cve
stringlengths 13
16
| cwe
stringclasses 474
values | affected_component
stringlengths 0
177
| summary
stringlengths 0
227
| severity
stringclasses 5
values | cvss_v2
stringclasses 250
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 30
4k
| statement
stringlengths 1
3.47k
⌀ | discovery_date
stringdate 2001-01-05 00:00:00
2025-07-18 20:00:43
| release_date
stringdate 1999-01-01 00:00:00
2025-07-18 17:10:11
| fixed_products
listlengths 0
28.2k
| known_affected_products
listlengths 0
617
| known_not_affected_products
listlengths 0
30.2k
| under_investigation_products
listlengths 0
78
| threat_categories
listlengths 0
4
| threat_details
listlengths 0
4
| threat_dates
listlengths 0
4
| remediation_categories
listlengths 0
218
| remediation_details
listlengths 0
218
| remediation_dates
listlengths 0
218
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2003-1332
| null |
samba
|
stack-based buffer overflow in the reply_nttrans()
|
Important
| null | null |
Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201.
| null |
2003-12-31T00:00:00+00:00
|
2003-12-31T00:00:00+00:00
|
[
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Important"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2003-03-20T21:19:00+00:00"
] |
CVE-2003-0427
| null |
security flaw
|
Low
| null | null |
Buffer overflow in mikmod 3.1.6 and earlier allows remote attackers to execute arbitrary code via an archive file that contains a file with a long filename.
|
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
|
2003-06-13T00:00:00+00:00
|
2003-06-13T00:00:00+00:00
|
[
"3AS:mikmod-0:3.1.6-22.EL3.i386",
"3AS:mikmod-0:3.1.6-22.EL3.ia64",
"3AS:mikmod-0:3.1.6-22.EL3.ppc",
"3AS:mikmod-0:3.1.6-22.EL3.ppc64",
"3AS:mikmod-0:3.1.6-22.EL3.s390",
"3AS:mikmod-0:3.1.6-22.EL3.s390x",
"3AS:mikmod-0:3.1.6-22.EL3.src",
"3AS:mikmod-0:3.1.6-22.EL3.x86_64",
"3AS:mikmod-debuginfo-0:3.1.6-22.EL3.i386",
"3AS:mikmod-debuginfo-0:3.1.6-22.EL3.ia64",
"3AS:mikmod-debuginfo-0:3.1.6-22.EL3.ppc",
"3AS:mikmod-debuginfo-0:3.1.6-22.EL3.ppc64",
"3AS:mikmod-debuginfo-0:3.1.6-22.EL3.s390",
"3AS:mikmod-debuginfo-0:3.1.6-22.EL3.s390x",
"3AS:mikmod-debuginfo-0:3.1.6-22.EL3.x86_64",
"3AS:mikmod-devel-0:3.1.6-22.EL3.i386",
"3AS:mikmod-devel-0:3.1.6-22.EL3.ia64",
"3AS:mikmod-devel-0:3.1.6-22.EL3.ppc",
"3AS:mikmod-devel-0:3.1.6-22.EL3.s390",
"3AS:mikmod-devel-0:3.1.6-22.EL3.s390x",
"3AS:mikmod-devel-0:3.1.6-22.EL3.x86_64",
"3Desktop:mikmod-0:3.1.6-22.EL3.i386",
"3Desktop:mikmod-0:3.1.6-22.EL3.ia64",
"3Desktop:mikmod-0:3.1.6-22.EL3.ppc",
"3Desktop:mikmod-0:3.1.6-22.EL3.ppc64",
"3Desktop:mikmod-0:3.1.6-22.EL3.s390",
"3Desktop:mikmod-0:3.1.6-22.EL3.s390x",
"3Desktop:mikmod-0:3.1.6-22.EL3.src",
"3Desktop:mikmod-0:3.1.6-22.EL3.x86_64",
"3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.i386",
"3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.ia64",
"3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.ppc",
"3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.ppc64",
"3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.s390",
"3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.s390x",
"3Desktop:mikmod-debuginfo-0:3.1.6-22.EL3.x86_64",
"3Desktop:mikmod-devel-0:3.1.6-22.EL3.i386",
"3Desktop:mikmod-devel-0:3.1.6-22.EL3.ia64",
"3Desktop:mikmod-devel-0:3.1.6-22.EL3.ppc",
"3Desktop:mikmod-devel-0:3.1.6-22.EL3.s390",
"3Desktop:mikmod-devel-0:3.1.6-22.EL3.s390x",
"3Desktop:mikmod-devel-0:3.1.6-22.EL3.x86_64",
"3ES:mikmod-0:3.1.6-22.EL3.i386",
"3ES:mikmod-0:3.1.6-22.EL3.ia64",
"3ES:mikmod-0:3.1.6-22.EL3.ppc",
"3ES:mikmod-0:3.1.6-22.EL3.ppc64",
"3ES:mikmod-0:3.1.6-22.EL3.s390",
"3ES:mikmod-0:3.1.6-22.EL3.s390x",
"3ES:mikmod-0:3.1.6-22.EL3.src",
"3ES:mikmod-0:3.1.6-22.EL3.x86_64",
"3ES:mikmod-debuginfo-0:3.1.6-22.EL3.i386",
"3ES:mikmod-debuginfo-0:3.1.6-22.EL3.ia64",
"3ES:mikmod-debuginfo-0:3.1.6-22.EL3.ppc",
"3ES:mikmod-debuginfo-0:3.1.6-22.EL3.ppc64",
"3ES:mikmod-debuginfo-0:3.1.6-22.EL3.s390",
"3ES:mikmod-debuginfo-0:3.1.6-22.EL3.s390x",
"3ES:mikmod-debuginfo-0:3.1.6-22.EL3.x86_64",
"3ES:mikmod-devel-0:3.1.6-22.EL3.i386",
"3ES:mikmod-devel-0:3.1.6-22.EL3.ia64",
"3ES:mikmod-devel-0:3.1.6-22.EL3.ppc",
"3ES:mikmod-devel-0:3.1.6-22.EL3.s390",
"3ES:mikmod-devel-0:3.1.6-22.EL3.s390x",
"3ES:mikmod-devel-0:3.1.6-22.EL3.x86_64",
"3WS:mikmod-0:3.1.6-22.EL3.i386",
"3WS:mikmod-0:3.1.6-22.EL3.ia64",
"3WS:mikmod-0:3.1.6-22.EL3.ppc",
"3WS:mikmod-0:3.1.6-22.EL3.ppc64",
"3WS:mikmod-0:3.1.6-22.EL3.s390",
"3WS:mikmod-0:3.1.6-22.EL3.s390x",
"3WS:mikmod-0:3.1.6-22.EL3.src",
"3WS:mikmod-0:3.1.6-22.EL3.x86_64",
"3WS:mikmod-debuginfo-0:3.1.6-22.EL3.i386",
"3WS:mikmod-debuginfo-0:3.1.6-22.EL3.ia64",
"3WS:mikmod-debuginfo-0:3.1.6-22.EL3.ppc",
"3WS:mikmod-debuginfo-0:3.1.6-22.EL3.ppc64",
"3WS:mikmod-debuginfo-0:3.1.6-22.EL3.s390",
"3WS:mikmod-debuginfo-0:3.1.6-22.EL3.s390x",
"3WS:mikmod-debuginfo-0:3.1.6-22.EL3.x86_64",
"3WS:mikmod-devel-0:3.1.6-22.EL3.i386",
"3WS:mikmod-devel-0:3.1.6-22.EL3.ia64",
"3WS:mikmod-devel-0:3.1.6-22.EL3.ppc",
"3WS:mikmod-devel-0:3.1.6-22.EL3.s390",
"3WS:mikmod-devel-0:3.1.6-22.EL3.s390x",
"3WS:mikmod-devel-0:3.1.6-22.EL3.x86_64",
"4AS:mikmod-0:3.1.6-32.EL4.i386",
"4AS:mikmod-0:3.1.6-32.EL4.ia64",
"4AS:mikmod-0:3.1.6-32.EL4.ppc",
"4AS:mikmod-0:3.1.6-32.EL4.ppc64",
"4AS:mikmod-0:3.1.6-32.EL4.s390",
"4AS:mikmod-0:3.1.6-32.EL4.s390x",
"4AS:mikmod-0:3.1.6-32.EL4.src",
"4AS:mikmod-0:3.1.6-32.EL4.x86_64",
"4AS:mikmod-debuginfo-0:3.1.6-32.EL4.i386",
"4AS:mikmod-debuginfo-0:3.1.6-32.EL4.ia64",
"4AS:mikmod-debuginfo-0:3.1.6-32.EL4.ppc",
"4AS:mikmod-debuginfo-0:3.1.6-32.EL4.ppc64",
"4AS:mikmod-debuginfo-0:3.1.6-32.EL4.s390",
"4AS:mikmod-debuginfo-0:3.1.6-32.EL4.s390x",
"4AS:mikmod-debuginfo-0:3.1.6-32.EL4.x86_64",
"4AS:mikmod-devel-0:3.1.6-32.EL4.i386",
"4AS:mikmod-devel-0:3.1.6-32.EL4.ia64",
"4AS:mikmod-devel-0:3.1.6-32.EL4.ppc",
"4AS:mikmod-devel-0:3.1.6-32.EL4.s390",
"4AS:mikmod-devel-0:3.1.6-32.EL4.s390x",
"4AS:mikmod-devel-0:3.1.6-32.EL4.x86_64",
"4Desktop:mikmod-0:3.1.6-32.EL4.i386",
"4Desktop:mikmod-0:3.1.6-32.EL4.ia64",
"4Desktop:mikmod-0:3.1.6-32.EL4.ppc",
"4Desktop:mikmod-0:3.1.6-32.EL4.ppc64",
"4Desktop:mikmod-0:3.1.6-32.EL4.s390",
"4Desktop:mikmod-0:3.1.6-32.EL4.s390x",
"4Desktop:mikmod-0:3.1.6-32.EL4.src",
"4Desktop:mikmod-0:3.1.6-32.EL4.x86_64",
"4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.i386",
"4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.ia64",
"4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.ppc",
"4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.ppc64",
"4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.s390",
"4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.s390x",
"4Desktop:mikmod-debuginfo-0:3.1.6-32.EL4.x86_64",
"4Desktop:mikmod-devel-0:3.1.6-32.EL4.i386",
"4Desktop:mikmod-devel-0:3.1.6-32.EL4.ia64",
"4Desktop:mikmod-devel-0:3.1.6-32.EL4.ppc",
"4Desktop:mikmod-devel-0:3.1.6-32.EL4.s390",
"4Desktop:mikmod-devel-0:3.1.6-32.EL4.s390x",
"4Desktop:mikmod-devel-0:3.1.6-32.EL4.x86_64",
"4ES:mikmod-0:3.1.6-32.EL4.i386",
"4ES:mikmod-0:3.1.6-32.EL4.ia64",
"4ES:mikmod-0:3.1.6-32.EL4.ppc",
"4ES:mikmod-0:3.1.6-32.EL4.ppc64",
"4ES:mikmod-0:3.1.6-32.EL4.s390",
"4ES:mikmod-0:3.1.6-32.EL4.s390x",
"4ES:mikmod-0:3.1.6-32.EL4.src",
"4ES:mikmod-0:3.1.6-32.EL4.x86_64",
"4ES:mikmod-debuginfo-0:3.1.6-32.EL4.i386",
"4ES:mikmod-debuginfo-0:3.1.6-32.EL4.ia64",
"4ES:mikmod-debuginfo-0:3.1.6-32.EL4.ppc",
"4ES:mikmod-debuginfo-0:3.1.6-32.EL4.ppc64",
"4ES:mikmod-debuginfo-0:3.1.6-32.EL4.s390",
"4ES:mikmod-debuginfo-0:3.1.6-32.EL4.s390x",
"4ES:mikmod-debuginfo-0:3.1.6-32.EL4.x86_64",
"4ES:mikmod-devel-0:3.1.6-32.EL4.i386",
"4ES:mikmod-devel-0:3.1.6-32.EL4.ia64",
"4ES:mikmod-devel-0:3.1.6-32.EL4.ppc",
"4ES:mikmod-devel-0:3.1.6-32.EL4.s390",
"4ES:mikmod-devel-0:3.1.6-32.EL4.s390x",
"4ES:mikmod-devel-0:3.1.6-32.EL4.x86_64",
"4WS:mikmod-0:3.1.6-32.EL4.i386",
"4WS:mikmod-0:3.1.6-32.EL4.ia64",
"4WS:mikmod-0:3.1.6-32.EL4.ppc",
"4WS:mikmod-0:3.1.6-32.EL4.ppc64",
"4WS:mikmod-0:3.1.6-32.EL4.s390",
"4WS:mikmod-0:3.1.6-32.EL4.s390x",
"4WS:mikmod-0:3.1.6-32.EL4.src",
"4WS:mikmod-0:3.1.6-32.EL4.x86_64",
"4WS:mikmod-debuginfo-0:3.1.6-32.EL4.i386",
"4WS:mikmod-debuginfo-0:3.1.6-32.EL4.ia64",
"4WS:mikmod-debuginfo-0:3.1.6-32.EL4.ppc",
"4WS:mikmod-debuginfo-0:3.1.6-32.EL4.ppc64",
"4WS:mikmod-debuginfo-0:3.1.6-32.EL4.s390",
"4WS:mikmod-debuginfo-0:3.1.6-32.EL4.s390x",
"4WS:mikmod-debuginfo-0:3.1.6-32.EL4.x86_64",
"4WS:mikmod-devel-0:3.1.6-32.EL4.i386",
"4WS:mikmod-devel-0:3.1.6-32.EL4.ia64",
"4WS:mikmod-devel-0:3.1.6-32.EL4.ppc",
"4WS:mikmod-devel-0:3.1.6-32.EL4.s390",
"4WS:mikmod-devel-0:3.1.6-32.EL4.s390x",
"4WS:mikmod-devel-0:3.1.6-32.EL4.x86_64"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2005-06-13T12:18:00+00:00"
] |
|
CVE-2003-1303
| null |
security flaw
|
Important
| null | null |
Buffer overflow in the imap_fetch_overview function in the IMAP functionality (php_imap.c) in PHP before 4.3.3 allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long e-mail address in a (1) To or (2) From header.
| null |
2003-06-12T00:00:00+00:00
|
2003-06-12T00:00:00+00:00
|
[
"3AS:php-0:4.3.2-30.ent.i386",
"3AS:php-0:4.3.2-30.ent.ia64",
"3AS:php-0:4.3.2-30.ent.ppc",
"3AS:php-0:4.3.2-30.ent.s390",
"3AS:php-0:4.3.2-30.ent.s390x",
"3AS:php-0:4.3.2-30.ent.src",
"3AS:php-0:4.3.2-30.ent.x86_64",
"3AS:php-debuginfo-0:4.3.2-30.ent.i386",
"3AS:php-debuginfo-0:4.3.2-30.ent.ia64",
"3AS:php-debuginfo-0:4.3.2-30.ent.ppc",
"3AS:php-debuginfo-0:4.3.2-30.ent.s390",
"3AS:php-debuginfo-0:4.3.2-30.ent.s390x",
"3AS:php-debuginfo-0:4.3.2-30.ent.x86_64",
"3AS:php-devel-0:4.3.2-30.ent.i386",
"3AS:php-devel-0:4.3.2-30.ent.ia64",
"3AS:php-devel-0:4.3.2-30.ent.ppc",
"3AS:php-devel-0:4.3.2-30.ent.s390",
"3AS:php-devel-0:4.3.2-30.ent.s390x",
"3AS:php-devel-0:4.3.2-30.ent.x86_64",
"3AS:php-imap-0:4.3.2-30.ent.i386",
"3AS:php-imap-0:4.3.2-30.ent.ia64",
"3AS:php-imap-0:4.3.2-30.ent.ppc",
"3AS:php-imap-0:4.3.2-30.ent.s390",
"3AS:php-imap-0:4.3.2-30.ent.s390x",
"3AS:php-imap-0:4.3.2-30.ent.x86_64",
"3AS:php-ldap-0:4.3.2-30.ent.i386",
"3AS:php-ldap-0:4.3.2-30.ent.ia64",
"3AS:php-ldap-0:4.3.2-30.ent.ppc",
"3AS:php-ldap-0:4.3.2-30.ent.s390",
"3AS:php-ldap-0:4.3.2-30.ent.s390x",
"3AS:php-ldap-0:4.3.2-30.ent.x86_64",
"3AS:php-mysql-0:4.3.2-30.ent.i386",
"3AS:php-mysql-0:4.3.2-30.ent.ia64",
"3AS:php-mysql-0:4.3.2-30.ent.ppc",
"3AS:php-mysql-0:4.3.2-30.ent.s390",
"3AS:php-mysql-0:4.3.2-30.ent.s390x",
"3AS:php-mysql-0:4.3.2-30.ent.x86_64",
"3AS:php-odbc-0:4.3.2-30.ent.i386",
"3AS:php-odbc-0:4.3.2-30.ent.ia64",
"3AS:php-odbc-0:4.3.2-30.ent.ppc",
"3AS:php-odbc-0:4.3.2-30.ent.s390",
"3AS:php-odbc-0:4.3.2-30.ent.s390x",
"3AS:php-odbc-0:4.3.2-30.ent.x86_64",
"3AS:php-pgsql-0:4.3.2-30.ent.i386",
"3AS:php-pgsql-0:4.3.2-30.ent.ia64",
"3AS:php-pgsql-0:4.3.2-30.ent.ppc",
"3AS:php-pgsql-0:4.3.2-30.ent.s390",
"3AS:php-pgsql-0:4.3.2-30.ent.s390x",
"3AS:php-pgsql-0:4.3.2-30.ent.x86_64",
"3Desktop:php-0:4.3.2-30.ent.i386",
"3Desktop:php-0:4.3.2-30.ent.ia64",
"3Desktop:php-0:4.3.2-30.ent.ppc",
"3Desktop:php-0:4.3.2-30.ent.s390",
"3Desktop:php-0:4.3.2-30.ent.s390x",
"3Desktop:php-0:4.3.2-30.ent.src",
"3Desktop:php-0:4.3.2-30.ent.x86_64",
"3Desktop:php-debuginfo-0:4.3.2-30.ent.i386",
"3Desktop:php-debuginfo-0:4.3.2-30.ent.ia64",
"3Desktop:php-debuginfo-0:4.3.2-30.ent.ppc",
"3Desktop:php-debuginfo-0:4.3.2-30.ent.s390",
"3Desktop:php-debuginfo-0:4.3.2-30.ent.s390x",
"3Desktop:php-debuginfo-0:4.3.2-30.ent.x86_64",
"3Desktop:php-devel-0:4.3.2-30.ent.i386",
"3Desktop:php-devel-0:4.3.2-30.ent.ia64",
"3Desktop:php-devel-0:4.3.2-30.ent.ppc",
"3Desktop:php-devel-0:4.3.2-30.ent.s390",
"3Desktop:php-devel-0:4.3.2-30.ent.s390x",
"3Desktop:php-devel-0:4.3.2-30.ent.x86_64",
"3Desktop:php-imap-0:4.3.2-30.ent.i386",
"3Desktop:php-imap-0:4.3.2-30.ent.ia64",
"3Desktop:php-imap-0:4.3.2-30.ent.ppc",
"3Desktop:php-imap-0:4.3.2-30.ent.s390",
"3Desktop:php-imap-0:4.3.2-30.ent.s390x",
"3Desktop:php-imap-0:4.3.2-30.ent.x86_64",
"3Desktop:php-ldap-0:4.3.2-30.ent.i386",
"3Desktop:php-ldap-0:4.3.2-30.ent.ia64",
"3Desktop:php-ldap-0:4.3.2-30.ent.ppc",
"3Desktop:php-ldap-0:4.3.2-30.ent.s390",
"3Desktop:php-ldap-0:4.3.2-30.ent.s390x",
"3Desktop:php-ldap-0:4.3.2-30.ent.x86_64",
"3Desktop:php-mysql-0:4.3.2-30.ent.i386",
"3Desktop:php-mysql-0:4.3.2-30.ent.ia64",
"3Desktop:php-mysql-0:4.3.2-30.ent.ppc",
"3Desktop:php-mysql-0:4.3.2-30.ent.s390",
"3Desktop:php-mysql-0:4.3.2-30.ent.s390x",
"3Desktop:php-mysql-0:4.3.2-30.ent.x86_64",
"3Desktop:php-odbc-0:4.3.2-30.ent.i386",
"3Desktop:php-odbc-0:4.3.2-30.ent.ia64",
"3Desktop:php-odbc-0:4.3.2-30.ent.ppc",
"3Desktop:php-odbc-0:4.3.2-30.ent.s390",
"3Desktop:php-odbc-0:4.3.2-30.ent.s390x",
"3Desktop:php-odbc-0:4.3.2-30.ent.x86_64",
"3Desktop:php-pgsql-0:4.3.2-30.ent.i386",
"3Desktop:php-pgsql-0:4.3.2-30.ent.ia64",
"3Desktop:php-pgsql-0:4.3.2-30.ent.ppc",
"3Desktop:php-pgsql-0:4.3.2-30.ent.s390",
"3Desktop:php-pgsql-0:4.3.2-30.ent.s390x",
"3Desktop:php-pgsql-0:4.3.2-30.ent.x86_64",
"3ES:php-0:4.3.2-30.ent.i386",
"3ES:php-0:4.3.2-30.ent.ia64",
"3ES:php-0:4.3.2-30.ent.ppc",
"3ES:php-0:4.3.2-30.ent.s390",
"3ES:php-0:4.3.2-30.ent.s390x",
"3ES:php-0:4.3.2-30.ent.src",
"3ES:php-0:4.3.2-30.ent.x86_64",
"3ES:php-debuginfo-0:4.3.2-30.ent.i386",
"3ES:php-debuginfo-0:4.3.2-30.ent.ia64",
"3ES:php-debuginfo-0:4.3.2-30.ent.ppc",
"3ES:php-debuginfo-0:4.3.2-30.ent.s390",
"3ES:php-debuginfo-0:4.3.2-30.ent.s390x",
"3ES:php-debuginfo-0:4.3.2-30.ent.x86_64",
"3ES:php-devel-0:4.3.2-30.ent.i386",
"3ES:php-devel-0:4.3.2-30.ent.ia64",
"3ES:php-devel-0:4.3.2-30.ent.ppc",
"3ES:php-devel-0:4.3.2-30.ent.s390",
"3ES:php-devel-0:4.3.2-30.ent.s390x",
"3ES:php-devel-0:4.3.2-30.ent.x86_64",
"3ES:php-imap-0:4.3.2-30.ent.i386",
"3ES:php-imap-0:4.3.2-30.ent.ia64",
"3ES:php-imap-0:4.3.2-30.ent.ppc",
"3ES:php-imap-0:4.3.2-30.ent.s390",
"3ES:php-imap-0:4.3.2-30.ent.s390x",
"3ES:php-imap-0:4.3.2-30.ent.x86_64",
"3ES:php-ldap-0:4.3.2-30.ent.i386",
"3ES:php-ldap-0:4.3.2-30.ent.ia64",
"3ES:php-ldap-0:4.3.2-30.ent.ppc",
"3ES:php-ldap-0:4.3.2-30.ent.s390",
"3ES:php-ldap-0:4.3.2-30.ent.s390x",
"3ES:php-ldap-0:4.3.2-30.ent.x86_64",
"3ES:php-mysql-0:4.3.2-30.ent.i386",
"3ES:php-mysql-0:4.3.2-30.ent.ia64",
"3ES:php-mysql-0:4.3.2-30.ent.ppc",
"3ES:php-mysql-0:4.3.2-30.ent.s390",
"3ES:php-mysql-0:4.3.2-30.ent.s390x",
"3ES:php-mysql-0:4.3.2-30.ent.x86_64",
"3ES:php-odbc-0:4.3.2-30.ent.i386",
"3ES:php-odbc-0:4.3.2-30.ent.ia64",
"3ES:php-odbc-0:4.3.2-30.ent.ppc",
"3ES:php-odbc-0:4.3.2-30.ent.s390",
"3ES:php-odbc-0:4.3.2-30.ent.s390x",
"3ES:php-odbc-0:4.3.2-30.ent.x86_64",
"3ES:php-pgsql-0:4.3.2-30.ent.i386",
"3ES:php-pgsql-0:4.3.2-30.ent.ia64",
"3ES:php-pgsql-0:4.3.2-30.ent.ppc",
"3ES:php-pgsql-0:4.3.2-30.ent.s390",
"3ES:php-pgsql-0:4.3.2-30.ent.s390x",
"3ES:php-pgsql-0:4.3.2-30.ent.x86_64",
"3WS:php-0:4.3.2-30.ent.i386",
"3WS:php-0:4.3.2-30.ent.ia64",
"3WS:php-0:4.3.2-30.ent.ppc",
"3WS:php-0:4.3.2-30.ent.s390",
"3WS:php-0:4.3.2-30.ent.s390x",
"3WS:php-0:4.3.2-30.ent.src",
"3WS:php-0:4.3.2-30.ent.x86_64",
"3WS:php-debuginfo-0:4.3.2-30.ent.i386",
"3WS:php-debuginfo-0:4.3.2-30.ent.ia64",
"3WS:php-debuginfo-0:4.3.2-30.ent.ppc",
"3WS:php-debuginfo-0:4.3.2-30.ent.s390",
"3WS:php-debuginfo-0:4.3.2-30.ent.s390x",
"3WS:php-debuginfo-0:4.3.2-30.ent.x86_64",
"3WS:php-devel-0:4.3.2-30.ent.i386",
"3WS:php-devel-0:4.3.2-30.ent.ia64",
"3WS:php-devel-0:4.3.2-30.ent.ppc",
"3WS:php-devel-0:4.3.2-30.ent.s390",
"3WS:php-devel-0:4.3.2-30.ent.s390x",
"3WS:php-devel-0:4.3.2-30.ent.x86_64",
"3WS:php-imap-0:4.3.2-30.ent.i386",
"3WS:php-imap-0:4.3.2-30.ent.ia64",
"3WS:php-imap-0:4.3.2-30.ent.ppc",
"3WS:php-imap-0:4.3.2-30.ent.s390",
"3WS:php-imap-0:4.3.2-30.ent.s390x",
"3WS:php-imap-0:4.3.2-30.ent.x86_64",
"3WS:php-ldap-0:4.3.2-30.ent.i386",
"3WS:php-ldap-0:4.3.2-30.ent.ia64",
"3WS:php-ldap-0:4.3.2-30.ent.ppc",
"3WS:php-ldap-0:4.3.2-30.ent.s390",
"3WS:php-ldap-0:4.3.2-30.ent.s390x",
"3WS:php-ldap-0:4.3.2-30.ent.x86_64",
"3WS:php-mysql-0:4.3.2-30.ent.i386",
"3WS:php-mysql-0:4.3.2-30.ent.ia64",
"3WS:php-mysql-0:4.3.2-30.ent.ppc",
"3WS:php-mysql-0:4.3.2-30.ent.s390",
"3WS:php-mysql-0:4.3.2-30.ent.s390x",
"3WS:php-mysql-0:4.3.2-30.ent.x86_64",
"3WS:php-odbc-0:4.3.2-30.ent.i386",
"3WS:php-odbc-0:4.3.2-30.ent.ia64",
"3WS:php-odbc-0:4.3.2-30.ent.ppc",
"3WS:php-odbc-0:4.3.2-30.ent.s390",
"3WS:php-odbc-0:4.3.2-30.ent.s390x",
"3WS:php-odbc-0:4.3.2-30.ent.x86_64",
"3WS:php-pgsql-0:4.3.2-30.ent.i386",
"3WS:php-pgsql-0:4.3.2-30.ent.ia64",
"3WS:php-pgsql-0:4.3.2-30.ent.ppc",
"3WS:php-pgsql-0:4.3.2-30.ent.s390",
"3WS:php-pgsql-0:4.3.2-30.ent.s390x",
"3WS:php-pgsql-0:4.3.2-30.ent.x86_64",
"4AS:php-0:4.3.9-3.12.i386",
"4AS:php-0:4.3.9-3.12.ia64",
"4AS:php-0:4.3.9-3.12.ppc",
"4AS:php-0:4.3.9-3.12.s390",
"4AS:php-0:4.3.9-3.12.s390x",
"4AS:php-0:4.3.9-3.12.src",
"4AS:php-0:4.3.9-3.12.x86_64",
"4AS:php-debuginfo-0:4.3.9-3.12.i386",
"4AS:php-debuginfo-0:4.3.9-3.12.ia64",
"4AS:php-debuginfo-0:4.3.9-3.12.ppc",
"4AS:php-debuginfo-0:4.3.9-3.12.s390",
"4AS:php-debuginfo-0:4.3.9-3.12.s390x",
"4AS:php-debuginfo-0:4.3.9-3.12.x86_64",
"4AS:php-devel-0:4.3.9-3.12.i386",
"4AS:php-devel-0:4.3.9-3.12.ia64",
"4AS:php-devel-0:4.3.9-3.12.ppc",
"4AS:php-devel-0:4.3.9-3.12.s390",
"4AS:php-devel-0:4.3.9-3.12.s390x",
"4AS:php-devel-0:4.3.9-3.12.x86_64",
"4AS:php-domxml-0:4.3.9-3.12.i386",
"4AS:php-domxml-0:4.3.9-3.12.ia64",
"4AS:php-domxml-0:4.3.9-3.12.ppc",
"4AS:php-domxml-0:4.3.9-3.12.s390",
"4AS:php-domxml-0:4.3.9-3.12.s390x",
"4AS:php-domxml-0:4.3.9-3.12.x86_64",
"4AS:php-gd-0:4.3.9-3.12.i386",
"4AS:php-gd-0:4.3.9-3.12.ia64",
"4AS:php-gd-0:4.3.9-3.12.ppc",
"4AS:php-gd-0:4.3.9-3.12.s390",
"4AS:php-gd-0:4.3.9-3.12.s390x",
"4AS:php-gd-0:4.3.9-3.12.x86_64",
"4AS:php-imap-0:4.3.9-3.12.i386",
"4AS:php-imap-0:4.3.9-3.12.ia64",
"4AS:php-imap-0:4.3.9-3.12.ppc",
"4AS:php-imap-0:4.3.9-3.12.s390",
"4AS:php-imap-0:4.3.9-3.12.s390x",
"4AS:php-imap-0:4.3.9-3.12.x86_64",
"4AS:php-ldap-0:4.3.9-3.12.i386",
"4AS:php-ldap-0:4.3.9-3.12.ia64",
"4AS:php-ldap-0:4.3.9-3.12.ppc",
"4AS:php-ldap-0:4.3.9-3.12.s390",
"4AS:php-ldap-0:4.3.9-3.12.s390x",
"4AS:php-ldap-0:4.3.9-3.12.x86_64",
"4AS:php-mbstring-0:4.3.9-3.12.i386",
"4AS:php-mbstring-0:4.3.9-3.12.ia64",
"4AS:php-mbstring-0:4.3.9-3.12.ppc",
"4AS:php-mbstring-0:4.3.9-3.12.s390",
"4AS:php-mbstring-0:4.3.9-3.12.s390x",
"4AS:php-mbstring-0:4.3.9-3.12.x86_64",
"4AS:php-mysql-0:4.3.9-3.12.i386",
"4AS:php-mysql-0:4.3.9-3.12.ia64",
"4AS:php-mysql-0:4.3.9-3.12.ppc",
"4AS:php-mysql-0:4.3.9-3.12.s390",
"4AS:php-mysql-0:4.3.9-3.12.s390x",
"4AS:php-mysql-0:4.3.9-3.12.x86_64",
"4AS:php-ncurses-0:4.3.9-3.12.i386",
"4AS:php-ncurses-0:4.3.9-3.12.ia64",
"4AS:php-ncurses-0:4.3.9-3.12.ppc",
"4AS:php-ncurses-0:4.3.9-3.12.s390",
"4AS:php-ncurses-0:4.3.9-3.12.s390x",
"4AS:php-ncurses-0:4.3.9-3.12.x86_64",
"4AS:php-odbc-0:4.3.9-3.12.i386",
"4AS:php-odbc-0:4.3.9-3.12.ia64",
"4AS:php-odbc-0:4.3.9-3.12.ppc",
"4AS:php-odbc-0:4.3.9-3.12.s390",
"4AS:php-odbc-0:4.3.9-3.12.s390x",
"4AS:php-odbc-0:4.3.9-3.12.x86_64",
"4AS:php-pear-0:4.3.9-3.12.i386",
"4AS:php-pear-0:4.3.9-3.12.ia64",
"4AS:php-pear-0:4.3.9-3.12.ppc",
"4AS:php-pear-0:4.3.9-3.12.s390",
"4AS:php-pear-0:4.3.9-3.12.s390x",
"4AS:php-pear-0:4.3.9-3.12.x86_64",
"4AS:php-pgsql-0:4.3.9-3.12.i386",
"4AS:php-pgsql-0:4.3.9-3.12.ia64",
"4AS:php-pgsql-0:4.3.9-3.12.ppc",
"4AS:php-pgsql-0:4.3.9-3.12.s390",
"4AS:php-pgsql-0:4.3.9-3.12.s390x",
"4AS:php-pgsql-0:4.3.9-3.12.x86_64",
"4AS:php-snmp-0:4.3.9-3.12.i386",
"4AS:php-snmp-0:4.3.9-3.12.ia64",
"4AS:php-snmp-0:4.3.9-3.12.ppc",
"4AS:php-snmp-0:4.3.9-3.12.s390",
"4AS:php-snmp-0:4.3.9-3.12.s390x",
"4AS:php-snmp-0:4.3.9-3.12.x86_64",
"4AS:php-xmlrpc-0:4.3.9-3.12.i386",
"4AS:php-xmlrpc-0:4.3.9-3.12.ia64",
"4AS:php-xmlrpc-0:4.3.9-3.12.ppc",
"4AS:php-xmlrpc-0:4.3.9-3.12.s390",
"4AS:php-xmlrpc-0:4.3.9-3.12.s390x",
"4AS:php-xmlrpc-0:4.3.9-3.12.x86_64",
"4Desktop:php-0:4.3.9-3.12.i386",
"4Desktop:php-0:4.3.9-3.12.ia64",
"4Desktop:php-0:4.3.9-3.12.ppc",
"4Desktop:php-0:4.3.9-3.12.s390",
"4Desktop:php-0:4.3.9-3.12.s390x",
"4Desktop:php-0:4.3.9-3.12.src",
"4Desktop:php-0:4.3.9-3.12.x86_64",
"4Desktop:php-debuginfo-0:4.3.9-3.12.i386",
"4Desktop:php-debuginfo-0:4.3.9-3.12.ia64",
"4Desktop:php-debuginfo-0:4.3.9-3.12.ppc",
"4Desktop:php-debuginfo-0:4.3.9-3.12.s390",
"4Desktop:php-debuginfo-0:4.3.9-3.12.s390x",
"4Desktop:php-debuginfo-0:4.3.9-3.12.x86_64",
"4Desktop:php-devel-0:4.3.9-3.12.i386",
"4Desktop:php-devel-0:4.3.9-3.12.ia64",
"4Desktop:php-devel-0:4.3.9-3.12.ppc",
"4Desktop:php-devel-0:4.3.9-3.12.s390",
"4Desktop:php-devel-0:4.3.9-3.12.s390x",
"4Desktop:php-devel-0:4.3.9-3.12.x86_64",
"4Desktop:php-domxml-0:4.3.9-3.12.i386",
"4Desktop:php-domxml-0:4.3.9-3.12.ia64",
"4Desktop:php-domxml-0:4.3.9-3.12.ppc",
"4Desktop:php-domxml-0:4.3.9-3.12.s390",
"4Desktop:php-domxml-0:4.3.9-3.12.s390x",
"4Desktop:php-domxml-0:4.3.9-3.12.x86_64",
"4Desktop:php-gd-0:4.3.9-3.12.i386",
"4Desktop:php-gd-0:4.3.9-3.12.ia64",
"4Desktop:php-gd-0:4.3.9-3.12.ppc",
"4Desktop:php-gd-0:4.3.9-3.12.s390",
"4Desktop:php-gd-0:4.3.9-3.12.s390x",
"4Desktop:php-gd-0:4.3.9-3.12.x86_64",
"4Desktop:php-imap-0:4.3.9-3.12.i386",
"4Desktop:php-imap-0:4.3.9-3.12.ia64",
"4Desktop:php-imap-0:4.3.9-3.12.ppc",
"4Desktop:php-imap-0:4.3.9-3.12.s390",
"4Desktop:php-imap-0:4.3.9-3.12.s390x",
"4Desktop:php-imap-0:4.3.9-3.12.x86_64",
"4Desktop:php-ldap-0:4.3.9-3.12.i386",
"4Desktop:php-ldap-0:4.3.9-3.12.ia64",
"4Desktop:php-ldap-0:4.3.9-3.12.ppc",
"4Desktop:php-ldap-0:4.3.9-3.12.s390",
"4Desktop:php-ldap-0:4.3.9-3.12.s390x",
"4Desktop:php-ldap-0:4.3.9-3.12.x86_64",
"4Desktop:php-mbstring-0:4.3.9-3.12.i386",
"4Desktop:php-mbstring-0:4.3.9-3.12.ia64",
"4Desktop:php-mbstring-0:4.3.9-3.12.ppc",
"4Desktop:php-mbstring-0:4.3.9-3.12.s390",
"4Desktop:php-mbstring-0:4.3.9-3.12.s390x",
"4Desktop:php-mbstring-0:4.3.9-3.12.x86_64",
"4Desktop:php-mysql-0:4.3.9-3.12.i386",
"4Desktop:php-mysql-0:4.3.9-3.12.ia64",
"4Desktop:php-mysql-0:4.3.9-3.12.ppc",
"4Desktop:php-mysql-0:4.3.9-3.12.s390",
"4Desktop:php-mysql-0:4.3.9-3.12.s390x",
"4Desktop:php-mysql-0:4.3.9-3.12.x86_64",
"4Desktop:php-ncurses-0:4.3.9-3.12.i386",
"4Desktop:php-ncurses-0:4.3.9-3.12.ia64",
"4Desktop:php-ncurses-0:4.3.9-3.12.ppc",
"4Desktop:php-ncurses-0:4.3.9-3.12.s390",
"4Desktop:php-ncurses-0:4.3.9-3.12.s390x",
"4Desktop:php-ncurses-0:4.3.9-3.12.x86_64",
"4Desktop:php-odbc-0:4.3.9-3.12.i386",
"4Desktop:php-odbc-0:4.3.9-3.12.ia64",
"4Desktop:php-odbc-0:4.3.9-3.12.ppc",
"4Desktop:php-odbc-0:4.3.9-3.12.s390",
"4Desktop:php-odbc-0:4.3.9-3.12.s390x",
"4Desktop:php-odbc-0:4.3.9-3.12.x86_64",
"4Desktop:php-pear-0:4.3.9-3.12.i386",
"4Desktop:php-pear-0:4.3.9-3.12.ia64",
"4Desktop:php-pear-0:4.3.9-3.12.ppc",
"4Desktop:php-pear-0:4.3.9-3.12.s390",
"4Desktop:php-pear-0:4.3.9-3.12.s390x",
"4Desktop:php-pear-0:4.3.9-3.12.x86_64",
"4Desktop:php-pgsql-0:4.3.9-3.12.i386",
"4Desktop:php-pgsql-0:4.3.9-3.12.ia64",
"4Desktop:php-pgsql-0:4.3.9-3.12.ppc",
"4Desktop:php-pgsql-0:4.3.9-3.12.s390",
"4Desktop:php-pgsql-0:4.3.9-3.12.s390x",
"4Desktop:php-pgsql-0:4.3.9-3.12.x86_64",
"4Desktop:php-snmp-0:4.3.9-3.12.i386",
"4Desktop:php-snmp-0:4.3.9-3.12.ia64",
"4Desktop:php-snmp-0:4.3.9-3.12.ppc",
"4Desktop:php-snmp-0:4.3.9-3.12.s390",
"4Desktop:php-snmp-0:4.3.9-3.12.s390x",
"4Desktop:php-snmp-0:4.3.9-3.12.x86_64",
"4Desktop:php-xmlrpc-0:4.3.9-3.12.i386",
"4Desktop:php-xmlrpc-0:4.3.9-3.12.ia64",
"4Desktop:php-xmlrpc-0:4.3.9-3.12.ppc",
"4Desktop:php-xmlrpc-0:4.3.9-3.12.s390",
"4Desktop:php-xmlrpc-0:4.3.9-3.12.s390x",
"4Desktop:php-xmlrpc-0:4.3.9-3.12.x86_64",
"4ES:php-0:4.3.9-3.12.i386",
"4ES:php-0:4.3.9-3.12.ia64",
"4ES:php-0:4.3.9-3.12.ppc",
"4ES:php-0:4.3.9-3.12.s390",
"4ES:php-0:4.3.9-3.12.s390x",
"4ES:php-0:4.3.9-3.12.src",
"4ES:php-0:4.3.9-3.12.x86_64",
"4ES:php-debuginfo-0:4.3.9-3.12.i386",
"4ES:php-debuginfo-0:4.3.9-3.12.ia64",
"4ES:php-debuginfo-0:4.3.9-3.12.ppc",
"4ES:php-debuginfo-0:4.3.9-3.12.s390",
"4ES:php-debuginfo-0:4.3.9-3.12.s390x",
"4ES:php-debuginfo-0:4.3.9-3.12.x86_64",
"4ES:php-devel-0:4.3.9-3.12.i386",
"4ES:php-devel-0:4.3.9-3.12.ia64",
"4ES:php-devel-0:4.3.9-3.12.ppc",
"4ES:php-devel-0:4.3.9-3.12.s390",
"4ES:php-devel-0:4.3.9-3.12.s390x",
"4ES:php-devel-0:4.3.9-3.12.x86_64",
"4ES:php-domxml-0:4.3.9-3.12.i386",
"4ES:php-domxml-0:4.3.9-3.12.ia64",
"4ES:php-domxml-0:4.3.9-3.12.ppc",
"4ES:php-domxml-0:4.3.9-3.12.s390",
"4ES:php-domxml-0:4.3.9-3.12.s390x",
"4ES:php-domxml-0:4.3.9-3.12.x86_64",
"4ES:php-gd-0:4.3.9-3.12.i386",
"4ES:php-gd-0:4.3.9-3.12.ia64",
"4ES:php-gd-0:4.3.9-3.12.ppc",
"4ES:php-gd-0:4.3.9-3.12.s390",
"4ES:php-gd-0:4.3.9-3.12.s390x",
"4ES:php-gd-0:4.3.9-3.12.x86_64",
"4ES:php-imap-0:4.3.9-3.12.i386",
"4ES:php-imap-0:4.3.9-3.12.ia64",
"4ES:php-imap-0:4.3.9-3.12.ppc",
"4ES:php-imap-0:4.3.9-3.12.s390",
"4ES:php-imap-0:4.3.9-3.12.s390x",
"4ES:php-imap-0:4.3.9-3.12.x86_64",
"4ES:php-ldap-0:4.3.9-3.12.i386",
"4ES:php-ldap-0:4.3.9-3.12.ia64",
"4ES:php-ldap-0:4.3.9-3.12.ppc",
"4ES:php-ldap-0:4.3.9-3.12.s390",
"4ES:php-ldap-0:4.3.9-3.12.s390x",
"4ES:php-ldap-0:4.3.9-3.12.x86_64",
"4ES:php-mbstring-0:4.3.9-3.12.i386",
"4ES:php-mbstring-0:4.3.9-3.12.ia64",
"4ES:php-mbstring-0:4.3.9-3.12.ppc",
"4ES:php-mbstring-0:4.3.9-3.12.s390",
"4ES:php-mbstring-0:4.3.9-3.12.s390x",
"4ES:php-mbstring-0:4.3.9-3.12.x86_64",
"4ES:php-mysql-0:4.3.9-3.12.i386",
"4ES:php-mysql-0:4.3.9-3.12.ia64",
"4ES:php-mysql-0:4.3.9-3.12.ppc",
"4ES:php-mysql-0:4.3.9-3.12.s390",
"4ES:php-mysql-0:4.3.9-3.12.s390x",
"4ES:php-mysql-0:4.3.9-3.12.x86_64",
"4ES:php-ncurses-0:4.3.9-3.12.i386",
"4ES:php-ncurses-0:4.3.9-3.12.ia64",
"4ES:php-ncurses-0:4.3.9-3.12.ppc",
"4ES:php-ncurses-0:4.3.9-3.12.s390",
"4ES:php-ncurses-0:4.3.9-3.12.s390x",
"4ES:php-ncurses-0:4.3.9-3.12.x86_64",
"4ES:php-odbc-0:4.3.9-3.12.i386",
"4ES:php-odbc-0:4.3.9-3.12.ia64",
"4ES:php-odbc-0:4.3.9-3.12.ppc",
"4ES:php-odbc-0:4.3.9-3.12.s390",
"4ES:php-odbc-0:4.3.9-3.12.s390x",
"4ES:php-odbc-0:4.3.9-3.12.x86_64",
"4ES:php-pear-0:4.3.9-3.12.i386",
"4ES:php-pear-0:4.3.9-3.12.ia64",
"4ES:php-pear-0:4.3.9-3.12.ppc",
"4ES:php-pear-0:4.3.9-3.12.s390",
"4ES:php-pear-0:4.3.9-3.12.s390x",
"4ES:php-pear-0:4.3.9-3.12.x86_64",
"4ES:php-pgsql-0:4.3.9-3.12.i386",
"4ES:php-pgsql-0:4.3.9-3.12.ia64",
"4ES:php-pgsql-0:4.3.9-3.12.ppc",
"4ES:php-pgsql-0:4.3.9-3.12.s390",
"4ES:php-pgsql-0:4.3.9-3.12.s390x",
"4ES:php-pgsql-0:4.3.9-3.12.x86_64",
"4ES:php-snmp-0:4.3.9-3.12.i386",
"4ES:php-snmp-0:4.3.9-3.12.ia64",
"4ES:php-snmp-0:4.3.9-3.12.ppc",
"4ES:php-snmp-0:4.3.9-3.12.s390",
"4ES:php-snmp-0:4.3.9-3.12.s390x",
"4ES:php-snmp-0:4.3.9-3.12.x86_64",
"4ES:php-xmlrpc-0:4.3.9-3.12.i386",
"4ES:php-xmlrpc-0:4.3.9-3.12.ia64",
"4ES:php-xmlrpc-0:4.3.9-3.12.ppc",
"4ES:php-xmlrpc-0:4.3.9-3.12.s390",
"4ES:php-xmlrpc-0:4.3.9-3.12.s390x",
"4ES:php-xmlrpc-0:4.3.9-3.12.x86_64",
"4WS:php-0:4.3.9-3.12.i386",
"4WS:php-0:4.3.9-3.12.ia64",
"4WS:php-0:4.3.9-3.12.ppc",
"4WS:php-0:4.3.9-3.12.s390",
"4WS:php-0:4.3.9-3.12.s390x",
"4WS:php-0:4.3.9-3.12.src",
"4WS:php-0:4.3.9-3.12.x86_64",
"4WS:php-debuginfo-0:4.3.9-3.12.i386",
"4WS:php-debuginfo-0:4.3.9-3.12.ia64",
"4WS:php-debuginfo-0:4.3.9-3.12.ppc",
"4WS:php-debuginfo-0:4.3.9-3.12.s390",
"4WS:php-debuginfo-0:4.3.9-3.12.s390x",
"4WS:php-debuginfo-0:4.3.9-3.12.x86_64",
"4WS:php-devel-0:4.3.9-3.12.i386",
"4WS:php-devel-0:4.3.9-3.12.ia64",
"4WS:php-devel-0:4.3.9-3.12.ppc",
"4WS:php-devel-0:4.3.9-3.12.s390",
"4WS:php-devel-0:4.3.9-3.12.s390x",
"4WS:php-devel-0:4.3.9-3.12.x86_64",
"4WS:php-domxml-0:4.3.9-3.12.i386",
"4WS:php-domxml-0:4.3.9-3.12.ia64",
"4WS:php-domxml-0:4.3.9-3.12.ppc",
"4WS:php-domxml-0:4.3.9-3.12.s390",
"4WS:php-domxml-0:4.3.9-3.12.s390x",
"4WS:php-domxml-0:4.3.9-3.12.x86_64",
"4WS:php-gd-0:4.3.9-3.12.i386",
"4WS:php-gd-0:4.3.9-3.12.ia64",
"4WS:php-gd-0:4.3.9-3.12.ppc",
"4WS:php-gd-0:4.3.9-3.12.s390",
"4WS:php-gd-0:4.3.9-3.12.s390x",
"4WS:php-gd-0:4.3.9-3.12.x86_64",
"4WS:php-imap-0:4.3.9-3.12.i386",
"4WS:php-imap-0:4.3.9-3.12.ia64",
"4WS:php-imap-0:4.3.9-3.12.ppc",
"4WS:php-imap-0:4.3.9-3.12.s390",
"4WS:php-imap-0:4.3.9-3.12.s390x",
"4WS:php-imap-0:4.3.9-3.12.x86_64",
"4WS:php-ldap-0:4.3.9-3.12.i386",
"4WS:php-ldap-0:4.3.9-3.12.ia64",
"4WS:php-ldap-0:4.3.9-3.12.ppc",
"4WS:php-ldap-0:4.3.9-3.12.s390",
"4WS:php-ldap-0:4.3.9-3.12.s390x",
"4WS:php-ldap-0:4.3.9-3.12.x86_64",
"4WS:php-mbstring-0:4.3.9-3.12.i386",
"4WS:php-mbstring-0:4.3.9-3.12.ia64",
"4WS:php-mbstring-0:4.3.9-3.12.ppc",
"4WS:php-mbstring-0:4.3.9-3.12.s390",
"4WS:php-mbstring-0:4.3.9-3.12.s390x",
"4WS:php-mbstring-0:4.3.9-3.12.x86_64",
"4WS:php-mysql-0:4.3.9-3.12.i386",
"4WS:php-mysql-0:4.3.9-3.12.ia64",
"4WS:php-mysql-0:4.3.9-3.12.ppc",
"4WS:php-mysql-0:4.3.9-3.12.s390",
"4WS:php-mysql-0:4.3.9-3.12.s390x",
"4WS:php-mysql-0:4.3.9-3.12.x86_64",
"4WS:php-ncurses-0:4.3.9-3.12.i386",
"4WS:php-ncurses-0:4.3.9-3.12.ia64",
"4WS:php-ncurses-0:4.3.9-3.12.ppc",
"4WS:php-ncurses-0:4.3.9-3.12.s390",
"4WS:php-ncurses-0:4.3.9-3.12.s390x",
"4WS:php-ncurses-0:4.3.9-3.12.x86_64",
"4WS:php-odbc-0:4.3.9-3.12.i386",
"4WS:php-odbc-0:4.3.9-3.12.ia64",
"4WS:php-odbc-0:4.3.9-3.12.ppc",
"4WS:php-odbc-0:4.3.9-3.12.s390",
"4WS:php-odbc-0:4.3.9-3.12.s390x",
"4WS:php-odbc-0:4.3.9-3.12.x86_64",
"4WS:php-pear-0:4.3.9-3.12.i386",
"4WS:php-pear-0:4.3.9-3.12.ia64",
"4WS:php-pear-0:4.3.9-3.12.ppc",
"4WS:php-pear-0:4.3.9-3.12.s390",
"4WS:php-pear-0:4.3.9-3.12.s390x",
"4WS:php-pear-0:4.3.9-3.12.x86_64",
"4WS:php-pgsql-0:4.3.9-3.12.i386",
"4WS:php-pgsql-0:4.3.9-3.12.ia64",
"4WS:php-pgsql-0:4.3.9-3.12.ppc",
"4WS:php-pgsql-0:4.3.9-3.12.s390",
"4WS:php-pgsql-0:4.3.9-3.12.s390x",
"4WS:php-pgsql-0:4.3.9-3.12.x86_64",
"4WS:php-snmp-0:4.3.9-3.12.i386",
"4WS:php-snmp-0:4.3.9-3.12.ia64",
"4WS:php-snmp-0:4.3.9-3.12.ppc",
"4WS:php-snmp-0:4.3.9-3.12.s390",
"4WS:php-snmp-0:4.3.9-3.12.s390x",
"4WS:php-snmp-0:4.3.9-3.12.x86_64",
"4WS:php-xmlrpc-0:4.3.9-3.12.i386",
"4WS:php-xmlrpc-0:4.3.9-3.12.ia64",
"4WS:php-xmlrpc-0:4.3.9-3.12.ppc",
"4WS:php-xmlrpc-0:4.3.9-3.12.s390",
"4WS:php-xmlrpc-0:4.3.9-3.12.s390x",
"4WS:php-xmlrpc-0:4.3.9-3.12.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Important"
] |
[
null
] |
[
"vendor_fix",
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2006-04-25T14:33:00+00:00",
"2006-05-23T20:09:00+00:00"
] |
|
CVE-2003-0986
| null |
security flaw
|
Important
| null | null |
Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service.
| null |
2003-12-10T00:00:00+00:00
|
2003-12-15T00:00:00+00:00
|
[
"3AS:kernel-0:2.4.21-9.EL.athlon",
"3AS:kernel-0:2.4.21-9.EL.i686",
"3AS:kernel-0:2.4.21-9.EL.ia64",
"3AS:kernel-0:2.4.21-9.EL.ppc64iseries",
"3AS:kernel-0:2.4.21-9.EL.ppc64pseries",
"3AS:kernel-0:2.4.21-9.EL.s390",
"3AS:kernel-0:2.4.21-9.EL.s390x",
"3AS:kernel-0:2.4.21-9.EL.src",
"3AS:kernel-0:2.4.21-9.EL.x86_64",
"3AS:kernel-BOOT-0:2.4.21-9.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.athlon",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.i686",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.ia64",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.ppc64",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.ppc64iseries",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.ppc64pseries",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.s390",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.s390x",
"3AS:kernel-debuginfo-0:2.4.21-9.EL.x86_64",
"3AS:kernel-doc-0:2.4.21-9.EL.i386",
"3AS:kernel-doc-0:2.4.21-9.EL.ia64",
"3AS:kernel-doc-0:2.4.21-9.EL.ppc64",
"3AS:kernel-doc-0:2.4.21-9.EL.s390",
"3AS:kernel-doc-0:2.4.21-9.EL.s390x",
"3AS:kernel-doc-0:2.4.21-9.EL.x86_64",
"3AS:kernel-hugemem-0:2.4.21-9.EL.i686",
"3AS:kernel-hugemem-unsupported-0:2.4.21-9.EL.i686",
"3AS:kernel-smp-0:2.4.21-9.EL.athlon",
"3AS:kernel-smp-0:2.4.21-9.EL.i686",
"3AS:kernel-smp-0:2.4.21-9.EL.x86_64",
"3AS:kernel-smp-unsupported-0:2.4.21-9.EL.athlon",
"3AS:kernel-smp-unsupported-0:2.4.21-9.EL.i686",
"3AS:kernel-smp-unsupported-0:2.4.21-9.EL.x86_64",
"3AS:kernel-source-0:2.4.21-9.EL.i386",
"3AS:kernel-source-0:2.4.21-9.EL.ia64",
"3AS:kernel-source-0:2.4.21-9.EL.ppc64",
"3AS:kernel-source-0:2.4.21-9.EL.s390",
"3AS:kernel-source-0:2.4.21-9.EL.s390x",
"3AS:kernel-source-0:2.4.21-9.EL.x86_64",
"3AS:kernel-unsupported-0:2.4.21-9.EL.athlon",
"3AS:kernel-unsupported-0:2.4.21-9.EL.i686",
"3AS:kernel-unsupported-0:2.4.21-9.EL.ia64",
"3AS:kernel-unsupported-0:2.4.21-9.EL.ppc64iseries",
"3AS:kernel-unsupported-0:2.4.21-9.EL.ppc64pseries",
"3AS:kernel-unsupported-0:2.4.21-9.EL.s390",
"3AS:kernel-unsupported-0:2.4.21-9.EL.s390x",
"3AS:kernel-unsupported-0:2.4.21-9.EL.x86_64",
"3Desktop:kernel-0:2.4.21-9.EL.athlon",
"3Desktop:kernel-0:2.4.21-9.EL.i686",
"3Desktop:kernel-0:2.4.21-9.EL.ia64",
"3Desktop:kernel-0:2.4.21-9.EL.ppc64iseries",
"3Desktop:kernel-0:2.4.21-9.EL.ppc64pseries",
"3Desktop:kernel-0:2.4.21-9.EL.s390",
"3Desktop:kernel-0:2.4.21-9.EL.s390x",
"3Desktop:kernel-0:2.4.21-9.EL.src",
"3Desktop:kernel-0:2.4.21-9.EL.x86_64",
"3Desktop:kernel-BOOT-0:2.4.21-9.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.athlon",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.i686",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.ia64",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.ppc64",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.ppc64iseries",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.ppc64pseries",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.s390",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.s390x",
"3Desktop:kernel-debuginfo-0:2.4.21-9.EL.x86_64",
"3Desktop:kernel-doc-0:2.4.21-9.EL.i386",
"3Desktop:kernel-doc-0:2.4.21-9.EL.ia64",
"3Desktop:kernel-doc-0:2.4.21-9.EL.ppc64",
"3Desktop:kernel-doc-0:2.4.21-9.EL.s390",
"3Desktop:kernel-doc-0:2.4.21-9.EL.s390x",
"3Desktop:kernel-doc-0:2.4.21-9.EL.x86_64",
"3Desktop:kernel-hugemem-0:2.4.21-9.EL.i686",
"3Desktop:kernel-hugemem-unsupported-0:2.4.21-9.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-9.EL.athlon",
"3Desktop:kernel-smp-0:2.4.21-9.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-9.EL.x86_64",
"3Desktop:kernel-smp-unsupported-0:2.4.21-9.EL.athlon",
"3Desktop:kernel-smp-unsupported-0:2.4.21-9.EL.i686",
"3Desktop:kernel-smp-unsupported-0:2.4.21-9.EL.x86_64",
"3Desktop:kernel-source-0:2.4.21-9.EL.i386",
"3Desktop:kernel-source-0:2.4.21-9.EL.ia64",
"3Desktop:kernel-source-0:2.4.21-9.EL.ppc64",
"3Desktop:kernel-source-0:2.4.21-9.EL.s390",
"3Desktop:kernel-source-0:2.4.21-9.EL.s390x",
"3Desktop:kernel-source-0:2.4.21-9.EL.x86_64",
"3Desktop:kernel-unsupported-0:2.4.21-9.EL.athlon",
"3Desktop:kernel-unsupported-0:2.4.21-9.EL.i686",
"3Desktop:kernel-unsupported-0:2.4.21-9.EL.ia64",
"3Desktop:kernel-unsupported-0:2.4.21-9.EL.ppc64iseries",
"3Desktop:kernel-unsupported-0:2.4.21-9.EL.ppc64pseries",
"3Desktop:kernel-unsupported-0:2.4.21-9.EL.s390",
"3Desktop:kernel-unsupported-0:2.4.21-9.EL.s390x",
"3Desktop:kernel-unsupported-0:2.4.21-9.EL.x86_64",
"3ES:kernel-0:2.4.21-9.EL.athlon",
"3ES:kernel-0:2.4.21-9.EL.i686",
"3ES:kernel-0:2.4.21-9.EL.ia64",
"3ES:kernel-0:2.4.21-9.EL.ppc64iseries",
"3ES:kernel-0:2.4.21-9.EL.ppc64pseries",
"3ES:kernel-0:2.4.21-9.EL.s390",
"3ES:kernel-0:2.4.21-9.EL.s390x",
"3ES:kernel-0:2.4.21-9.EL.src",
"3ES:kernel-0:2.4.21-9.EL.x86_64",
"3ES:kernel-BOOT-0:2.4.21-9.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.athlon",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.i686",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.ia64",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.ppc64",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.ppc64iseries",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.ppc64pseries",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.s390",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.s390x",
"3ES:kernel-debuginfo-0:2.4.21-9.EL.x86_64",
"3ES:kernel-doc-0:2.4.21-9.EL.i386",
"3ES:kernel-doc-0:2.4.21-9.EL.ia64",
"3ES:kernel-doc-0:2.4.21-9.EL.ppc64",
"3ES:kernel-doc-0:2.4.21-9.EL.s390",
"3ES:kernel-doc-0:2.4.21-9.EL.s390x",
"3ES:kernel-doc-0:2.4.21-9.EL.x86_64",
"3ES:kernel-hugemem-0:2.4.21-9.EL.i686",
"3ES:kernel-hugemem-unsupported-0:2.4.21-9.EL.i686",
"3ES:kernel-smp-0:2.4.21-9.EL.athlon",
"3ES:kernel-smp-0:2.4.21-9.EL.i686",
"3ES:kernel-smp-0:2.4.21-9.EL.x86_64",
"3ES:kernel-smp-unsupported-0:2.4.21-9.EL.athlon",
"3ES:kernel-smp-unsupported-0:2.4.21-9.EL.i686",
"3ES:kernel-smp-unsupported-0:2.4.21-9.EL.x86_64",
"3ES:kernel-source-0:2.4.21-9.EL.i386",
"3ES:kernel-source-0:2.4.21-9.EL.ia64",
"3ES:kernel-source-0:2.4.21-9.EL.ppc64",
"3ES:kernel-source-0:2.4.21-9.EL.s390",
"3ES:kernel-source-0:2.4.21-9.EL.s390x",
"3ES:kernel-source-0:2.4.21-9.EL.x86_64",
"3ES:kernel-unsupported-0:2.4.21-9.EL.athlon",
"3ES:kernel-unsupported-0:2.4.21-9.EL.i686",
"3ES:kernel-unsupported-0:2.4.21-9.EL.ia64",
"3ES:kernel-unsupported-0:2.4.21-9.EL.ppc64iseries",
"3ES:kernel-unsupported-0:2.4.21-9.EL.ppc64pseries",
"3ES:kernel-unsupported-0:2.4.21-9.EL.s390",
"3ES:kernel-unsupported-0:2.4.21-9.EL.s390x",
"3ES:kernel-unsupported-0:2.4.21-9.EL.x86_64",
"3WS:kernel-0:2.4.21-9.EL.athlon",
"3WS:kernel-0:2.4.21-9.EL.i686",
"3WS:kernel-0:2.4.21-9.EL.ia64",
"3WS:kernel-0:2.4.21-9.EL.ppc64iseries",
"3WS:kernel-0:2.4.21-9.EL.ppc64pseries",
"3WS:kernel-0:2.4.21-9.EL.s390",
"3WS:kernel-0:2.4.21-9.EL.s390x",
"3WS:kernel-0:2.4.21-9.EL.src",
"3WS:kernel-0:2.4.21-9.EL.x86_64",
"3WS:kernel-BOOT-0:2.4.21-9.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.athlon",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.i686",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.ia64",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.ppc64",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.ppc64iseries",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.ppc64pseries",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.s390",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.s390x",
"3WS:kernel-debuginfo-0:2.4.21-9.EL.x86_64",
"3WS:kernel-doc-0:2.4.21-9.EL.i386",
"3WS:kernel-doc-0:2.4.21-9.EL.ia64",
"3WS:kernel-doc-0:2.4.21-9.EL.ppc64",
"3WS:kernel-doc-0:2.4.21-9.EL.s390",
"3WS:kernel-doc-0:2.4.21-9.EL.s390x",
"3WS:kernel-doc-0:2.4.21-9.EL.x86_64",
"3WS:kernel-hugemem-0:2.4.21-9.EL.i686",
"3WS:kernel-hugemem-unsupported-0:2.4.21-9.EL.i686",
"3WS:kernel-smp-0:2.4.21-9.EL.athlon",
"3WS:kernel-smp-0:2.4.21-9.EL.i686",
"3WS:kernel-smp-0:2.4.21-9.EL.x86_64",
"3WS:kernel-smp-unsupported-0:2.4.21-9.EL.athlon",
"3WS:kernel-smp-unsupported-0:2.4.21-9.EL.i686",
"3WS:kernel-smp-unsupported-0:2.4.21-9.EL.x86_64",
"3WS:kernel-source-0:2.4.21-9.EL.i386",
"3WS:kernel-source-0:2.4.21-9.EL.ia64",
"3WS:kernel-source-0:2.4.21-9.EL.ppc64",
"3WS:kernel-source-0:2.4.21-9.EL.s390",
"3WS:kernel-source-0:2.4.21-9.EL.s390x",
"3WS:kernel-source-0:2.4.21-9.EL.x86_64",
"3WS:kernel-unsupported-0:2.4.21-9.EL.athlon",
"3WS:kernel-unsupported-0:2.4.21-9.EL.i686",
"3WS:kernel-unsupported-0:2.4.21-9.EL.ia64",
"3WS:kernel-unsupported-0:2.4.21-9.EL.ppc64iseries",
"3WS:kernel-unsupported-0:2.4.21-9.EL.ppc64pseries",
"3WS:kernel-unsupported-0:2.4.21-9.EL.s390",
"3WS:kernel-unsupported-0:2.4.21-9.EL.s390x",
"3WS:kernel-unsupported-0:2.4.21-9.EL.x86_64"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Important"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] |
[
"2004-01-16T17:01:00+00:00"
] |
|
CVE-2003-1564
| null |
libxml2
|
billion laughs DoS attack
|
Moderate
| null | null |
libxml2, possibly before 2.5.0, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, aka the "billion laughs attack."
| null |
2008-09-02T00:00:00+00:00
|
2003-02-02T00:00:00+00:00
|
[
"2.1AS:libxml2-0:2.4.19-11.ent.i386",
"2.1AS:libxml2-0:2.4.19-11.ent.ia64",
"2.1AS:libxml2-0:2.4.19-11.ent.src",
"2.1AS:libxml2-devel-0:2.4.19-11.ent.i386",
"2.1AS:libxml2-devel-0:2.4.19-11.ent.ia64",
"2.1AS:libxml2-python-0:2.4.19-11.ent.i386",
"2.1AS:libxml2-python-0:2.4.19-11.ent.ia64",
"2.1AW:libxml2-0:2.4.19-11.ent.i386",
"2.1AW:libxml2-0:2.4.19-11.ent.ia64",
"2.1AW:libxml2-0:2.4.19-11.ent.src",
"2.1AW:libxml2-devel-0:2.4.19-11.ent.i386",
"2.1AW:libxml2-devel-0:2.4.19-11.ent.ia64",
"2.1AW:libxml2-python-0:2.4.19-11.ent.i386",
"2.1AW:libxml2-python-0:2.4.19-11.ent.ia64",
"2.1ES:libxml2-0:2.4.19-11.ent.i386",
"2.1ES:libxml2-0:2.4.19-11.ent.ia64",
"2.1ES:libxml2-0:2.4.19-11.ent.src",
"2.1ES:libxml2-devel-0:2.4.19-11.ent.i386",
"2.1ES:libxml2-devel-0:2.4.19-11.ent.ia64",
"2.1ES:libxml2-python-0:2.4.19-11.ent.i386",
"2.1ES:libxml2-python-0:2.4.19-11.ent.ia64",
"2.1WS:libxml2-0:2.4.19-11.ent.i386",
"2.1WS:libxml2-0:2.4.19-11.ent.ia64",
"2.1WS:libxml2-0:2.4.19-11.ent.src",
"2.1WS:libxml2-devel-0:2.4.19-11.ent.i386",
"2.1WS:libxml2-devel-0:2.4.19-11.ent.ia64",
"2.1WS:libxml2-python-0:2.4.19-11.ent.i386",
"2.1WS:libxml2-python-0:2.4.19-11.ent.ia64"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188"
] |
[
"2008-09-11T13:45:00+00:00"
] |
CVE-2003-0358
| null |
nethack
|
buffer overflow via a long -s command line option
| null | null |
7.7/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Buffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges via a long -s command line option.
|
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
|
2020-12-09T00:00:00+00:00
|
2003-06-11T00:00:00+00:00
|
[] |
[] |
[
"red_hat_products"
] |
[] |
[] |
[] |
[] |
[] |
[] |
[] |
CVE-2003-1302
| null |
security flaw
|
Moderate
| null | null |
The IMAP functionality in PHP before 4.3.1 allows remote attackers to cause a denial of service via an e-mail message with a (1) To or (2) From header with an address that contains a large number of "\" (backslash) characters.
| null |
2003-02-04T00:00:00+00:00
|
2003-02-04T00:00:00+00:00
|
[
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2006-05-23T20:09:00+00:00"
] |
|
CVE-2003-0618
| null |
leaks file existance information
|
Low
| null | null |
Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions.
|
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/
This issue does not affect Red Hat Enterprise Linux 4.
|
2003-07-30T00:00:00+00:00
|
2003-07-30T00:00:00+00:00
|
[
"Red Hat Desktop version 3",
"Red Hat Enterprise Linux AS version 3",
"Red Hat Enterprise Linux ES version 3",
"Red Hat Enterprise Linux WS version 3"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2006-07-20T00:00:00+00:00"
] |
|
CVE-2003-1418
| null |
httpd information disclosure in FileEtag
|
Low
|
2.6/AV:N/AC:H/Au:N/C:P/I:N/A:N
| null |
Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).
|
Red Hat does not consider this to be a security issue. The information returned poses no threat to the target machine running httpd.
|
2011-08-24T00:00:00+00:00
|
2003-02-25T00:00:00+00:00
|
[] |
[
"red_hat_enterprise_linux_4:httpd",
"red_hat_enterprise_linux_5:httpd",
"red_hat_enterprise_linux_6:httpd"
] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"no_fix_planned"
] |
[
"Will not fix"
] |
[
null
] |
|
CVE-2003-0367
|
CWE-377
|
gzip
|
symlink attack on temporary files leads to arbitrary file overwrite
|
Moderate
| null |
6.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.
|
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
|
2019-05-23T00:00:00+00:00
|
2003-07-02T00:00:00+00:00
|
[] |
[] |
[
"red_hat_enterprise_linux_5:gzip",
"red_hat_enterprise_linux_6:gzip",
"red_hat_enterprise_linux_7:gzip",
"red_hat_enterprise_linux_8:gzip"
] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[] |
[] |
[] |
CVE-2003-0644
| null |
security flaw
|
Low
| null | null |
Kdbg 1.1.0 through 1.2.8 does not check permissions of the .kdbgrc file, which allows local users to execute arbitrary commands.
| null |
2005-04-15T00:00:00+00:00
|
2003-09-07T00:00:00+00:00
|
[
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] |
[
"2005-06-02T14:32:00+00:00"
] |
|
CVE-2003-0845
| null |
JBoss HSQLDB component remote command injection
|
Moderate
| null | null |
Unknown vulnerability in the HSQLDB component in JBoss 3.2.1 and 3.0.8 on Java 1.4.x platforms, when running in the default configuration, allows remote attackers to conduct unauthorized activities and possibly execute arbitrary code via certain SQL statements to (1) TCP port 1701 in JBoss 3.2.1, and (2) port 1476 in JBoss 3.0.8.
| null |
2003-10-05T00:00:00+00:00
|
2003-10-05T00:00:00+00:00
|
[
"5Client:hsqldb-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-1:1.8.0.4-3jpp.6.src",
"5Client:hsqldb-1:1.8.0.4-3jpp.6.x86_64",
"5Client:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.x86_64",
"5Client:hsqldb-demo-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-demo-1:1.8.0.4-3jpp.6.x86_64",
"5Client:hsqldb-javadoc-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-javadoc-1:1.8.0.4-3jpp.6.x86_64",
"5Client:hsqldb-manual-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-manual-1:1.8.0.4-3jpp.6.x86_64",
"5Client:openoffice.org-1:2.0.4-5.4.25.src",
"5Client:openoffice.org-base-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-base-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-calc-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-calc-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-core-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-core-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-debuginfo-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-debuginfo-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-draw-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-draw-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-emailmerge-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-emailmerge-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-graphicfilter-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-graphicfilter-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-impress-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-impress-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-javafilter-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-javafilter-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ar-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ar-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-bn-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-bn-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-de-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-de-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-es-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-es-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-fr-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-fr-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-it-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-it-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nl-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nl-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ru-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ru-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-sv-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-sv-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ur-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ur-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-math-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-math-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-pyuno-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-pyuno-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-testtools-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-testtools-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-writer-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-writer-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-xsltfilter-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-xsltfilter-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.src",
"5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:hsqldb-demo-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-demo-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:hsqldb-javadoc-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-javadoc-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:hsqldb-manual-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-manual-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:openoffice.org-1:2.0.4-5.4.25.src",
"5Server-DPAS:openoffice.org-base-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-base-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-calc-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-calc-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-core-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-core-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-debuginfo-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-debuginfo-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-draw-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-draw-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-emailmerge-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-emailmerge-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-graphicfilter-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-graphicfilter-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-impress-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-impress-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-javafilter-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-javafilter-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ar-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ar-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-bn-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-bn-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-de-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-de-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-es-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-es-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-fr-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-fr-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-it-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-it-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nl-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nl-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ru-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ru-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-sv-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-sv-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ur-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ur-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-math-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-math-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-pyuno-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-pyuno-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-testtools-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-testtools-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-writer-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-writer-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-xsltfilter-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-xsltfilter-1:2.0.4-5.4.25.x86_64"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188"
] |
[
"2007-12-05T14:34:00+00:00"
] |
|
CVE-2003-1604
|
CWE-476
|
kernel
|
Missing NULL pointer check in nf_nat_redirect_ipv4
|
Moderate
|
5.4/AV:N/AC:H/Au:N/C:N/I:N/A:C
| null |
The redirect_target function in net/ipv4/netfilter/ipt_REDIRECT.c in the Linux kernel before 2.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending packets to an interface that has a 0.0.0.0 IP address, a related issue to CVE-2015-8787.
| null |
2016-01-27T00:00:00+00:00
|
2003-10-20T00:00:00+00:00
|
[] |
[] |
[
"red_hat_enterprise_linux_5:kernel",
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_mrg_2:realtime-kernel"
] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[] |
[] |
[] |
CVE-2002-1903
| null |
pine username disclosure issue
|
Low
| null | null |
Pine 4.2.1 through 4.4.4 puts Unix usernames and/or uid into Sender: and X-Sender: headers, which could allow remote attackers to obtain sensitive information.
|
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/
|
2005-07-11T00:00:00+00:00
|
2002-06-07T00:00:00+00:00
|
[] |
[] |
[
"red_hat_products"
] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[] |
[] |
[] |
|
CVE-2002-1914
| null |
security flaw
|
Low
| null | null |
dump 0.4 b10 through b29 allows local users to cause a denial of service (execution prevention) by using flock() to lock the /etc/dumpdates file.
| null |
2002-07-17T00:00:00+00:00
|
2002-07-17T00:00:00+00:00
|
[
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2005-08-03T14:12:00+00:00"
] |
|
CVE-2002-2439
|
CWE-190
|
gcc
|
Integer overflow can occur during the computation of the memory region size for new[] operator
|
Moderate
|
3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P
| null |
Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.
| null |
2012-08-31T00:00:00+00:00
|
2002-08-05T00:00:00+00:00
|
[] |
[
"red_hat_enterprise_linux_5:compat-gcc-295",
"red_hat_enterprise_linux_5:compat-gcc-296",
"red_hat_enterprise_linux_5:compat-gcc-32",
"red_hat_enterprise_linux_5:compat-gcc-34",
"red_hat_enterprise_linux_5:gcc",
"red_hat_enterprise_linux_5:gcc43",
"red_hat_enterprise_linux_5:gcc44",
"red_hat_enterprise_linux_6:compat-gcc-295",
"red_hat_enterprise_linux_6:compat-gcc-296",
"red_hat_enterprise_linux_6:compat-gcc-32",
"red_hat_enterprise_linux_6:compat-gcc-34",
"red_hat_enterprise_linux_6:gcc"
] |
[
"red_hat_enterprise_linux_7:gcc"
] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[
"no_fix_planned"
] |
[
"Will not fix"
] |
[
null
] |
CVE-2002-2443
| null |
krb5
|
UDP ping-pong flaw in kpasswd
|
Moderate
|
5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P
| null |
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
| null |
2013-05-01T00:00:00+00:00
|
2002-06-16T00:00:00+00:00
|
[
"5Server-5.9.Z:krb5-0:1.6.1-70.el5_9.2.src",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.ppc64",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-debuginfo-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.ppc64",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-devel-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.ppc64",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-libs-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-server-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-server-ldap-0:1.6.1-70.el5_9.2.x86_64",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.i386",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ia64",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.ppc",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.s390x",
"5Server-5.9.Z:krb5-workstation-0:1.6.1-70.el5_9.2.x86_64",
"6Client-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Client-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Client-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6ComputeNode-optional-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Server-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-0:1.10.3-10.el6_4.3.src",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-debuginfo-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-devel-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-libs-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-pkinit-openssl-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-server-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-server-ldap-0:1.10.3-10.el6_4.3.x86_64",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.i686",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.ppc64",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.s390x",
"6Workstation-6.4.z:krb5-workstation-0:1.10.3-10.el6_4.3.x86_64"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258"
] |
[
"2013-06-12T16:46:00+00:00"
] |
CVE-2002-0059
|
CWE-416
|
zlib
|
Double free in inflateEnd
|
Moderate
| null |
6.9/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
| null |
2002-03-09T00:00:00+00:00
|
2002-03-09T00:00:00+00:00
|
[
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Powertools 6.2",
"Red Hat Powertools 7.0",
"Red Hat Powertools 7.1"
] |
[] |
[
"red_hat_enterprise_linux_6:zlib",
"red_hat_enterprise_linux_7:zlib",
"red_hat_enterprise_linux_8:zlib",
"red_hat_enterprise_linux_9:zlib",
"red_hat_jboss_enterprise_application_platform_6:zlib",
"red_hat_software_collections:rh-nodejs12-nodejs",
"red_hat_software_collections:rh-nodejs14-nodejs"
] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[
"vendor_fix",
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nThe procedure for upgrading the kernel is documented at:\n\n http://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2002-03-11T20:15:00+00:00",
"2002-03-11T18:09:00+00:00"
] |
CVE-2002-0389
| null |
mailman
|
Local users able to read private mailing list archives
|
Low
|
2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N
| null |
It was found that mailman stored private email messages in a world-readable directory. A local user could use this flaw to read private mailing list archives.
| null |
2011-06-13T00:00:00+00:00
|
2002-01-01T00:00:00+00:00
|
[
"6Server:mailman-3:2.1.12-25.el6.i686",
"6Server:mailman-3:2.1.12-25.el6.ppc64",
"6Server:mailman-3:2.1.12-25.el6.s390x",
"6Server:mailman-3:2.1.12-25.el6.src",
"6Server:mailman-3:2.1.12-25.el6.x86_64",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.i686",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.ppc64",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.s390x",
"6Server:mailman-debuginfo-3:2.1.12-25.el6.x86_64",
"6Workstation:mailman-3:2.1.12-25.el6.i686",
"6Workstation:mailman-3:2.1.12-25.el6.ppc64",
"6Workstation:mailman-3:2.1.12-25.el6.s390x",
"6Workstation:mailman-3:2.1.12-25.el6.src",
"6Workstation:mailman-3:2.1.12-25.el6.x86_64",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.i686",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.ppc64",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.s390x",
"6Workstation:mailman-debuginfo-3:2.1.12-25.el6.x86_64"
] |
[
"red_hat_enterprise_linux_4:mailman",
"red_hat_enterprise_linux_5:mailman"
] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"vendor_fix",
"no_fix_planned"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Will not fix"
] |
[
"2015-07-20T14:06:40+00:00",
null
] |
CVE-2002-2215
| null |
security flaw
|
Moderate
| null | null |
The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of "To" addresses, which triggers an error in the rfc822_write_address function.
| null |
2002-09-07T00:00:00+00:00
|
2002-09-07T00:00:00+00:00
|
[
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2006-05-23T20:09:00+00:00"
] |
|
CVE-2002-2185
| null |
security flaw
|
Moderate
| null | null |
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
| null |
2005-12-02T00:00:00+00:00
|
2002-06-25T00:00:00+00:00
|
[
"3AS:kernel-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3AS:kernel-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3AS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3AS:kernel-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-0:2.4.21-37.0.1.EL.src",
"3AS:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3AS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.src",
"3Desktop:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3Desktop:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3ES:kernel-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3ES:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3ES:kernel-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-0:2.4.21-37.0.1.EL.src",
"3ES:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3ES:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-0:2.4.21-37.0.1.EL.ia32e",
"3WS:kernel-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-0:2.4.21-37.0.1.EL.ppc64iseries",
"3WS:kernel-0:2.4.21-37.0.1.EL.ppc64pseries",
"3WS:kernel-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-0:2.4.21-37.0.1.EL.src",
"3WS:kernel-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-BOOT-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia32e",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64iseries",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.ppc64pseries",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-debuginfo-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.ppc64",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-doc-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-hugemem-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-smp-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-smp-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-smp-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-smp-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.i386",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.ppc64",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-source-0:2.4.21-37.0.1.EL.x86_64",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.athlon",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.i686",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia32e",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ia64",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64iseries",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.ppc64pseries",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.s390x",
"3WS:kernel-unsupported-0:2.4.21-37.0.1.EL.x86_64",
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] |
[
"Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2006-01-19T16:03:00+00:00",
"2006-01-17T08:36:00+00:00",
"2006-02-01T17:48:00+00:00",
"2006-02-01T17:57:00+00:00"
] |
|
CVE-2002-2214
| null |
security flaw
|
Moderate
| null | null |
The php_if_imap_mime_header_decode function in the IMAP functionality in PHP before 4.2.2 allows remote attackers to cause a denial of service (crash) via an e-mail header with a long "To" header.
| null |
2006-05-31T00:00:00+00:00
|
2002-02-18T00:00:00+00:00
|
[
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2006-07-25T12:14:00+00:00"
] |
|
CVE-2001-1593
|
CWE-367
|
a2ps
|
insecure temporary file use
|
Low
|
2.1/AV:L/AC:L/Au:N/C:N/I:P/A:N
| null |
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.
| null |
2001-01-05T00:00:00+00:00
|
2001-01-05T00:00:00+00:00
|
[] |
[] |
[
"red_hat_enterprise_linux_5:a2ps",
"red_hat_enterprise_linux_6:a2ps",
"red_hat_enterprise_linux_7:a2ps"
] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[] |
[] |
[] |
CVE-2001-0131
|
CWE-59
|
httpd
|
allows local users to overwrite arbitrary files via a symlink attack
|
Low
| null |
2.8/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
|
A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.
|
All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
|
2020-10-09T00:00:00+00:00
|
2001-01-10T00:00:00+00:00
|
[] |
[
"red_hat_jboss_enterprise_web_server_2:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd22"
] |
[
"red_hat_enterprise_linux_5:httpd",
"red_hat_enterprise_linux_6:httpd",
"red_hat_enterprise_linux_7:httpd",
"red_hat_enterprise_linux_8:httpd:2.4/httpd",
"red_hat_jboss_core_services:httpd",
"red_hat_software_collections:httpd24-httpd"
] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"no_fix_planned"
] |
[
"Out of support scope"
] |
[
null
] |
CVE-2001-1556
|
CWE-532
|
httpd
|
log files contain information directly supplied by clients and does not filter or quote control characters
|
Low
| null |
3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
|
This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083.
|
2020-10-14T00:00:00+00:00
|
2001-12-31T00:00:00+00:00
|
[] |
[] |
[
"red_hat_enterprise_linux_5:httpd",
"red_hat_enterprise_linux_6:httpd",
"red_hat_enterprise_linux_7:httpd",
"red_hat_enterprise_linux_8:httpd:2.4/httpd",
"red_hat_jboss_core_services:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd",
"red_hat_jboss_enterprise_web_server_2:httpd22",
"red_hat_software_collections:httpd24-httpd"
] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[] |
[] |
[] |
CVE-2001-0328
| null |
kernel
|
TCP connection ISN hijacks
|
Low
|
2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N
| null |
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
|
This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
|
2013-05-16T00:00:00+00:00
|
2001-05-01T00:00:00+00:00
|
[] |
[] |
[
"red_hat_enterprise_linux_5:kernel",
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_mrg_2:kernel-rt"
] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[] |
[] |
[] |
CVE-2001-1494
| null |
security flaw
|
Low
| null | null |
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
| null |
2005-06-21T00:00:00+00:00
|
2001-12-12T00:00:00+00:00
|
[
"3AS:losetup-0:2.11y-31.11.i386",
"3AS:losetup-0:2.11y-31.11.ia64",
"3AS:losetup-0:2.11y-31.11.ppc",
"3AS:losetup-0:2.11y-31.11.s390",
"3AS:losetup-0:2.11y-31.11.s390x",
"3AS:losetup-0:2.11y-31.11.x86_64",
"3AS:mount-0:2.11y-31.11.i386",
"3AS:mount-0:2.11y-31.11.ia64",
"3AS:mount-0:2.11y-31.11.ppc",
"3AS:mount-0:2.11y-31.11.s390",
"3AS:mount-0:2.11y-31.11.s390x",
"3AS:mount-0:2.11y-31.11.x86_64",
"3AS:util-linux-0:2.11y-31.11.i386",
"3AS:util-linux-0:2.11y-31.11.ia64",
"3AS:util-linux-0:2.11y-31.11.ppc",
"3AS:util-linux-0:2.11y-31.11.s390",
"3AS:util-linux-0:2.11y-31.11.s390x",
"3AS:util-linux-0:2.11y-31.11.src",
"3AS:util-linux-0:2.11y-31.11.x86_64",
"3AS:util-linux-debuginfo-0:2.11y-31.11.i386",
"3AS:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3AS:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3AS:util-linux-debuginfo-0:2.11y-31.11.s390",
"3AS:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3AS:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3Desktop:losetup-0:2.11y-31.11.i386",
"3Desktop:losetup-0:2.11y-31.11.ia64",
"3Desktop:losetup-0:2.11y-31.11.ppc",
"3Desktop:losetup-0:2.11y-31.11.s390",
"3Desktop:losetup-0:2.11y-31.11.s390x",
"3Desktop:losetup-0:2.11y-31.11.x86_64",
"3Desktop:mount-0:2.11y-31.11.i386",
"3Desktop:mount-0:2.11y-31.11.ia64",
"3Desktop:mount-0:2.11y-31.11.ppc",
"3Desktop:mount-0:2.11y-31.11.s390",
"3Desktop:mount-0:2.11y-31.11.s390x",
"3Desktop:mount-0:2.11y-31.11.x86_64",
"3Desktop:util-linux-0:2.11y-31.11.i386",
"3Desktop:util-linux-0:2.11y-31.11.ia64",
"3Desktop:util-linux-0:2.11y-31.11.ppc",
"3Desktop:util-linux-0:2.11y-31.11.s390",
"3Desktop:util-linux-0:2.11y-31.11.s390x",
"3Desktop:util-linux-0:2.11y-31.11.src",
"3Desktop:util-linux-0:2.11y-31.11.x86_64",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.i386",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3Desktop:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3ES:losetup-0:2.11y-31.11.i386",
"3ES:losetup-0:2.11y-31.11.ia64",
"3ES:losetup-0:2.11y-31.11.ppc",
"3ES:losetup-0:2.11y-31.11.s390",
"3ES:losetup-0:2.11y-31.11.s390x",
"3ES:losetup-0:2.11y-31.11.x86_64",
"3ES:mount-0:2.11y-31.11.i386",
"3ES:mount-0:2.11y-31.11.ia64",
"3ES:mount-0:2.11y-31.11.ppc",
"3ES:mount-0:2.11y-31.11.s390",
"3ES:mount-0:2.11y-31.11.s390x",
"3ES:mount-0:2.11y-31.11.x86_64",
"3ES:util-linux-0:2.11y-31.11.i386",
"3ES:util-linux-0:2.11y-31.11.ia64",
"3ES:util-linux-0:2.11y-31.11.ppc",
"3ES:util-linux-0:2.11y-31.11.s390",
"3ES:util-linux-0:2.11y-31.11.s390x",
"3ES:util-linux-0:2.11y-31.11.src",
"3ES:util-linux-0:2.11y-31.11.x86_64",
"3ES:util-linux-debuginfo-0:2.11y-31.11.i386",
"3ES:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3ES:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3ES:util-linux-debuginfo-0:2.11y-31.11.s390",
"3ES:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3ES:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"3WS:losetup-0:2.11y-31.11.i386",
"3WS:losetup-0:2.11y-31.11.ia64",
"3WS:losetup-0:2.11y-31.11.ppc",
"3WS:losetup-0:2.11y-31.11.s390",
"3WS:losetup-0:2.11y-31.11.s390x",
"3WS:losetup-0:2.11y-31.11.x86_64",
"3WS:mount-0:2.11y-31.11.i386",
"3WS:mount-0:2.11y-31.11.ia64",
"3WS:mount-0:2.11y-31.11.ppc",
"3WS:mount-0:2.11y-31.11.s390",
"3WS:mount-0:2.11y-31.11.s390x",
"3WS:mount-0:2.11y-31.11.x86_64",
"3WS:util-linux-0:2.11y-31.11.i386",
"3WS:util-linux-0:2.11y-31.11.ia64",
"3WS:util-linux-0:2.11y-31.11.ppc",
"3WS:util-linux-0:2.11y-31.11.s390",
"3WS:util-linux-0:2.11y-31.11.s390x",
"3WS:util-linux-0:2.11y-31.11.src",
"3WS:util-linux-0:2.11y-31.11.x86_64",
"3WS:util-linux-debuginfo-0:2.11y-31.11.i386",
"3WS:util-linux-debuginfo-0:2.11y-31.11.ia64",
"3WS:util-linux-debuginfo-0:2.11y-31.11.ppc",
"3WS:util-linux-debuginfo-0:2.11y-31.11.s390",
"3WS:util-linux-debuginfo-0:2.11y-31.11.s390x",
"3WS:util-linux-debuginfo-0:2.11y-31.11.x86_64",
"4AS:util-linux-0:2.12a-16.EL4.12.i386",
"4AS:util-linux-0:2.12a-16.EL4.12.ia64",
"4AS:util-linux-0:2.12a-16.EL4.12.ppc",
"4AS:util-linux-0:2.12a-16.EL4.12.s390",
"4AS:util-linux-0:2.12a-16.EL4.12.s390x",
"4AS:util-linux-0:2.12a-16.EL4.12.src",
"4AS:util-linux-0:2.12a-16.EL4.12.x86_64",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4Desktop:util-linux-0:2.12a-16.EL4.12.i386",
"4Desktop:util-linux-0:2.12a-16.EL4.12.ia64",
"4Desktop:util-linux-0:2.12a-16.EL4.12.ppc",
"4Desktop:util-linux-0:2.12a-16.EL4.12.s390",
"4Desktop:util-linux-0:2.12a-16.EL4.12.s390x",
"4Desktop:util-linux-0:2.12a-16.EL4.12.src",
"4Desktop:util-linux-0:2.12a-16.EL4.12.x86_64",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4ES:util-linux-0:2.12a-16.EL4.12.i386",
"4ES:util-linux-0:2.12a-16.EL4.12.ia64",
"4ES:util-linux-0:2.12a-16.EL4.12.ppc",
"4ES:util-linux-0:2.12a-16.EL4.12.s390",
"4ES:util-linux-0:2.12a-16.EL4.12.s390x",
"4ES:util-linux-0:2.12a-16.EL4.12.src",
"4ES:util-linux-0:2.12a-16.EL4.12.x86_64",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64",
"4WS:util-linux-0:2.12a-16.EL4.12.i386",
"4WS:util-linux-0:2.12a-16.EL4.12.ia64",
"4WS:util-linux-0:2.12a-16.EL4.12.ppc",
"4WS:util-linux-0:2.12a-16.EL4.12.s390",
"4WS:util-linux-0:2.12a-16.EL4.12.s390x",
"4WS:util-linux-0:2.12a-16.EL4.12.src",
"4WS:util-linux-0:2.12a-16.EL4.12.x86_64",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x",
"4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2005-10-11T15:49:00+00:00"
] |
|
CVE-2000-1254
| null |
openssl
|
Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
|
Moderate
|
4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N
| null |
crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.
| null |
2016-05-04T00:00:00+00:00
|
2000-06-01T00:00:00+00:00
|
[] |
[] |
[
"red_hat_enterprise_linux_5:openssl",
"red_hat_enterprise_linux_5:openssl097a",
"red_hat_enterprise_linux_6:openssl",
"red_hat_enterprise_linux_6:openssl098e",
"red_hat_enterprise_linux_7:openssl",
"red_hat_enterprise_linux_7:openssl098e",
"red_hat_jboss_enterprise_application_platform_6:openssl",
"red_hat_jboss_enterprise_web_server_1:openssl",
"red_hat_jboss_enterprise_web_server_2:openssl",
"red_hat_jboss_enterprise_web_server_3:openssl"
] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[] |
[] |
[] |
CVE-2000-1191
| null |
security flaw
|
Low
| null | null |
htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.
| null |
2006-12-06T00:00:00+00:00
|
2000-04-18T00:00:00+00:00
|
[
"3AS:htdig-2:3.1.6-7.el3.i386",
"3AS:htdig-2:3.1.6-7.el3.ia64",
"3AS:htdig-2:3.1.6-7.el3.ppc",
"3AS:htdig-2:3.1.6-7.el3.s390",
"3AS:htdig-2:3.1.6-7.el3.s390x",
"3AS:htdig-2:3.1.6-7.el3.src",
"3AS:htdig-2:3.1.6-7.el3.x86_64",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3AS:htdig-debuginfo-2:3.1.6-7.el3.x86_64",
"3Desktop:htdig-2:3.1.6-7.el3.i386",
"3Desktop:htdig-2:3.1.6-7.el3.ia64",
"3Desktop:htdig-2:3.1.6-7.el3.ppc",
"3Desktop:htdig-2:3.1.6-7.el3.s390",
"3Desktop:htdig-2:3.1.6-7.el3.s390x",
"3Desktop:htdig-2:3.1.6-7.el3.src",
"3Desktop:htdig-2:3.1.6-7.el3.x86_64",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3Desktop:htdig-debuginfo-2:3.1.6-7.el3.x86_64",
"3ES:htdig-2:3.1.6-7.el3.i386",
"3ES:htdig-2:3.1.6-7.el3.ia64",
"3ES:htdig-2:3.1.6-7.el3.ppc",
"3ES:htdig-2:3.1.6-7.el3.s390",
"3ES:htdig-2:3.1.6-7.el3.s390x",
"3ES:htdig-2:3.1.6-7.el3.src",
"3ES:htdig-2:3.1.6-7.el3.x86_64",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3ES:htdig-debuginfo-2:3.1.6-7.el3.x86_64",
"3WS:htdig-2:3.1.6-7.el3.i386",
"3WS:htdig-2:3.1.6-7.el3.ia64",
"3WS:htdig-2:3.1.6-7.el3.ppc",
"3WS:htdig-2:3.1.6-7.el3.s390",
"3WS:htdig-2:3.1.6-7.el3.s390x",
"3WS:htdig-2:3.1.6-7.el3.src",
"3WS:htdig-2:3.1.6-7.el3.x86_64",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.i386",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.ia64",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.ppc",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.s390",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.s390x",
"3WS:htdig-debuginfo-2:3.1.6-7.el3.x86_64"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"vendor_fix"
] |
[
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2007-06-11T00:00:00+00:00"
] |
|
CVE-1999-1572
| null |
security flaw
|
Low
| null | null |
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
|
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
|
2005-11-01T00:00:00+00:00
|
1999-01-01T00:00:00+00:00
|
[
"3AS:cpio-0:2.5-3e.3.i386",
"3AS:cpio-0:2.5-3e.3.ia64",
"3AS:cpio-0:2.5-3e.3.ppc",
"3AS:cpio-0:2.5-3e.3.s390",
"3AS:cpio-0:2.5-3e.3.s390x",
"3AS:cpio-0:2.5-3e.3.src",
"3AS:cpio-0:2.5-3e.3.x86_64",
"3AS:cpio-debuginfo-0:2.5-3e.3.i386",
"3AS:cpio-debuginfo-0:2.5-3e.3.ia64",
"3AS:cpio-debuginfo-0:2.5-3e.3.ppc",
"3AS:cpio-debuginfo-0:2.5-3e.3.s390",
"3AS:cpio-debuginfo-0:2.5-3e.3.s390x",
"3AS:cpio-debuginfo-0:2.5-3e.3.x86_64",
"3Desktop:cpio-0:2.5-3e.3.i386",
"3Desktop:cpio-0:2.5-3e.3.ia64",
"3Desktop:cpio-0:2.5-3e.3.ppc",
"3Desktop:cpio-0:2.5-3e.3.s390",
"3Desktop:cpio-0:2.5-3e.3.s390x",
"3Desktop:cpio-0:2.5-3e.3.src",
"3Desktop:cpio-0:2.5-3e.3.x86_64",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.i386",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.ia64",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.ppc",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.s390",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.s390x",
"3Desktop:cpio-debuginfo-0:2.5-3e.3.x86_64",
"3ES:cpio-0:2.5-3e.3.i386",
"3ES:cpio-0:2.5-3e.3.ia64",
"3ES:cpio-0:2.5-3e.3.ppc",
"3ES:cpio-0:2.5-3e.3.s390",
"3ES:cpio-0:2.5-3e.3.s390x",
"3ES:cpio-0:2.5-3e.3.src",
"3ES:cpio-0:2.5-3e.3.x86_64",
"3ES:cpio-debuginfo-0:2.5-3e.3.i386",
"3ES:cpio-debuginfo-0:2.5-3e.3.ia64",
"3ES:cpio-debuginfo-0:2.5-3e.3.ppc",
"3ES:cpio-debuginfo-0:2.5-3e.3.s390",
"3ES:cpio-debuginfo-0:2.5-3e.3.s390x",
"3ES:cpio-debuginfo-0:2.5-3e.3.x86_64",
"3WS:cpio-0:2.5-3e.3.i386",
"3WS:cpio-0:2.5-3e.3.ia64",
"3WS:cpio-0:2.5-3e.3.ppc",
"3WS:cpio-0:2.5-3e.3.s390",
"3WS:cpio-0:2.5-3e.3.s390x",
"3WS:cpio-0:2.5-3e.3.src",
"3WS:cpio-0:2.5-3e.3.x86_64",
"3WS:cpio-debuginfo-0:2.5-3e.3.i386",
"3WS:cpio-debuginfo-0:2.5-3e.3.ia64",
"3WS:cpio-debuginfo-0:2.5-3e.3.ppc",
"3WS:cpio-debuginfo-0:2.5-3e.3.s390",
"3WS:cpio-debuginfo-0:2.5-3e.3.s390x",
"3WS:cpio-debuginfo-0:2.5-3e.3.x86_64",
"4AS:cpio-0:2.5-7.EL4.1.i386",
"4AS:cpio-0:2.5-7.EL4.1.ia64",
"4AS:cpio-0:2.5-7.EL4.1.ppc",
"4AS:cpio-0:2.5-7.EL4.1.s390",
"4AS:cpio-0:2.5-7.EL4.1.s390x",
"4AS:cpio-0:2.5-7.EL4.1.src",
"4AS:cpio-0:2.5-7.EL4.1.x86_64",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.i386",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.ia64",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.ppc",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.s390",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.s390x",
"4AS:cpio-debuginfo-0:2.5-7.EL4.1.x86_64",
"4Desktop:cpio-0:2.5-7.EL4.1.i386",
"4Desktop:cpio-0:2.5-7.EL4.1.ia64",
"4Desktop:cpio-0:2.5-7.EL4.1.ppc",
"4Desktop:cpio-0:2.5-7.EL4.1.s390",
"4Desktop:cpio-0:2.5-7.EL4.1.s390x",
"4Desktop:cpio-0:2.5-7.EL4.1.src",
"4Desktop:cpio-0:2.5-7.EL4.1.x86_64",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.i386",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.ia64",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.ppc",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.s390",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.s390x",
"4Desktop:cpio-debuginfo-0:2.5-7.EL4.1.x86_64",
"4ES:cpio-0:2.5-7.EL4.1.i386",
"4ES:cpio-0:2.5-7.EL4.1.ia64",
"4ES:cpio-0:2.5-7.EL4.1.ppc",
"4ES:cpio-0:2.5-7.EL4.1.s390",
"4ES:cpio-0:2.5-7.EL4.1.s390x",
"4ES:cpio-0:2.5-7.EL4.1.src",
"4ES:cpio-0:2.5-7.EL4.1.x86_64",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.i386",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.ia64",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.ppc",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.s390",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.s390x",
"4ES:cpio-debuginfo-0:2.5-7.EL4.1.x86_64",
"4WS:cpio-0:2.5-7.EL4.1.i386",
"4WS:cpio-0:2.5-7.EL4.1.ia64",
"4WS:cpio-0:2.5-7.EL4.1.ppc",
"4WS:cpio-0:2.5-7.EL4.1.s390",
"4WS:cpio-0:2.5-7.EL4.1.s390x",
"4WS:cpio-0:2.5-7.EL4.1.src",
"4WS:cpio-0:2.5-7.EL4.1.x86_64",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.i386",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.ia64",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.ppc",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.s390",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.s390x",
"4WS:cpio-debuginfo-0:2.5-7.EL4.1.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"vendor_fix",
"vendor_fix",
"vendor_fix"
] |
[
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] |
[
"2005-02-18T15:28:00+00:00",
"2005-02-15T10:13:00+00:00",
"2005-11-10T19:01:00+00:00"
] |
|
CVE-1999-0710
| null |
security flaw
|
Low
| null | null |
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
| null |
2005-04-26T00:00:00+00:00
|
1999-07-25T00:00:00+00:00
|
[
"3AS:squid-7:2.5.STABLE3-6.3E.13.i386",
"3AS:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3AS:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3AS:squid-7:2.5.STABLE3-6.3E.13.s390",
"3AS:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3AS:squid-7:2.5.STABLE3-6.3E.13.src",
"3AS:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3AS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.i386",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.src",
"3Desktop:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3Desktop:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"3ES:squid-7:2.5.STABLE3-6.3E.13.i386",
"3ES:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3ES:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3ES:squid-7:2.5.STABLE3-6.3E.13.s390",
"3ES:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3ES:squid-7:2.5.STABLE3-6.3E.13.src",
"3ES:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3ES:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"3WS:squid-7:2.5.STABLE3-6.3E.13.i386",
"3WS:squid-7:2.5.STABLE3-6.3E.13.ia64",
"3WS:squid-7:2.5.STABLE3-6.3E.13.ppc",
"3WS:squid-7:2.5.STABLE3-6.3E.13.s390",
"3WS:squid-7:2.5.STABLE3-6.3E.13.s390x",
"3WS:squid-7:2.5.STABLE3-6.3E.13.src",
"3WS:squid-7:2.5.STABLE3-6.3E.13.x86_64",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.i386",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ia64",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.ppc",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.s390x",
"3WS:squid-debuginfo-7:2.5.STABLE3-6.3E.13.x86_64",
"4AS:squid-7:2.5.STABLE6-3.4E.9.i386",
"4AS:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4AS:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4AS:squid-7:2.5.STABLE6-3.4E.9.s390",
"4AS:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4AS:squid-7:2.5.STABLE6-3.4E.9.src",
"4AS:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4AS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.i386",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.src",
"4Desktop:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4Desktop:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"4ES:squid-7:2.5.STABLE6-3.4E.9.i386",
"4ES:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4ES:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4ES:squid-7:2.5.STABLE6-3.4E.9.s390",
"4ES:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4ES:squid-7:2.5.STABLE6-3.4E.9.src",
"4ES:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4ES:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"4WS:squid-7:2.5.STABLE6-3.4E.9.i386",
"4WS:squid-7:2.5.STABLE6-3.4E.9.ia64",
"4WS:squid-7:2.5.STABLE6-3.4E.9.ppc",
"4WS:squid-7:2.5.STABLE6-3.4E.9.s390",
"4WS:squid-7:2.5.STABLE6-3.4E.9.s390x",
"4WS:squid-7:2.5.STABLE6-3.4E.9.src",
"4WS:squid-7:2.5.STABLE6-3.4E.9.x86_64",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.i386",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ia64",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.ppc",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.s390x",
"4WS:squid-debuginfo-7:2.5.STABLE6-3.4E.9.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] |
[] |
[] |
[] |
[
"impact"
] |
[
"Low"
] |
[
null
] |
[
"vendor_fix",
"vendor_fix"
] |
[
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] |
[
"2005-06-14T19:40:00+00:00",
"2005-06-13T12:08:00+00:00"
] |
|
CVE-1999-0199
|
CWE-1053
|
glibc
|
manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
|
None
| null |
0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.
|
Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue.
This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage.
|
2020-10-06T00:00:00+00:00
|
1999-11-09T00:00:00+00:00
|
[] |
[] |
[
"red_hat_enterprise_linux_5:glibc",
"red_hat_enterprise_linux_6:glibc",
"red_hat_enterprise_linux_7:glibc",
"red_hat_enterprise_linux_8:glibc"
] |
[] |
[] |
[] |
[] |
[] |
[] |
[] |
CVE-1999-0428
|
CWE-384
|
openssl
|
allow remote attackers to reuse SSL sessions and bypass access controls
|
Moderate
| null |
6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
|
OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
|
2020-10-13T00:00:00+00:00
|
1999-03-22T00:00:00+00:00
|
[] |
[] |
[
"red_hat_advanced_cluster_management_for_kubernetes_2:openssl",
"red_hat_enterprise_linux_5:openssl",
"red_hat_enterprise_linux_5:openssl097a",
"red_hat_enterprise_linux_6:openssl",
"red_hat_enterprise_linux_6:openssl098e",
"red_hat_enterprise_linux_7:openssl",
"red_hat_enterprise_linux_7:openssl098e",
"red_hat_enterprise_linux_7:ovmf",
"red_hat_enterprise_linux_8:compat-openssl10",
"red_hat_enterprise_linux_8:mingw-openssl",
"red_hat_enterprise_linux_8:openssl",
"red_hat_jboss_core_services:jbcs-httpd24-openssl",
"red_hat_jboss_core_services:openssl",
"red_hat_jboss_enterprise_application_platform_5:openssl",
"red_hat_jboss_enterprise_application_platform_6:openssl",
"red_hat_jboss_enterprise_web_server_2:jbcs-httpd24-openssl",
"red_hat_jboss_enterprise_web_server_2:openssl"
] |
[] |
[
"impact"
] |
[
"Moderate"
] |
[
null
] |
[] |
[] |
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.