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
null
2005-04-26T00:00:00+00:00
1999-07-25T00:00:00+00:00
[ "3AS:squid-7:2.5.STABLE3-6.3E.13.i386", "3AS:squid-7:2.5.STABLE3-6.3E.13.ia64", "3AS:squid-7:2.5.STABLE3-6.3E.13.ppc", "3AS:squid-7:2.5.STABLE3-6.3E.13.s390", "3AS:squid-7:2.5.STABLE3-6.3E.13.s390x", "3AS:squid-7:2.5.STABLE3-6.3E.13.src", "3AS:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.i386", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.ia64", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.ppc", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390x", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.src", "3Desktop:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "3ES:squid-7:2.5.STABLE3-6.3E.13.i386", "3ES:squid-7:2.5.STABLE3-6.3E.13.ia64", "3ES:squid-7:2.5.STABLE3-6.3E.13.ppc", "3ES:squid-7:2.5.STABLE3-6.3E.13.s390", "3ES:squid-7:2.5.STABLE3-6.3E.13.s390x", "3ES:squid-7:2.5.STABLE3-6.3E.13.src", "3ES:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "3WS:squid-7:2.5.STABLE3-6.3E.13.i386", "3WS:squid-7:2.5.STABLE3-6.3E.13.ia64", "3WS:squid-7:2.5.STABLE3-6.3E.13.ppc", "3WS:squid-7:2.5.STABLE3-6.3E.13.s390", "3WS:squid-7:2.5.STABLE3-6.3E.13.s390x", "3WS:squid-7:2.5.STABLE3-6.3E.13.src", "3WS:squid-7:2.5.STABLE3-6.3E.13.x86_64", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x", "3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64", "4AS:squid-7:2.5.STABLE6-3.4E.9.i386", "4AS:squid-7:2.5.STABLE6-3.4E.9.ia64", "4AS:squid-7:2.5.STABLE6-3.4E.9.ppc", "4AS:squid-7:2.5.STABLE6-3.4E.9.s390", "4AS:squid-7:2.5.STABLE6-3.4E.9.s390x", "4AS:squid-7:2.5.STABLE6-3.4E.9.src", "4AS:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.i386", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.ia64", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.ppc", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390x", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.src", "4Desktop:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "4ES:squid-7:2.5.STABLE6-3.4E.9.i386", "4ES:squid-7:2.5.STABLE6-3.4E.9.ia64", "4ES:squid-7:2.5.STABLE6-3.4E.9.ppc", "4ES:squid-7:2.5.STABLE6-3.4E.9.s390", "4ES:squid-7:2.5.STABLE6-3.4E.9.s390x", "4ES:squid-7:2.5.STABLE6-3.4E.9.src", "4ES:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "4WS:squid-7:2.5.STABLE6-3.4E.9.i386", "4WS:squid-7:2.5.STABLE6-3.4E.9.ia64", "4WS:squid-7:2.5.STABLE6-3.4E.9.ppc", "4WS:squid-7:2.5.STABLE6-3.4E.9.s390", "4WS:squid-7:2.5.STABLE6-3.4E.9.s390x", "4WS:squid-7:2.5.STABLE6-3.4E.9.src", "4WS:squid-7:2.5.STABLE6-3.4E.9.x86_64", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x", "4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/" ]
[ "2005-06-14T19:40:00+00:00", "2005-06-13T12:08:00+00:00" ]
CVE-1999-0199
CWE-1053
glibc
manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
None
null
0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.
Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue. This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage.
2020-10-06T00:00:00+00:00
1999-11-09T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_5:glibc", "red_hat_enterprise_linux_6:glibc", "red_hat_enterprise_linux_7:glibc", "red_hat_enterprise_linux_8:glibc" ]
[]
[]
[]
[]
[]
[]
[]
CVE-1999-0428
CWE-384
openssl
allow remote attackers to reuse SSL sessions and bypass access controls
Moderate
null
6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
2020-10-13T00:00:00+00:00
1999-03-22T00:00:00+00:00
[]
[]
[ "red_hat_advanced_cluster_management_for_kubernetes_2:openssl", "red_hat_enterprise_linux_5:openssl", "red_hat_enterprise_linux_5:openssl097a", "red_hat_enterprise_linux_6:openssl", "red_hat_enterprise_linux_6:openssl098e", "red_hat_enterprise_linux_7:openssl", "red_hat_enterprise_linux_7:openssl098e", "red_hat_enterprise_linux_7:ovmf", "red_hat_enterprise_linux_8:compat-openssl10", "red_hat_enterprise_linux_8:mingw-openssl", "red_hat_enterprise_linux_8:openssl", "red_hat_jboss_core_services:jbcs-httpd24-openssl", "red_hat_jboss_core_services:openssl", "red_hat_jboss_enterprise_application_platform_5:openssl", "red_hat_jboss_enterprise_application_platform_6:openssl", "red_hat_jboss_enterprise_web_server_2:jbcs-httpd24-openssl", "red_hat_jboss_enterprise_web_server_2:openssl" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]