cve
stringlengths 13
16
| affected_component
stringlengths 0
177
| summary
stringlengths 0
227
| severity
stringclasses 5
values | cvss_v2
stringclasses 244
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 30
4k
| statement
stringlengths 31
2.49k
⌀ | release_date
stringlengths 25
25
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
597
| known_not_affected_products
sequencelengths 0
30k
| under_investigation_products
sequencelengths 0
77
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
215
| remediation_details
sequencelengths 0
215
| remediation_dates
sequencelengths 0
215
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2003-0548 | security flaw | Low | null | null | The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549. | null | 2025-01-08T19:57:44+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-08-21T16:10:00+00:00",
"2003-08-21T19:16:00+00:00"
] |
|
CVE-2003-0159 | security flaw | Moderate | null | null | Heap-based buffer overflow in the NTLMSSP code for Ethereal 0.9.9 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code. | null | 2025-01-08T20:09:03+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-07-08T19:59:00+00:00",
"2003-04-23T20:20:00+00:00"
] |
|
CVE-2003-0084 | security flaw | Important | null | null | mod_auth_any package in Red Hat Enterprise Linux 2.1 and other operating systems does not properly escape arguments when calling other programs, which allows attackers to execute arbitrary commands via shell metacharacters. | null | 2025-01-08T20:05:24+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-04-28T12:51:00+00:00",
"2003-05-02T11:57:00+00:00"
] |
|
CVE-2003-0987 | httpd mod_digest nonce not verified | Low | null | null | mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret. | null | 2025-01-09T01:52:17+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1",
"Red Hat Stronghold 4",
"Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0j patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2004-12-13T19:26:00+00:00",
"2004-12-20T16:40:00+00:00",
"2005-11-02T09:23:00+00:00"
] |
|
CVE-2003-0196 | security flaw | Critical | null | null | Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201. | null | 2025-01-08T20:06:47+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-04-07T18:38:00+00:00",
"2003-04-08T07:00:00+00:00"
] |
|
CVE-2003-0246 | security flaw | None | null | null | The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. | null | 2025-01-08T20:08:22+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2003-05-30T01:33:00+00:00"
] |
|
CVE-2003-0991 | security flaw | Important | null | null | Unknown vulnerability in the mail command handler in Mailman before 2.0.14 allows remote attackers to cause a denial of service (crash) via malformed e-mail commands. | null | 2025-01-08T19:58:10+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2004-02-09T18:37:00+00:00"
] |
|
CVE-2003-0138 | security flaw | Important | null | null | Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack. | null | 2025-01-08T20:04:36+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-27T19:43:00+00:00",
"2003-03-26T21:49:00+00:00",
"2003-04-02T09:57:00+00:00"
] |
|
CVE-2003-0354 | security flaw | None | null | null | Unknown vulnerability in GNU Ghostscript before 7.07 allows attackers to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job. | null | 2025-01-08T20:03:42+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-06-17T19:47:00+00:00",
"2003-05-30T08:34:00+00:00"
] |
|
CVE-2003-0211 | security flaw | Important | null | null | Memory leak in xinetd 2.3.10 allows remote attackers to cause a denial of service (memory consumption) via a large number of rejected connections. | null | 2025-01-08T20:04:12+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-22T17:29:00+00:00",
"2003-05-13T17:15:00+00:00"
] |
|
CVE-2003-1302 | security flaw | Moderate | null | null | The IMAP functionality in PHP before 4.3.1 allows remote attackers to cause a denial of service via an e-mail message with a (1) To or (2) From header with an address that contains a large number of "\" (backslash) characters. | null | 2025-01-08T20:03:26+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2006-05-23T20:09:00+00:00"
] |
|
CVE-2003-0544 | CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes | Moderate | null | null | OpenSSL 0.9.6 and 0.9.7 does not properly track the number of characters in certain ASN.1 inputs, which allows remote attackers to cause a denial of service (crash) via an SSL client certificate that causes OpenSSL to read past the end of a buffer when the long form is used. | For Red Hat Enterprise Linux 2.1 OpenSSL packages (openssl, openssl096, openssl095a) issue was addressed via RHSA-2003:293.
The OpenSSL packages in Red Hat Enterprise Linux 3 and 4 (openssl, openssl096b) contain a backported patch since their initial release.
The OpenSSL packages in Red Hat Enterprise Linux 5 are based on fixed upstream release (openssl), or contain backported patch since their initial release (openssl097a). | 2025-01-09T02:16:03+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1",
"Red Hat Stronghold 4"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0g patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4"
] | [
"2003-09-30T12:12:00+00:00",
"2003-09-30T12:16:00+00:00",
"2003-09-30T12:10:00+00:00",
"2003-09-30T12:16:00+00:00"
] |
|
CVE-2003-0682 | security flaw | Important | null | null | "Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695. | Not vulnerable.
This flaw is fixed in Red Hat Enterprise Linux 2.1 via the errata RHSA-2003:280.
This flaw is fixed in Red Hat Enterprise Linux 3 as a backported patch. The source RPM contains the patch openssh-3.6.1p2-owl-realloc.diff which resolved this flaw before Red Hat Enterprise Linux 3 GA.
This flaw does not affect any subsequent versions of Red Hat Enterprise Linux. | 2025-01-08T13:35:53+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-09-16T17:51:00+00:00",
"2003-09-16T17:53:00+00:00"
] |
|
CVE-2003-0552 | security flaw | Moderate | null | null | Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target. | null | 2025-01-08T20:02:04+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system."
] | [
"2003-08-21T17:40:00+00:00",
"2003-08-21T17:23:00+00:00",
"2003-07-21T15:36:00+00:00"
] |
|
CVE-2003-0102 | security flaw | Moderate | null | null | Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize). | null | 2025-01-08T20:08:17+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-10T12:36:00+00:00",
"2003-03-07T15:00:00+00:00"
] |
|
CVE-2003-0694 | security flaw | Critical | null | null | The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. | null | 2025-01-08T19:57:36+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-09-17T19:13:00+00:00",
"2003-09-17T23:42:00+00:00"
] |
|
CVE-2003-0440 | security flaw | Low | null | null | The (1) semi MIME library 1.14.5 and earlier, and (2) wemi 1.14.0 and possibly other versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files. | null | 2025-01-08T20:08:01+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-10-02T19:53:00+00:00",
"2003-07-23T16:33:00+00:00"
] |
|
CVE-2003-0856 | security flaw | Low | null | null | iproute 2.4.7 and earlier allows local users to cause a denial of service via spoofed messages as other users to the kernel netlink interface. | null | 2025-01-08T20:00:40+00:00 | [
"3AS:iproute-0:2.4.7-11.30E.1.i386",
"3AS:iproute-0:2.4.7-11.30E.1.ia64",
"3AS:iproute-0:2.4.7-11.30E.1.ppc",
"3AS:iproute-0:2.4.7-11.30E.1.s390",
"3AS:iproute-0:2.4.7-11.30E.1.s390x",
"3AS:iproute-0:2.4.7-11.30E.1.src",
"3AS:iproute-0:2.4.7-11.30E.1.x86_64",
"3AS:iproute-debuginfo-0:2.4.7-11.30E.1.i386",
"3AS:iproute-debuginfo-0:2.4.7-11.30E.1.ia64",
"3AS:iproute-debuginfo-0:2.4.7-11.30E.1.ppc",
"3AS:iproute-debuginfo-0:2.4.7-11.30E.1.s390",
"3AS:iproute-debuginfo-0:2.4.7-11.30E.1.s390x",
"3AS:iproute-debuginfo-0:2.4.7-11.30E.1.x86_64",
"3Desktop:iproute-0:2.4.7-11.30E.1.i386",
"3Desktop:iproute-0:2.4.7-11.30E.1.ia64",
"3Desktop:iproute-0:2.4.7-11.30E.1.ppc",
"3Desktop:iproute-0:2.4.7-11.30E.1.s390",
"3Desktop:iproute-0:2.4.7-11.30E.1.s390x",
"3Desktop:iproute-0:2.4.7-11.30E.1.src",
"3Desktop:iproute-0:2.4.7-11.30E.1.x86_64",
"3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.i386",
"3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.ia64",
"3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.ppc",
"3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.s390",
"3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.s390x",
"3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.x86_64",
"3ES:iproute-0:2.4.7-11.30E.1.i386",
"3ES:iproute-0:2.4.7-11.30E.1.ia64",
"3ES:iproute-0:2.4.7-11.30E.1.ppc",
"3ES:iproute-0:2.4.7-11.30E.1.s390",
"3ES:iproute-0:2.4.7-11.30E.1.s390x",
"3ES:iproute-0:2.4.7-11.30E.1.src",
"3ES:iproute-0:2.4.7-11.30E.1.x86_64",
"3ES:iproute-debuginfo-0:2.4.7-11.30E.1.i386",
"3ES:iproute-debuginfo-0:2.4.7-11.30E.1.ia64",
"3ES:iproute-debuginfo-0:2.4.7-11.30E.1.ppc",
"3ES:iproute-debuginfo-0:2.4.7-11.30E.1.s390",
"3ES:iproute-debuginfo-0:2.4.7-11.30E.1.s390x",
"3ES:iproute-debuginfo-0:2.4.7-11.30E.1.x86_64",
"3WS:iproute-0:2.4.7-11.30E.1.i386",
"3WS:iproute-0:2.4.7-11.30E.1.ia64",
"3WS:iproute-0:2.4.7-11.30E.1.ppc",
"3WS:iproute-0:2.4.7-11.30E.1.s390",
"3WS:iproute-0:2.4.7-11.30E.1.s390x",
"3WS:iproute-0:2.4.7-11.30E.1.src",
"3WS:iproute-0:2.4.7-11.30E.1.x86_64",
"3WS:iproute-debuginfo-0:2.4.7-11.30E.1.i386",
"3WS:iproute-debuginfo-0:2.4.7-11.30E.1.ia64",
"3WS:iproute-debuginfo-0:2.4.7-11.30E.1.ppc",
"3WS:iproute-debuginfo-0:2.4.7-11.30E.1.s390",
"3WS:iproute-debuginfo-0:2.4.7-11.30E.1.s390x",
"3WS:iproute-debuginfo-0:2.4.7-11.30E.1.x86_64",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-11-12T14:08:00+00:00",
"2003-11-24T08:39:00+00:00"
] |
|
CVE-2003-0592 | security flaw | Important | null | null | Konqueror in KDE 3.1.3 and earlier (kdelibs) allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application. | null | 2025-01-08T20:00:18+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2004-03-10T14:36:00+00:00",
"2004-03-10T14:37:00+00:00"
] |
|
CVE-2003-0984 | security flaw | Low | null | null | Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space. | null | 2025-01-08T19:58:16+00:00 | [
"3AS:kernel-0:2.4.21-15.EL.athlon",
"3AS:kernel-0:2.4.21-15.EL.i686",
"3AS:kernel-0:2.4.21-15.EL.ia32e",
"3AS:kernel-0:2.4.21-15.EL.ia64",
"3AS:kernel-0:2.4.21-15.EL.ppc64iseries",
"3AS:kernel-0:2.4.21-15.EL.ppc64pseries",
"3AS:kernel-0:2.4.21-15.EL.s390",
"3AS:kernel-0:2.4.21-15.EL.s390x",
"3AS:kernel-0:2.4.21-15.EL.src",
"3AS:kernel-0:2.4.21-15.EL.x86_64",
"3AS:kernel-BOOT-0:2.4.21-15.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.athlon",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.i686",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ia32e",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ia64",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.s390",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.s390x",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.x86_64",
"3AS:kernel-doc-0:2.4.21-15.EL.i386",
"3AS:kernel-doc-0:2.4.21-15.EL.ia64",
"3AS:kernel-doc-0:2.4.21-15.EL.ppc64",
"3AS:kernel-doc-0:2.4.21-15.EL.s390",
"3AS:kernel-doc-0:2.4.21-15.EL.s390x",
"3AS:kernel-doc-0:2.4.21-15.EL.x86_64",
"3AS:kernel-hugemem-0:2.4.21-15.EL.i686",
"3AS:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686",
"3AS:kernel-smp-0:2.4.21-15.EL.athlon",
"3AS:kernel-smp-0:2.4.21-15.EL.i686",
"3AS:kernel-smp-0:2.4.21-15.EL.x86_64",
"3AS:kernel-smp-unsupported-0:2.4.21-15.EL.athlon",
"3AS:kernel-smp-unsupported-0:2.4.21-15.EL.i686",
"3AS:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64",
"3AS:kernel-source-0:2.4.21-15.EL.i386",
"3AS:kernel-source-0:2.4.21-15.EL.ia64",
"3AS:kernel-source-0:2.4.21-15.EL.ppc64",
"3AS:kernel-source-0:2.4.21-15.EL.s390",
"3AS:kernel-source-0:2.4.21-15.EL.s390x",
"3AS:kernel-source-0:2.4.21-15.EL.x86_64",
"3AS:kernel-unsupported-0:2.4.21-15.EL.athlon",
"3AS:kernel-unsupported-0:2.4.21-15.EL.i686",
"3AS:kernel-unsupported-0:2.4.21-15.EL.ia32e",
"3AS:kernel-unsupported-0:2.4.21-15.EL.ia64",
"3AS:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries",
"3AS:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries",
"3AS:kernel-unsupported-0:2.4.21-15.EL.s390",
"3AS:kernel-unsupported-0:2.4.21-15.EL.s390x",
"3AS:kernel-unsupported-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-0:2.4.21-15.EL.i686",
"3Desktop:kernel-0:2.4.21-15.EL.ia32e",
"3Desktop:kernel-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-0:2.4.21-15.EL.ppc64iseries",
"3Desktop:kernel-0:2.4.21-15.EL.ppc64pseries",
"3Desktop:kernel-0:2.4.21-15.EL.s390",
"3Desktop:kernel-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-0:2.4.21-15.EL.src",
"3Desktop:kernel-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-BOOT-0:2.4.21-15.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.i686",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ia32e",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.s390",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-doc-0:2.4.21-15.EL.i386",
"3Desktop:kernel-doc-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-doc-0:2.4.21-15.EL.ppc64",
"3Desktop:kernel-doc-0:2.4.21-15.EL.s390",
"3Desktop:kernel-doc-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-doc-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-hugemem-0:2.4.21-15.EL.i686",
"3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-smp-0:2.4.21-15.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.i686",
"3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-source-0:2.4.21-15.EL.i386",
"3Desktop:kernel-source-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-source-0:2.4.21-15.EL.ppc64",
"3Desktop:kernel-source-0:2.4.21-15.EL.s390",
"3Desktop:kernel-source-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-source-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.i686",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.ia32e",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.s390",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.x86_64",
"3ES:kernel-0:2.4.21-15.EL.athlon",
"3ES:kernel-0:2.4.21-15.EL.i686",
"3ES:kernel-0:2.4.21-15.EL.ia32e",
"3ES:kernel-0:2.4.21-15.EL.ia64",
"3ES:kernel-0:2.4.21-15.EL.ppc64iseries",
"3ES:kernel-0:2.4.21-15.EL.ppc64pseries",
"3ES:kernel-0:2.4.21-15.EL.s390",
"3ES:kernel-0:2.4.21-15.EL.s390x",
"3ES:kernel-0:2.4.21-15.EL.src",
"3ES:kernel-0:2.4.21-15.EL.x86_64",
"3ES:kernel-BOOT-0:2.4.21-15.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.athlon",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.i686",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ia32e",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ia64",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.s390",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.s390x",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.x86_64",
"3ES:kernel-doc-0:2.4.21-15.EL.i386",
"3ES:kernel-doc-0:2.4.21-15.EL.ia64",
"3ES:kernel-doc-0:2.4.21-15.EL.ppc64",
"3ES:kernel-doc-0:2.4.21-15.EL.s390",
"3ES:kernel-doc-0:2.4.21-15.EL.s390x",
"3ES:kernel-doc-0:2.4.21-15.EL.x86_64",
"3ES:kernel-hugemem-0:2.4.21-15.EL.i686",
"3ES:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686",
"3ES:kernel-smp-0:2.4.21-15.EL.athlon",
"3ES:kernel-smp-0:2.4.21-15.EL.i686",
"3ES:kernel-smp-0:2.4.21-15.EL.x86_64",
"3ES:kernel-smp-unsupported-0:2.4.21-15.EL.athlon",
"3ES:kernel-smp-unsupported-0:2.4.21-15.EL.i686",
"3ES:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64",
"3ES:kernel-source-0:2.4.21-15.EL.i386",
"3ES:kernel-source-0:2.4.21-15.EL.ia64",
"3ES:kernel-source-0:2.4.21-15.EL.ppc64",
"3ES:kernel-source-0:2.4.21-15.EL.s390",
"3ES:kernel-source-0:2.4.21-15.EL.s390x",
"3ES:kernel-source-0:2.4.21-15.EL.x86_64",
"3ES:kernel-unsupported-0:2.4.21-15.EL.athlon",
"3ES:kernel-unsupported-0:2.4.21-15.EL.i686",
"3ES:kernel-unsupported-0:2.4.21-15.EL.ia32e",
"3ES:kernel-unsupported-0:2.4.21-15.EL.ia64",
"3ES:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries",
"3ES:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries",
"3ES:kernel-unsupported-0:2.4.21-15.EL.s390",
"3ES:kernel-unsupported-0:2.4.21-15.EL.s390x",
"3ES:kernel-unsupported-0:2.4.21-15.EL.x86_64",
"3WS:kernel-0:2.4.21-15.EL.athlon",
"3WS:kernel-0:2.4.21-15.EL.i686",
"3WS:kernel-0:2.4.21-15.EL.ia32e",
"3WS:kernel-0:2.4.21-15.EL.ia64",
"3WS:kernel-0:2.4.21-15.EL.ppc64iseries",
"3WS:kernel-0:2.4.21-15.EL.ppc64pseries",
"3WS:kernel-0:2.4.21-15.EL.s390",
"3WS:kernel-0:2.4.21-15.EL.s390x",
"3WS:kernel-0:2.4.21-15.EL.src",
"3WS:kernel-0:2.4.21-15.EL.x86_64",
"3WS:kernel-BOOT-0:2.4.21-15.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.athlon",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.i686",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ia32e",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ia64",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.s390",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.s390x",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.x86_64",
"3WS:kernel-doc-0:2.4.21-15.EL.i386",
"3WS:kernel-doc-0:2.4.21-15.EL.ia64",
"3WS:kernel-doc-0:2.4.21-15.EL.ppc64",
"3WS:kernel-doc-0:2.4.21-15.EL.s390",
"3WS:kernel-doc-0:2.4.21-15.EL.s390x",
"3WS:kernel-doc-0:2.4.21-15.EL.x86_64",
"3WS:kernel-hugemem-0:2.4.21-15.EL.i686",
"3WS:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686",
"3WS:kernel-smp-0:2.4.21-15.EL.athlon",
"3WS:kernel-smp-0:2.4.21-15.EL.i686",
"3WS:kernel-smp-0:2.4.21-15.EL.x86_64",
"3WS:kernel-smp-unsupported-0:2.4.21-15.EL.athlon",
"3WS:kernel-smp-unsupported-0:2.4.21-15.EL.i686",
"3WS:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64",
"3WS:kernel-source-0:2.4.21-15.EL.i386",
"3WS:kernel-source-0:2.4.21-15.EL.ia64",
"3WS:kernel-source-0:2.4.21-15.EL.ppc64",
"3WS:kernel-source-0:2.4.21-15.EL.s390",
"3WS:kernel-source-0:2.4.21-15.EL.s390x",
"3WS:kernel-source-0:2.4.21-15.EL.x86_64",
"3WS:kernel-unsupported-0:2.4.21-15.EL.athlon",
"3WS:kernel-unsupported-0:2.4.21-15.EL.i686",
"3WS:kernel-unsupported-0:2.4.21-15.EL.ia32e",
"3WS:kernel-unsupported-0:2.4.21-15.EL.ia64",
"3WS:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries",
"3WS:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries",
"3WS:kernel-unsupported-0:2.4.21-15.EL.s390",
"3WS:kernel-unsupported-0:2.4.21-15.EL.s390x",
"3WS:kernel-unsupported-0:2.4.21-15.EL.x86_64",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2004-05-12T01:07:00+00:00",
"2004-01-05T12:50:00+00:00"
] |
|
CVE-2003-0204 | security flaw | None | null | null | KDE 2 and KDE 3.1.1 and earlier 3.x versions allows attackers to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer. | null | 2025-01-08T20:06:00+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-22T16:50:00+00:00",
"2003-05-12T16:32:00+00:00"
] |
|
CVE-2003-0195 | security flaw | None | null | null | CUPS before 1.1.19 allows remote attackers to cause a denial of service via a partial printing request to the IPP port (631), which does not time out. | null | 2025-01-08T20:08:27+00:00 | [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-27T09:41:00+00:00"
] |
|
CVE-2003-0253 | security flaw | None | null | null | The prefork MPM in Apache 2 before 2.0.47 does not properly handle certain errors from accept, which could lead to a denial of service. | null | 2025-01-08T20:09:15+00:00 | [
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-09-04T07:40:00+00:00"
] |
|
CVE-2003-1012 | security flaw | Low | null | null | The SMB dissector in Ethereal before 0.10.0 allows remote attackers to cause a denial of service via a malformed SMB packet that triggers a segmentation fault during processing of Selected packets. | null | 2025-01-08T20:00:46+00:00 | [
"3AS:ethereal-0:0.10.0a-0.30E.1.i386",
"3AS:ethereal-0:0.10.0a-0.30E.1.ia64",
"3AS:ethereal-0:0.10.0a-0.30E.1.ppc",
"3AS:ethereal-0:0.10.0a-0.30E.1.s390",
"3AS:ethereal-0:0.10.0a-0.30E.1.s390x",
"3AS:ethereal-0:0.10.0a-0.30E.1.src",
"3AS:ethereal-0:0.10.0a-0.30E.1.x86_64",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.i386",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.ia64",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.ppc",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.s390",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.s390x",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.i386",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.ia64",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.ppc",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.s390",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.s390x",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.src",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.x86_64",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.i386",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.ia64",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.ppc",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.s390",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.s390x",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64",
"3ES:ethereal-0:0.10.0a-0.30E.1.i386",
"3ES:ethereal-0:0.10.0a-0.30E.1.ia64",
"3ES:ethereal-0:0.10.0a-0.30E.1.ppc",
"3ES:ethereal-0:0.10.0a-0.30E.1.s390",
"3ES:ethereal-0:0.10.0a-0.30E.1.s390x",
"3ES:ethereal-0:0.10.0a-0.30E.1.src",
"3ES:ethereal-0:0.10.0a-0.30E.1.x86_64",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.i386",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.ia64",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.ppc",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.s390",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.s390x",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64",
"3WS:ethereal-0:0.10.0a-0.30E.1.i386",
"3WS:ethereal-0:0.10.0a-0.30E.1.ia64",
"3WS:ethereal-0:0.10.0a-0.30E.1.ppc",
"3WS:ethereal-0:0.10.0a-0.30E.1.s390",
"3WS:ethereal-0:0.10.0a-0.30E.1.s390x",
"3WS:ethereal-0:0.10.0a-0.30E.1.src",
"3WS:ethereal-0:0.10.0a-0.30E.1.x86_64",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.i386",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.ia64",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.ppc",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.s390",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.s390x",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2004-01-20T16:45:00+00:00",
"2004-01-07T18:12:00+00:00"
] |
|
CVE-2003-0615 | security flaw | Important | null | null | Cross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter. | null | 2025-01-08T19:59:32+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-09-22T08:46:00+00:00",
"2003-09-22T08:52:00+00:00"
] |
|
CVE-2003-0245 | security flaw | None | null | null | Vulnerability in the apr_psprintf function in the Apache Portable Runtime (APR) library for Apache 2.0.37 through 2.0.45 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long strings, as demonstrated using XML objects to mod_dav, and possibly other vectors. | null | 2025-01-08T20:07:36+00:00 | [
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-28T16:25:00+00:00"
] |
|
CVE-2003-0992 | security flaw | Important | null | null | Cross-site scripting (XSS) vulnerability in the create CGI script for Mailman before 2.1.3 allows remote attackers to steal cookies of other users. | null | 2025-01-08T19:58:22+00:00 | [
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2004-02-05T08:51:00+00:00"
] |
|
CVE-2003-0357 | security flaw | Moderate | null | null | Multiple integer overflow vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) Mount and (2) PPP dissectors. | null | 2025-01-08T20:06:14+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-07-08T19:59:00+00:00",
"2003-07-03T08:31:00+00:00"
] |
|
CVE-2003-0140 | security flaw | Important | null | null | Buffer overflow in Mutt 1.4.0 and possibly earlier versions, 1.5.x up to 1.5.3, and other programs that use Mutt code such as Balsa before 2.0.10, allows a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a crafted folder. | null | 2025-01-08T20:04:36+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-22T16:41:00+00:00",
"2003-04-03T20:21:00+00:00"
] |
|
CVE-2003-0455 | security flaw | Important | null | null | The imagemagick libmagick library 5.5 and earlier creates temporary files insecurely, which allows local users to create or overwrite arbitrary files. | null | 2025-01-08T20:09:27+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] | [
"2004-10-20T19:17:00+00:00"
] |
|
CVE-2003-0547 | security flaw | Low | null | null | GDM before 2.4.1.6, when using the "examine session errors" feature, allows local users to read arbitrary files via a symlink attack on the ~/.xsession-errors file. | null | 2025-01-08T20:01:48+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-08-21T19:16:00+00:00"
] |
|
CVE-2003-0681 | security flaw | Important | null | null | A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences. | null | 2025-01-08T19:59:50+00:00 | [
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-09-17T23:42:00+00:00"
] |
|
CVE-2003-0551 | security flaw | Moderate | null | null | The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service. | null | 2025-01-08T19:59:07+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system."
] | [
"2003-08-21T17:40:00+00:00",
"2003-08-21T17:23:00+00:00",
"2003-07-21T15:36:00+00:00"
] |
|
CVE-2003-0855 | security flaw | Low | null | null | Pan 0.13.3 and earlier allows remote attackers to cause a denial of service (crash) via a news post with a long author email address. | null | 2025-01-08T19:59:56+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-12-10T16:52:00+00:00",
"2003-11-24T08:51:00+00:00"
] |
|
CVE-2003-0967 | security flaw | Moderate | null | null | rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute. | null | 2025-01-08T19:57:52+00:00 | [
"3AS:freeradius-0:0.9.3-1.i386",
"3AS:freeradius-0:0.9.3-1.ia64",
"3AS:freeradius-0:0.9.3-1.ppc",
"3AS:freeradius-0:0.9.3-1.s390",
"3AS:freeradius-0:0.9.3-1.s390x",
"3AS:freeradius-0:0.9.3-1.src",
"3AS:freeradius-0:0.9.3-1.x86_64",
"3AS:freeradius-debuginfo-0:0.9.3-1.i386",
"3AS:freeradius-debuginfo-0:0.9.3-1.ia64",
"3AS:freeradius-debuginfo-0:0.9.3-1.ppc",
"3AS:freeradius-debuginfo-0:0.9.3-1.s390",
"3AS:freeradius-debuginfo-0:0.9.3-1.s390x",
"3AS:freeradius-debuginfo-0:0.9.3-1.x86_64",
"3ES:freeradius-0:0.9.3-1.i386",
"3ES:freeradius-0:0.9.3-1.ia64",
"3ES:freeradius-0:0.9.3-1.ppc",
"3ES:freeradius-0:0.9.3-1.s390",
"3ES:freeradius-0:0.9.3-1.s390x",
"3ES:freeradius-0:0.9.3-1.src",
"3ES:freeradius-0:0.9.3-1.x86_64",
"3ES:freeradius-debuginfo-0:0.9.3-1.i386",
"3ES:freeradius-debuginfo-0:0.9.3-1.ia64",
"3ES:freeradius-debuginfo-0:0.9.3-1.ppc",
"3ES:freeradius-debuginfo-0:0.9.3-1.s390",
"3ES:freeradius-debuginfo-0:0.9.3-1.s390x",
"3ES:freeradius-debuginfo-0:0.9.3-1.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-12-10T16:59:00+00:00"
] |
|
CVE-2003-0434 | security flaw | Important | null | null | Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink. | null | 2025-01-08T20:09:11+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-06-18T17:27:00+00:00",
"2003-06-18T17:32:00+00:00"
] |
|
CVE-2003-0988 | security flaw | Important | null | null | Buffer overflow in the VCF file information reader for KDE Personal Information Management (kdepim) suite in KDE 3.1.0 through 3.1.4 allows attackers to execute arbitrary code via a VCF file. | null | 2025-01-08T20:03:15+00:00 | [
"3AS:kdepim-6:3.1.3-3.3.i386",
"3AS:kdepim-6:3.1.3-3.3.ia64",
"3AS:kdepim-6:3.1.3-3.3.ppc",
"3AS:kdepim-6:3.1.3-3.3.s390",
"3AS:kdepim-6:3.1.3-3.3.s390x",
"3AS:kdepim-6:3.1.3-3.3.src",
"3AS:kdepim-6:3.1.3-3.3.x86_64",
"3AS:kdepim-debuginfo-6:3.1.3-3.3.i386",
"3AS:kdepim-debuginfo-6:3.1.3-3.3.ia64",
"3AS:kdepim-debuginfo-6:3.1.3-3.3.ppc",
"3AS:kdepim-debuginfo-6:3.1.3-3.3.s390",
"3AS:kdepim-debuginfo-6:3.1.3-3.3.s390x",
"3AS:kdepim-debuginfo-6:3.1.3-3.3.x86_64",
"3AS:kdepim-devel-6:3.1.3-3.3.i386",
"3AS:kdepim-devel-6:3.1.3-3.3.ia64",
"3AS:kdepim-devel-6:3.1.3-3.3.ppc",
"3AS:kdepim-devel-6:3.1.3-3.3.s390",
"3AS:kdepim-devel-6:3.1.3-3.3.s390x",
"3AS:kdepim-devel-6:3.1.3-3.3.x86_64",
"3Desktop:kdepim-6:3.1.3-3.3.i386",
"3Desktop:kdepim-6:3.1.3-3.3.ia64",
"3Desktop:kdepim-6:3.1.3-3.3.ppc",
"3Desktop:kdepim-6:3.1.3-3.3.s390",
"3Desktop:kdepim-6:3.1.3-3.3.s390x",
"3Desktop:kdepim-6:3.1.3-3.3.src",
"3Desktop:kdepim-6:3.1.3-3.3.x86_64",
"3Desktop:kdepim-debuginfo-6:3.1.3-3.3.i386",
"3Desktop:kdepim-debuginfo-6:3.1.3-3.3.ia64",
"3Desktop:kdepim-debuginfo-6:3.1.3-3.3.ppc",
"3Desktop:kdepim-debuginfo-6:3.1.3-3.3.s390",
"3Desktop:kdepim-debuginfo-6:3.1.3-3.3.s390x",
"3Desktop:kdepim-debuginfo-6:3.1.3-3.3.x86_64",
"3Desktop:kdepim-devel-6:3.1.3-3.3.i386",
"3Desktop:kdepim-devel-6:3.1.3-3.3.ia64",
"3Desktop:kdepim-devel-6:3.1.3-3.3.ppc",
"3Desktop:kdepim-devel-6:3.1.3-3.3.s390",
"3Desktop:kdepim-devel-6:3.1.3-3.3.s390x",
"3Desktop:kdepim-devel-6:3.1.3-3.3.x86_64",
"3ES:kdepim-6:3.1.3-3.3.i386",
"3ES:kdepim-6:3.1.3-3.3.ia64",
"3ES:kdepim-6:3.1.3-3.3.ppc",
"3ES:kdepim-6:3.1.3-3.3.s390",
"3ES:kdepim-6:3.1.3-3.3.s390x",
"3ES:kdepim-6:3.1.3-3.3.src",
"3ES:kdepim-6:3.1.3-3.3.x86_64",
"3ES:kdepim-debuginfo-6:3.1.3-3.3.i386",
"3ES:kdepim-debuginfo-6:3.1.3-3.3.ia64",
"3ES:kdepim-debuginfo-6:3.1.3-3.3.ppc",
"3ES:kdepim-debuginfo-6:3.1.3-3.3.s390",
"3ES:kdepim-debuginfo-6:3.1.3-3.3.s390x",
"3ES:kdepim-debuginfo-6:3.1.3-3.3.x86_64",
"3ES:kdepim-devel-6:3.1.3-3.3.i386",
"3ES:kdepim-devel-6:3.1.3-3.3.ia64",
"3ES:kdepim-devel-6:3.1.3-3.3.ppc",
"3ES:kdepim-devel-6:3.1.3-3.3.s390",
"3ES:kdepim-devel-6:3.1.3-3.3.s390x",
"3ES:kdepim-devel-6:3.1.3-3.3.x86_64",
"3WS:kdepim-6:3.1.3-3.3.i386",
"3WS:kdepim-6:3.1.3-3.3.ia64",
"3WS:kdepim-6:3.1.3-3.3.ppc",
"3WS:kdepim-6:3.1.3-3.3.s390",
"3WS:kdepim-6:3.1.3-3.3.s390x",
"3WS:kdepim-6:3.1.3-3.3.src",
"3WS:kdepim-6:3.1.3-3.3.x86_64",
"3WS:kdepim-debuginfo-6:3.1.3-3.3.i386",
"3WS:kdepim-debuginfo-6:3.1.3-3.3.ia64",
"3WS:kdepim-debuginfo-6:3.1.3-3.3.ppc",
"3WS:kdepim-debuginfo-6:3.1.3-3.3.s390",
"3WS:kdepim-debuginfo-6:3.1.3-3.3.s390x",
"3WS:kdepim-debuginfo-6:3.1.3-3.3.x86_64",
"3WS:kdepim-devel-6:3.1.3-3.3.i386",
"3WS:kdepim-devel-6:3.1.3-3.3.ia64",
"3WS:kdepim-devel-6:3.1.3-3.3.ppc",
"3WS:kdepim-devel-6:3.1.3-3.3.s390",
"3WS:kdepim-devel-6:3.1.3-3.3.s390x",
"3WS:kdepim-devel-6:3.1.3-3.3.x86_64",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2004-01-14T13:10:00+00:00",
"2004-01-14T13:09:00+00:00"
] |
|
CVE-2003-0619 | security flaw | Important | null | null | Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call. | null | 2025-01-08T20:02:54+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2003-08-21T17:40:00+00:00",
"2003-08-21T17:23:00+00:00"
] |
|
CVE-2003-0926 | security flaw | Low | null | null | Ethereal 0.9.15 and earlier, and Tethereal, allows remote attackers to cause a denial of service (crash) via certain malformed (1) ISAKMP or (2) MEGACO packets. | null | 2025-01-08T20:01:58+00:00 | [
"3AS:ethereal-0:0.9.16-0.30E.1.i386",
"3AS:ethereal-0:0.9.16-0.30E.1.ia64",
"3AS:ethereal-0:0.9.16-0.30E.1.ppc",
"3AS:ethereal-0:0.9.16-0.30E.1.s390",
"3AS:ethereal-0:0.9.16-0.30E.1.s390x",
"3AS:ethereal-0:0.9.16-0.30E.1.src",
"3AS:ethereal-0:0.9.16-0.30E.1.x86_64",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.i386",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.ia64",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.ppc",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.s390",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.s390x",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.x86_64",
"3Desktop:ethereal-0:0.9.16-0.30E.1.i386",
"3Desktop:ethereal-0:0.9.16-0.30E.1.ia64",
"3Desktop:ethereal-0:0.9.16-0.30E.1.ppc",
"3Desktop:ethereal-0:0.9.16-0.30E.1.s390",
"3Desktop:ethereal-0:0.9.16-0.30E.1.s390x",
"3Desktop:ethereal-0:0.9.16-0.30E.1.src",
"3Desktop:ethereal-0:0.9.16-0.30E.1.x86_64",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.i386",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.ia64",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.ppc",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.s390",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.s390x",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.x86_64",
"3ES:ethereal-0:0.9.16-0.30E.1.i386",
"3ES:ethereal-0:0.9.16-0.30E.1.ia64",
"3ES:ethereal-0:0.9.16-0.30E.1.ppc",
"3ES:ethereal-0:0.9.16-0.30E.1.s390",
"3ES:ethereal-0:0.9.16-0.30E.1.s390x",
"3ES:ethereal-0:0.9.16-0.30E.1.src",
"3ES:ethereal-0:0.9.16-0.30E.1.x86_64",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.i386",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.ia64",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.ppc",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.s390",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.s390x",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.x86_64",
"3WS:ethereal-0:0.9.16-0.30E.1.i386",
"3WS:ethereal-0:0.9.16-0.30E.1.ia64",
"3WS:ethereal-0:0.9.16-0.30E.1.ppc",
"3WS:ethereal-0:0.9.16-0.30E.1.s390",
"3WS:ethereal-0:0.9.16-0.30E.1.s390x",
"3WS:ethereal-0:0.9.16-0.30E.1.src",
"3WS:ethereal-0:0.9.16-0.30E.1.x86_64",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.i386",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.ia64",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.ppc",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.s390",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.s390x",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.x86_64",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-11-12T14:05:00+00:00",
"2003-11-10T17:53:00+00:00"
] |
|
CVE-2003-0160 | security flaw | None | null | null | Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.2.11 allow remote attackers to inject arbitrary HTML code and steal information from a client's web browser. | null | 2025-01-08T20:07:00+00:00 | [
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-04-24T20:37:00+00:00"
] |
|
CVE-2003-0072 | security flaw | Important | null | null | The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes an out-of-bounds read of an array (aka "array overrun"). | null | 2025-01-08T20:05:44+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-27T19:43:00+00:00",
"2003-03-26T21:49:00+00:00"
] |
|
CVE-2003-0971 | security flaw | Important | null | null | GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature. | null | 2025-01-08T20:01:04+00:00 | [
"3AS:gnupg-0:1.2.1-10.i386",
"3AS:gnupg-0:1.2.1-10.ia64",
"3AS:gnupg-0:1.2.1-10.ppc",
"3AS:gnupg-0:1.2.1-10.s390",
"3AS:gnupg-0:1.2.1-10.s390x",
"3AS:gnupg-0:1.2.1-10.src",
"3AS:gnupg-0:1.2.1-10.x86_64",
"3AS:gnupg-debuginfo-0:1.2.1-10.i386",
"3AS:gnupg-debuginfo-0:1.2.1-10.ia64",
"3AS:gnupg-debuginfo-0:1.2.1-10.ppc",
"3AS:gnupg-debuginfo-0:1.2.1-10.s390",
"3AS:gnupg-debuginfo-0:1.2.1-10.s390x",
"3AS:gnupg-debuginfo-0:1.2.1-10.x86_64",
"3Desktop:gnupg-0:1.2.1-10.i386",
"3Desktop:gnupg-0:1.2.1-10.ia64",
"3Desktop:gnupg-0:1.2.1-10.ppc",
"3Desktop:gnupg-0:1.2.1-10.s390",
"3Desktop:gnupg-0:1.2.1-10.s390x",
"3Desktop:gnupg-0:1.2.1-10.src",
"3Desktop:gnupg-0:1.2.1-10.x86_64",
"3Desktop:gnupg-debuginfo-0:1.2.1-10.i386",
"3Desktop:gnupg-debuginfo-0:1.2.1-10.ia64",
"3Desktop:gnupg-debuginfo-0:1.2.1-10.ppc",
"3Desktop:gnupg-debuginfo-0:1.2.1-10.s390",
"3Desktop:gnupg-debuginfo-0:1.2.1-10.s390x",
"3Desktop:gnupg-debuginfo-0:1.2.1-10.x86_64",
"3ES:gnupg-0:1.2.1-10.i386",
"3ES:gnupg-0:1.2.1-10.ia64",
"3ES:gnupg-0:1.2.1-10.ppc",
"3ES:gnupg-0:1.2.1-10.s390",
"3ES:gnupg-0:1.2.1-10.s390x",
"3ES:gnupg-0:1.2.1-10.src",
"3ES:gnupg-0:1.2.1-10.x86_64",
"3ES:gnupg-debuginfo-0:1.2.1-10.i386",
"3ES:gnupg-debuginfo-0:1.2.1-10.ia64",
"3ES:gnupg-debuginfo-0:1.2.1-10.ppc",
"3ES:gnupg-debuginfo-0:1.2.1-10.s390",
"3ES:gnupg-debuginfo-0:1.2.1-10.s390x",
"3ES:gnupg-debuginfo-0:1.2.1-10.x86_64",
"3WS:gnupg-0:1.2.1-10.i386",
"3WS:gnupg-0:1.2.1-10.ia64",
"3WS:gnupg-0:1.2.1-10.ppc",
"3WS:gnupg-0:1.2.1-10.s390",
"3WS:gnupg-0:1.2.1-10.s390x",
"3WS:gnupg-0:1.2.1-10.src",
"3WS:gnupg-0:1.2.1-10.x86_64",
"3WS:gnupg-debuginfo-0:1.2.1-10.i386",
"3WS:gnupg-debuginfo-0:1.2.1-10.ia64",
"3WS:gnupg-debuginfo-0:1.2.1-10.ppc",
"3WS:gnupg-debuginfo-0:1.2.1-10.s390",
"3WS:gnupg-debuginfo-0:1.2.1-10.s390x",
"3WS:gnupg-debuginfo-0:1.2.1-10.x86_64",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-12-11T00:21:00+00:00",
"2003-12-11T00:25:00+00:00"
] |
|
CVE-2003-0459 | security flaw | Moderate | null | null | KDE Konqueror for KDE 3.1.2 and earlier does not remove authentication credentials from URLs of the "user:password@host" form in the HTTP-Referer header, which could allow remote web sites to steal the credentials for pages that link to the sites. | null | 2025-01-08T20:09:40+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-07-30T20:48:00+00:00",
"2003-08-11T07:50:00+00:00"
] |
|
CVE-2003-0789 | security flaw | Moderate | null | null | mod_cgid in Apache before 2.0.48, when using a threaded MPM, does not properly handle CGI redirect paths, which could cause Apache to send the output of a CGI program to the wrong client. | null | 2025-01-08T20:00:34+00:00 | [
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nAfter the errata packages are installed, restart the HTTP service by\nrunning (as root) the following command:\n\n/sbin/service httpd restart\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-12-16T21:48:00+00:00"
] |
|
CVE-2003-0859 | security flaw | Low | null | null | The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface. | null | 2025-01-08T20:02:06+00:00 | [
"3AS:glibc-0:2.3.2-95.6.i386",
"3AS:glibc-0:2.3.2-95.6.i686",
"3AS:glibc-0:2.3.2-95.6.ia64",
"3AS:glibc-0:2.3.2-95.6.ppc",
"3AS:glibc-0:2.3.2-95.6.ppc64",
"3AS:glibc-0:2.3.2-95.6.s390",
"3AS:glibc-0:2.3.2-95.6.s390x",
"3AS:glibc-0:2.3.2-95.6.src",
"3AS:glibc-0:2.3.2-95.6.x86_64",
"3AS:glibc-common-0:2.3.2-95.6.i386",
"3AS:glibc-common-0:2.3.2-95.6.ia64",
"3AS:glibc-common-0:2.3.2-95.6.ppc",
"3AS:glibc-common-0:2.3.2-95.6.s390",
"3AS:glibc-common-0:2.3.2-95.6.s390x",
"3AS:glibc-common-0:2.3.2-95.6.x86_64",
"3AS:glibc-debuginfo-0:2.3.2-95.6.i386",
"3AS:glibc-debuginfo-0:2.3.2-95.6.i686",
"3AS:glibc-debuginfo-0:2.3.2-95.6.ia64",
"3AS:glibc-debuginfo-0:2.3.2-95.6.ppc",
"3AS:glibc-debuginfo-0:2.3.2-95.6.ppc64",
"3AS:glibc-debuginfo-0:2.3.2-95.6.s390",
"3AS:glibc-debuginfo-0:2.3.2-95.6.s390x",
"3AS:glibc-debuginfo-0:2.3.2-95.6.x86_64",
"3AS:glibc-debuginfo-common-0:2.3.2-95.6.i386",
"3AS:glibc-devel-0:2.3.2-95.6.i386",
"3AS:glibc-devel-0:2.3.2-95.6.ia64",
"3AS:glibc-devel-0:2.3.2-95.6.ppc",
"3AS:glibc-devel-0:2.3.2-95.6.ppc64",
"3AS:glibc-devel-0:2.3.2-95.6.s390",
"3AS:glibc-devel-0:2.3.2-95.6.s390x",
"3AS:glibc-devel-0:2.3.2-95.6.x86_64",
"3AS:glibc-headers-0:2.3.2-95.6.i386",
"3AS:glibc-headers-0:2.3.2-95.6.ia64",
"3AS:glibc-headers-0:2.3.2-95.6.ppc",
"3AS:glibc-headers-0:2.3.2-95.6.s390",
"3AS:glibc-headers-0:2.3.2-95.6.s390x",
"3AS:glibc-headers-0:2.3.2-95.6.x86_64",
"3AS:glibc-profile-0:2.3.2-95.6.i386",
"3AS:glibc-profile-0:2.3.2-95.6.ia64",
"3AS:glibc-profile-0:2.3.2-95.6.ppc",
"3AS:glibc-profile-0:2.3.2-95.6.s390",
"3AS:glibc-profile-0:2.3.2-95.6.s390x",
"3AS:glibc-profile-0:2.3.2-95.6.x86_64",
"3AS:glibc-utils-0:2.3.2-95.6.i386",
"3AS:glibc-utils-0:2.3.2-95.6.ia64",
"3AS:glibc-utils-0:2.3.2-95.6.ppc",
"3AS:glibc-utils-0:2.3.2-95.6.s390",
"3AS:glibc-utils-0:2.3.2-95.6.s390x",
"3AS:glibc-utils-0:2.3.2-95.6.x86_64",
"3AS:nptl-devel-0:2.3.2-95.6.i686",
"3AS:nptl-devel-0:2.3.2-95.6.ia64",
"3AS:nptl-devel-0:2.3.2-95.6.ppc",
"3AS:nptl-devel-0:2.3.2-95.6.s390",
"3AS:nptl-devel-0:2.3.2-95.6.s390x",
"3AS:nptl-devel-0:2.3.2-95.6.x86_64",
"3AS:nscd-0:2.3.2-95.6.i386",
"3AS:nscd-0:2.3.2-95.6.ia64",
"3AS:nscd-0:2.3.2-95.6.ppc",
"3AS:nscd-0:2.3.2-95.6.s390",
"3AS:nscd-0:2.3.2-95.6.s390x",
"3AS:nscd-0:2.3.2-95.6.x86_64",
"3Desktop:glibc-0:2.3.2-95.6.i386",
"3Desktop:glibc-0:2.3.2-95.6.i686",
"3Desktop:glibc-0:2.3.2-95.6.ia64",
"3Desktop:glibc-0:2.3.2-95.6.ppc",
"3Desktop:glibc-0:2.3.2-95.6.ppc64",
"3Desktop:glibc-0:2.3.2-95.6.s390",
"3Desktop:glibc-0:2.3.2-95.6.s390x",
"3Desktop:glibc-0:2.3.2-95.6.src",
"3Desktop:glibc-0:2.3.2-95.6.x86_64",
"3Desktop:glibc-common-0:2.3.2-95.6.i386",
"3Desktop:glibc-common-0:2.3.2-95.6.ia64",
"3Desktop:glibc-common-0:2.3.2-95.6.ppc",
"3Desktop:glibc-common-0:2.3.2-95.6.s390",
"3Desktop:glibc-common-0:2.3.2-95.6.s390x",
"3Desktop:glibc-common-0:2.3.2-95.6.x86_64",
"3Desktop:glibc-debuginfo-0:2.3.2-95.6.i386",
"3Desktop:glibc-debuginfo-0:2.3.2-95.6.i686",
"3Desktop:glibc-debuginfo-0:2.3.2-95.6.ia64",
"3Desktop:glibc-debuginfo-0:2.3.2-95.6.ppc",
"3Desktop:glibc-debuginfo-0:2.3.2-95.6.ppc64",
"3Desktop:glibc-debuginfo-0:2.3.2-95.6.s390",
"3Desktop:glibc-debuginfo-0:2.3.2-95.6.s390x",
"3Desktop:glibc-debuginfo-0:2.3.2-95.6.x86_64",
"3Desktop:glibc-debuginfo-common-0:2.3.2-95.6.i386",
"3Desktop:glibc-devel-0:2.3.2-95.6.i386",
"3Desktop:glibc-devel-0:2.3.2-95.6.ia64",
"3Desktop:glibc-devel-0:2.3.2-95.6.ppc",
"3Desktop:glibc-devel-0:2.3.2-95.6.ppc64",
"3Desktop:glibc-devel-0:2.3.2-95.6.s390",
"3Desktop:glibc-devel-0:2.3.2-95.6.s390x",
"3Desktop:glibc-devel-0:2.3.2-95.6.x86_64",
"3Desktop:glibc-headers-0:2.3.2-95.6.i386",
"3Desktop:glibc-headers-0:2.3.2-95.6.ia64",
"3Desktop:glibc-headers-0:2.3.2-95.6.ppc",
"3Desktop:glibc-headers-0:2.3.2-95.6.s390",
"3Desktop:glibc-headers-0:2.3.2-95.6.s390x",
"3Desktop:glibc-headers-0:2.3.2-95.6.x86_64",
"3Desktop:glibc-profile-0:2.3.2-95.6.i386",
"3Desktop:glibc-profile-0:2.3.2-95.6.ia64",
"3Desktop:glibc-profile-0:2.3.2-95.6.ppc",
"3Desktop:glibc-profile-0:2.3.2-95.6.s390",
"3Desktop:glibc-profile-0:2.3.2-95.6.s390x",
"3Desktop:glibc-profile-0:2.3.2-95.6.x86_64",
"3Desktop:glibc-utils-0:2.3.2-95.6.i386",
"3Desktop:glibc-utils-0:2.3.2-95.6.ia64",
"3Desktop:glibc-utils-0:2.3.2-95.6.ppc",
"3Desktop:glibc-utils-0:2.3.2-95.6.s390",
"3Desktop:glibc-utils-0:2.3.2-95.6.s390x",
"3Desktop:glibc-utils-0:2.3.2-95.6.x86_64",
"3Desktop:nptl-devel-0:2.3.2-95.6.i686",
"3Desktop:nptl-devel-0:2.3.2-95.6.ia64",
"3Desktop:nptl-devel-0:2.3.2-95.6.ppc",
"3Desktop:nptl-devel-0:2.3.2-95.6.s390",
"3Desktop:nptl-devel-0:2.3.2-95.6.s390x",
"3Desktop:nptl-devel-0:2.3.2-95.6.x86_64",
"3Desktop:nscd-0:2.3.2-95.6.i386",
"3Desktop:nscd-0:2.3.2-95.6.ia64",
"3Desktop:nscd-0:2.3.2-95.6.ppc",
"3Desktop:nscd-0:2.3.2-95.6.s390",
"3Desktop:nscd-0:2.3.2-95.6.s390x",
"3Desktop:nscd-0:2.3.2-95.6.x86_64",
"3ES:glibc-0:2.3.2-95.6.i386",
"3ES:glibc-0:2.3.2-95.6.i686",
"3ES:glibc-0:2.3.2-95.6.ia64",
"3ES:glibc-0:2.3.2-95.6.ppc",
"3ES:glibc-0:2.3.2-95.6.ppc64",
"3ES:glibc-0:2.3.2-95.6.s390",
"3ES:glibc-0:2.3.2-95.6.s390x",
"3ES:glibc-0:2.3.2-95.6.src",
"3ES:glibc-0:2.3.2-95.6.x86_64",
"3ES:glibc-common-0:2.3.2-95.6.i386",
"3ES:glibc-common-0:2.3.2-95.6.ia64",
"3ES:glibc-common-0:2.3.2-95.6.ppc",
"3ES:glibc-common-0:2.3.2-95.6.s390",
"3ES:glibc-common-0:2.3.2-95.6.s390x",
"3ES:glibc-common-0:2.3.2-95.6.x86_64",
"3ES:glibc-debuginfo-0:2.3.2-95.6.i386",
"3ES:glibc-debuginfo-0:2.3.2-95.6.i686",
"3ES:glibc-debuginfo-0:2.3.2-95.6.ia64",
"3ES:glibc-debuginfo-0:2.3.2-95.6.ppc",
"3ES:glibc-debuginfo-0:2.3.2-95.6.ppc64",
"3ES:glibc-debuginfo-0:2.3.2-95.6.s390",
"3ES:glibc-debuginfo-0:2.3.2-95.6.s390x",
"3ES:glibc-debuginfo-0:2.3.2-95.6.x86_64",
"3ES:glibc-debuginfo-common-0:2.3.2-95.6.i386",
"3ES:glibc-devel-0:2.3.2-95.6.i386",
"3ES:glibc-devel-0:2.3.2-95.6.ia64",
"3ES:glibc-devel-0:2.3.2-95.6.ppc",
"3ES:glibc-devel-0:2.3.2-95.6.ppc64",
"3ES:glibc-devel-0:2.3.2-95.6.s390",
"3ES:glibc-devel-0:2.3.2-95.6.s390x",
"3ES:glibc-devel-0:2.3.2-95.6.x86_64",
"3ES:glibc-headers-0:2.3.2-95.6.i386",
"3ES:glibc-headers-0:2.3.2-95.6.ia64",
"3ES:glibc-headers-0:2.3.2-95.6.ppc",
"3ES:glibc-headers-0:2.3.2-95.6.s390",
"3ES:glibc-headers-0:2.3.2-95.6.s390x",
"3ES:glibc-headers-0:2.3.2-95.6.x86_64",
"3ES:glibc-profile-0:2.3.2-95.6.i386",
"3ES:glibc-profile-0:2.3.2-95.6.ia64",
"3ES:glibc-profile-0:2.3.2-95.6.ppc",
"3ES:glibc-profile-0:2.3.2-95.6.s390",
"3ES:glibc-profile-0:2.3.2-95.6.s390x",
"3ES:glibc-profile-0:2.3.2-95.6.x86_64",
"3ES:glibc-utils-0:2.3.2-95.6.i386",
"3ES:glibc-utils-0:2.3.2-95.6.ia64",
"3ES:glibc-utils-0:2.3.2-95.6.ppc",
"3ES:glibc-utils-0:2.3.2-95.6.s390",
"3ES:glibc-utils-0:2.3.2-95.6.s390x",
"3ES:glibc-utils-0:2.3.2-95.6.x86_64",
"3ES:nptl-devel-0:2.3.2-95.6.i686",
"3ES:nptl-devel-0:2.3.2-95.6.ia64",
"3ES:nptl-devel-0:2.3.2-95.6.ppc",
"3ES:nptl-devel-0:2.3.2-95.6.s390",
"3ES:nptl-devel-0:2.3.2-95.6.s390x",
"3ES:nptl-devel-0:2.3.2-95.6.x86_64",
"3ES:nscd-0:2.3.2-95.6.i386",
"3ES:nscd-0:2.3.2-95.6.ia64",
"3ES:nscd-0:2.3.2-95.6.ppc",
"3ES:nscd-0:2.3.2-95.6.s390",
"3ES:nscd-0:2.3.2-95.6.s390x",
"3ES:nscd-0:2.3.2-95.6.x86_64",
"3WS:glibc-0:2.3.2-95.6.i386",
"3WS:glibc-0:2.3.2-95.6.i686",
"3WS:glibc-0:2.3.2-95.6.ia64",
"3WS:glibc-0:2.3.2-95.6.ppc",
"3WS:glibc-0:2.3.2-95.6.ppc64",
"3WS:glibc-0:2.3.2-95.6.s390",
"3WS:glibc-0:2.3.2-95.6.s390x",
"3WS:glibc-0:2.3.2-95.6.src",
"3WS:glibc-0:2.3.2-95.6.x86_64",
"3WS:glibc-common-0:2.3.2-95.6.i386",
"3WS:glibc-common-0:2.3.2-95.6.ia64",
"3WS:glibc-common-0:2.3.2-95.6.ppc",
"3WS:glibc-common-0:2.3.2-95.6.s390",
"3WS:glibc-common-0:2.3.2-95.6.s390x",
"3WS:glibc-common-0:2.3.2-95.6.x86_64",
"3WS:glibc-debuginfo-0:2.3.2-95.6.i386",
"3WS:glibc-debuginfo-0:2.3.2-95.6.i686",
"3WS:glibc-debuginfo-0:2.3.2-95.6.ia64",
"3WS:glibc-debuginfo-0:2.3.2-95.6.ppc",
"3WS:glibc-debuginfo-0:2.3.2-95.6.ppc64",
"3WS:glibc-debuginfo-0:2.3.2-95.6.s390",
"3WS:glibc-debuginfo-0:2.3.2-95.6.s390x",
"3WS:glibc-debuginfo-0:2.3.2-95.6.x86_64",
"3WS:glibc-debuginfo-common-0:2.3.2-95.6.i386",
"3WS:glibc-devel-0:2.3.2-95.6.i386",
"3WS:glibc-devel-0:2.3.2-95.6.ia64",
"3WS:glibc-devel-0:2.3.2-95.6.ppc",
"3WS:glibc-devel-0:2.3.2-95.6.ppc64",
"3WS:glibc-devel-0:2.3.2-95.6.s390",
"3WS:glibc-devel-0:2.3.2-95.6.s390x",
"3WS:glibc-devel-0:2.3.2-95.6.x86_64",
"3WS:glibc-headers-0:2.3.2-95.6.i386",
"3WS:glibc-headers-0:2.3.2-95.6.ia64",
"3WS:glibc-headers-0:2.3.2-95.6.ppc",
"3WS:glibc-headers-0:2.3.2-95.6.s390",
"3WS:glibc-headers-0:2.3.2-95.6.s390x",
"3WS:glibc-headers-0:2.3.2-95.6.x86_64",
"3WS:glibc-profile-0:2.3.2-95.6.i386",
"3WS:glibc-profile-0:2.3.2-95.6.ia64",
"3WS:glibc-profile-0:2.3.2-95.6.ppc",
"3WS:glibc-profile-0:2.3.2-95.6.s390",
"3WS:glibc-profile-0:2.3.2-95.6.s390x",
"3WS:glibc-profile-0:2.3.2-95.6.x86_64",
"3WS:glibc-utils-0:2.3.2-95.6.i386",
"3WS:glibc-utils-0:2.3.2-95.6.ia64",
"3WS:glibc-utils-0:2.3.2-95.6.ppc",
"3WS:glibc-utils-0:2.3.2-95.6.s390",
"3WS:glibc-utils-0:2.3.2-95.6.s390x",
"3WS:glibc-utils-0:2.3.2-95.6.x86_64",
"3WS:nptl-devel-0:2.3.2-95.6.i686",
"3WS:nptl-devel-0:2.3.2-95.6.ia64",
"3WS:nptl-devel-0:2.3.2-95.6.ppc",
"3WS:nptl-devel-0:2.3.2-95.6.s390",
"3WS:nptl-devel-0:2.3.2-95.6.s390x",
"3WS:nptl-devel-0:2.3.2-95.6.x86_64",
"3WS:nscd-0:2.3.2-95.6.i386",
"3WS:nscd-0:2.3.2-95.6.ia64",
"3WS:nscd-0:2.3.2-95.6.ppc",
"3WS:nscd-0:2.3.2-95.6.s390",
"3WS:nscd-0:2.3.2-95.6.s390x",
"3WS:nscd-0:2.3.2-95.6.x86_64",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run the following\ncommand at a shell prompt:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. On the i686\narchitecture, *.i686.rpm packages should be installed where available\nrather than *.i386.rpm.\n\nIf you are unsure which architecture you are on, run the following\ncommand at a shell prompt:\n\nrpm -q --qf '%{arch}\\n' glibc\n\nOnly those RPMs which are currently installed will be updated. Those RPMs\nwhich are not installed but included in the list will not be updated.\nNote that you can also use wildcards (*.rpm) if your current directory\nonly contains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate\nErrors, you need to install a version of the up2date client with an updated\ncertificate. The latest version of up2date is available from the Red Hat\nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-11-14T15:19:00+00:00",
"2003-11-12T16:19:00+00:00"
] |
|
CVE-2003-0858 | security flaw | Low | null | null | Zebra 0.93b and earlier, and quagga before 0.95, allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface. | null | 2025-01-08T19:59:50+00:00 | [
"3AS:quagga-0:0.96.2-8.3E.i386",
"3AS:quagga-0:0.96.2-8.3E.ia64",
"3AS:quagga-0:0.96.2-8.3E.ppc",
"3AS:quagga-0:0.96.2-8.3E.s390",
"3AS:quagga-0:0.96.2-8.3E.s390x",
"3AS:quagga-0:0.96.2-8.3E.src",
"3AS:quagga-0:0.96.2-8.3E.x86_64",
"3AS:quagga-debuginfo-0:0.96.2-8.3E.i386",
"3AS:quagga-debuginfo-0:0.96.2-8.3E.ia64",
"3AS:quagga-debuginfo-0:0.96.2-8.3E.ppc",
"3AS:quagga-debuginfo-0:0.96.2-8.3E.s390",
"3AS:quagga-debuginfo-0:0.96.2-8.3E.s390x",
"3AS:quagga-debuginfo-0:0.96.2-8.3E.x86_64",
"3ES:quagga-0:0.96.2-8.3E.i386",
"3ES:quagga-0:0.96.2-8.3E.ia64",
"3ES:quagga-0:0.96.2-8.3E.ppc",
"3ES:quagga-0:0.96.2-8.3E.s390",
"3ES:quagga-0:0.96.2-8.3E.s390x",
"3ES:quagga-0:0.96.2-8.3E.src",
"3ES:quagga-0:0.96.2-8.3E.x86_64",
"3ES:quagga-debuginfo-0:0.96.2-8.3E.i386",
"3ES:quagga-debuginfo-0:0.96.2-8.3E.ia64",
"3ES:quagga-debuginfo-0:0.96.2-8.3E.ppc",
"3ES:quagga-debuginfo-0:0.96.2-8.3E.s390",
"3ES:quagga-debuginfo-0:0.96.2-8.3E.s390x",
"3ES:quagga-debuginfo-0:0.96.2-8.3E.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-11-12T14:16:00+00:00",
"2003-11-12T14:08:00+00:00",
"2003-11-13T08:34:00+00:00"
] |
|
CVE-2003-0788 | security flaw | Moderate | null | null | Unknown vulnerability in the Internet Printing Protocol (IPP) implementation in CUPS before 1.1.19 allows remote attackers to cause a denial of service (CPU consumption from a "busy loop") via certain inputs to the IPP port (TCP 631). | null | 2025-01-08T20:01:10+00:00 | [
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-11-03T09:25:00+00:00"
] |
|
CVE-2003-0730 | security flaw | Important | null | null | Multiple integer overflows in the font libraries for XFree86 4.3.0 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks. | null | 2025-01-08T19:59:56+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-11-12T14:12:00+00:00",
"2003-11-25T09:22:00+00:00",
"2003-11-25T09:54:00+00:00",
"2003-11-17T20:25:00+00:00"
] |
|
CVE-2003-0073 | security flaw | Important | null | null | Double-free vulnerability in mysqld for MySQL before 3.23.55 allows attackers with MySQL access to cause a denial of service (crash) via mysql_change_user. | null | 2025-01-08T20:05:42+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-04-28T12:53:00+00:00",
"2003-04-29T18:58:00+00:00"
] |
|
CVE-2003-0136 | security flaw | None | null | null | psbanner in the LPRng package allows local users to overwrite arbitrary files via a symbolic link attack on the /tmp/before file. | null | 2025-01-08T20:04:26+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-22T17:32:00+00:00",
"2003-04-24T20:55:00+00:00"
] |
|
CVE-2003-0927 | security flaw | Moderate | null | null | Heap-based buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the SOCKS dissector. | null | 2025-01-08T19:59:06+00:00 | [
"3AS:ethereal-0:0.9.16-0.30E.1.i386",
"3AS:ethereal-0:0.9.16-0.30E.1.ia64",
"3AS:ethereal-0:0.9.16-0.30E.1.ppc",
"3AS:ethereal-0:0.9.16-0.30E.1.s390",
"3AS:ethereal-0:0.9.16-0.30E.1.s390x",
"3AS:ethereal-0:0.9.16-0.30E.1.src",
"3AS:ethereal-0:0.9.16-0.30E.1.x86_64",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.i386",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.ia64",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.ppc",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.s390",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.s390x",
"3AS:ethereal-gnome-0:0.9.16-0.30E.1.x86_64",
"3Desktop:ethereal-0:0.9.16-0.30E.1.i386",
"3Desktop:ethereal-0:0.9.16-0.30E.1.ia64",
"3Desktop:ethereal-0:0.9.16-0.30E.1.ppc",
"3Desktop:ethereal-0:0.9.16-0.30E.1.s390",
"3Desktop:ethereal-0:0.9.16-0.30E.1.s390x",
"3Desktop:ethereal-0:0.9.16-0.30E.1.src",
"3Desktop:ethereal-0:0.9.16-0.30E.1.x86_64",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.i386",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.ia64",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.ppc",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.s390",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.s390x",
"3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.x86_64",
"3ES:ethereal-0:0.9.16-0.30E.1.i386",
"3ES:ethereal-0:0.9.16-0.30E.1.ia64",
"3ES:ethereal-0:0.9.16-0.30E.1.ppc",
"3ES:ethereal-0:0.9.16-0.30E.1.s390",
"3ES:ethereal-0:0.9.16-0.30E.1.s390x",
"3ES:ethereal-0:0.9.16-0.30E.1.src",
"3ES:ethereal-0:0.9.16-0.30E.1.x86_64",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.i386",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.ia64",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.ppc",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.s390",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.s390x",
"3ES:ethereal-gnome-0:0.9.16-0.30E.1.x86_64",
"3WS:ethereal-0:0.9.16-0.30E.1.i386",
"3WS:ethereal-0:0.9.16-0.30E.1.ia64",
"3WS:ethereal-0:0.9.16-0.30E.1.ppc",
"3WS:ethereal-0:0.9.16-0.30E.1.s390",
"3WS:ethereal-0:0.9.16-0.30E.1.s390x",
"3WS:ethereal-0:0.9.16-0.30E.1.src",
"3WS:ethereal-0:0.9.16-0.30E.1.x86_64",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.i386",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.ia64",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.ppc",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.s390",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.s390x",
"3WS:ethereal-gnome-0:0.9.16-0.30E.1.x86_64",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-11-12T14:05:00+00:00",
"2003-11-10T17:53:00+00:00"
] |
|
CVE-2003-0161 | security flaw | Critical | null | null | The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. | null | 2025-01-08T20:05:00+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-31T15:23:00+00:00",
"2003-03-31T17:14:00+00:00"
] |
|
CVE-2003-0248 | security flaw | Moderate | null | null | The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. | null | 2025-01-08T20:06:08+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system."
] | [
"2003-06-19T13:55:00+00:00",
"2003-06-03T10:40:00+00:00"
] |
|
CVE-2003-0618 | leaks file existance information | Low | null | null | Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions. | The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/
This issue does not affect Red Hat Enterprise Linux 4. | 2025-01-07T21:21:25+00:00 | [
"Red Hat Desktop version 3",
"Red Hat Enterprise Linux AS version 3",
"Red Hat Enterprise Linux ES version 3",
"Red Hat Enterprise Linux WS version 3"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2006-07-20T00:00:00+00:00"
] |
|
CVE-2003-0462 | security flaw | Important | null | null | A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash). | null | 2025-01-08T20:06:52+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system."
] | [
"2003-08-21T17:40:00+00:00",
"2003-08-21T17:23:00+00:00",
"2003-07-21T15:36:00+00:00"
] |
|
CVE-2003-0966 | security flaw | Important | null | null | Buffer overflow in the frm command in elm 2.5.6 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code via a long Subject line. | null | 2025-01-08T19:58:42+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2004-01-14T13:16:00+00:00"
] |
|
CVE-2003-0989 | security flaw | Moderate | null | null | tcpdump before 3.8.1 allows remote attackers to cause a denial of service (infinite loop) via certain ISAKMP packets, a different vulnerability than CVE-2004-0057. | null | 2025-01-08T19:58:42+00:00 | [
"2.1AS:arpwatch-14:2.1a11-12.2.1AS.5.i386",
"2.1AS:arpwatch-14:2.1a11-12.2.1AS.5.ia64",
"2.1AS:libpcap-14:0.6.2-12.2.1AS.5.i386",
"2.1AS:libpcap-14:0.6.2-12.2.1AS.5.ia64",
"2.1AS:tcpdump-14:3.6.2-12.2.1AS.5.i386",
"2.1AS:tcpdump-14:3.6.2-12.2.1AS.5.ia64",
"2.1AS:tcpdump-14:3.6.2-12.2.1AS.5.src",
"2.1AW:arpwatch-14:2.1a11-12.2.1AS.5.i386",
"2.1AW:arpwatch-14:2.1a11-12.2.1AS.5.ia64",
"2.1AW:libpcap-14:0.6.2-12.2.1AS.5.i386",
"2.1AW:libpcap-14:0.6.2-12.2.1AS.5.ia64",
"2.1AW:tcpdump-14:3.6.2-12.2.1AS.5.i386",
"2.1AW:tcpdump-14:3.6.2-12.2.1AS.5.ia64",
"2.1AW:tcpdump-14:3.6.2-12.2.1AS.5.src",
"2.1ES:arpwatch-14:2.1a11-12.2.1AS.5.i386",
"2.1ES:arpwatch-14:2.1a11-12.2.1AS.5.ia64",
"2.1ES:libpcap-14:0.6.2-12.2.1AS.5.i386",
"2.1ES:libpcap-14:0.6.2-12.2.1AS.5.ia64",
"2.1ES:tcpdump-14:3.6.2-12.2.1AS.5.i386",
"2.1ES:tcpdump-14:3.6.2-12.2.1AS.5.ia64",
"2.1ES:tcpdump-14:3.6.2-12.2.1AS.5.src",
"2.1WS:arpwatch-14:2.1a11-12.2.1AS.5.i386",
"2.1WS:arpwatch-14:2.1a11-12.2.1AS.5.ia64",
"2.1WS:libpcap-14:0.6.2-12.2.1AS.5.i386",
"2.1WS:libpcap-14:0.6.2-12.2.1AS.5.ia64",
"2.1WS:tcpdump-14:3.6.2-12.2.1AS.5.i386",
"2.1WS:tcpdump-14:3.6.2-12.2.1AS.5.ia64",
"2.1WS:tcpdump-14:3.6.2-12.2.1AS.5.src",
"3AS:libpcap-14:0.7.2-7.E3.1.i386",
"3AS:libpcap-14:0.7.2-7.E3.1.ia64",
"3AS:libpcap-14:0.7.2-7.E3.1.ppc",
"3AS:libpcap-14:0.7.2-7.E3.1.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.1.s390",
"3AS:libpcap-14:0.7.2-7.E3.1.s390x",
"3AS:libpcap-14:0.7.2-7.E3.1.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.1.i386",
"3AS:tcpdump-14:3.7.2-7.E3.1.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.1.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.1.s390",
"3AS:tcpdump-14:3.7.2-7.E3.1.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.1.src",
"3AS:tcpdump-14:3.7.2-7.E3.1.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.1.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.1.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.1.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.1.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.1.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.1.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.1.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.1.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.1.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.1.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.1.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.1.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.1.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.1.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.1.i386",
"3ES:libpcap-14:0.7.2-7.E3.1.ia64",
"3ES:libpcap-14:0.7.2-7.E3.1.ppc",
"3ES:libpcap-14:0.7.2-7.E3.1.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.1.s390",
"3ES:libpcap-14:0.7.2-7.E3.1.s390x",
"3ES:libpcap-14:0.7.2-7.E3.1.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.1.i386",
"3ES:tcpdump-14:3.7.2-7.E3.1.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.1.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.1.s390",
"3ES:tcpdump-14:3.7.2-7.E3.1.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.1.src",
"3ES:tcpdump-14:3.7.2-7.E3.1.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.1.i386",
"3WS:libpcap-14:0.7.2-7.E3.1.ia64",
"3WS:libpcap-14:0.7.2-7.E3.1.ppc",
"3WS:libpcap-14:0.7.2-7.E3.1.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.1.s390",
"3WS:libpcap-14:0.7.2-7.E3.1.s390x",
"3WS:libpcap-14:0.7.2-7.E3.1.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.1.i386",
"3WS:tcpdump-14:3.7.2-7.E3.1.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.1.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.1.s390",
"3WS:tcpdump-14:3.7.2-7.E3.1.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.1.src",
"3WS:tcpdump-14:3.7.2-7.E3.1.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.x86_64",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2004-01-15T10:31:00+00:00",
"2004-01-14T19:43:00+00:00"
] |
|
CVE-2003-1418 | httpd information disclosure in FileEtag | Low | 2.6/AV:N/AC:H/Au:N/C:P/I:N/A:N | null | Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID). | Red Hat does not consider this to be a security issue. The information returned poses no threat to the target machine running httpd. | 2025-01-08T04:10:35+00:00 | [] | [
"red_hat_enterprise_linux_4:httpd",
"red_hat_enterprise_linux_5:httpd",
"red_hat_enterprise_linux_6:httpd"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned"
] | [
"Will not fix"
] | [
null
] |
|
CVE-2003-0854 | security flaw | Important | null | null | ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd. | null | 2025-01-08T20:01:44+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-11-12T14:06:00+00:00",
"2003-11-03T15:26:00+00:00"
] |
|
CVE-2003-0442 | security flaw | None | null | null | Cross-site scripting (XSS) vulnerability in the transparent SID support capability for PHP before 4.3.2 (session.use_trans_sid) allows remote attackers to insert arbitrary script via the PHPSESSID parameter. | null | 2025-01-08T20:04:12+00:00 | [
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-07-02T15:30:00+00:00"
] |
|
CVE-2003-0550 | security flaw | Moderate | null | null | The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows attackers to modify the bridge topology. | null | 2025-01-08T20:01:58+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system."
] | [
"2003-08-21T17:40:00+00:00",
"2003-08-21T17:23:00+00:00",
"2003-07-21T15:36:00+00:00"
] |
|
CVE-2003-0546 | security flaw | None | null | null | up2date 3.0.7 and 3.1.23 does not properly verify RPM GPG signatures, which could allow remote attackers to cause unsigned packages to be installed from the Red Hat Network, if that network is compromised. | null | 2025-01-08T19:58:00+00:00 | [
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-08-08T16:32:00+00:00"
] |
|
CVE-2003-0356 | security flaw | Moderate | null | null | Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not properly use the tvb_get_nstringz and tvb_get_nstringz0 functions. | null | 2025-01-08T20:09:19+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-07-08T19:59:00+00:00",
"2003-07-03T08:31:00+00:00"
] |
|
CVE-2003-0244 | security flaw | Important | null | null | The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions. | null | 2025-01-08T20:06:02+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2003-05-27T18:52:00+00:00",
"2003-05-30T01:33:00+00:00",
"2003-06-25T17:45:00+00:00"
] |
|
CVE-2003-0028 | security flaw | Critical | null | null | Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391. | null | 2025-01-08T20:06:24+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-27T19:43:00+00:00",
"2003-03-26T21:49:00+00:00",
"2003-04-02T09:57:00+00:00"
] |
|
CVE-2003-0252 | security flaw | Important | null | null | Off-by-one error in the xlog function of mountd in the Linux NFS utils package (nfs-utils) before 1.0.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain RPC requests to mountd that do not contain newlines. | This issue has been addressed in nfs-utils packages as shipped in Red Hat
Enterprise Linux 2 via https://rhn.redhat.com/errata/RHSA-2003-207.html. | 2025-01-08T13:35:49+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-07-14T16:08:00+00:00",
"2003-07-14T16:10:00+00:00"
] |
|
CVE-2003-1013 | security flaw | Low | null | null | The Q.931 dissector in Ethereal before 0.10.0, and Tethereal, allows remote attackers to cause a denial of service (crash) via a malformed Q.931, which triggers a null dereference. | null | 2025-01-08T20:01:04+00:00 | [
"3AS:ethereal-0:0.10.0a-0.30E.1.i386",
"3AS:ethereal-0:0.10.0a-0.30E.1.ia64",
"3AS:ethereal-0:0.10.0a-0.30E.1.ppc",
"3AS:ethereal-0:0.10.0a-0.30E.1.s390",
"3AS:ethereal-0:0.10.0a-0.30E.1.s390x",
"3AS:ethereal-0:0.10.0a-0.30E.1.src",
"3AS:ethereal-0:0.10.0a-0.30E.1.x86_64",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.i386",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.ia64",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.ppc",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.s390",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.s390x",
"3AS:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.i386",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.ia64",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.ppc",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.s390",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.s390x",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.src",
"3Desktop:ethereal-0:0.10.0a-0.30E.1.x86_64",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.i386",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.ia64",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.ppc",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.s390",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.s390x",
"3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64",
"3ES:ethereal-0:0.10.0a-0.30E.1.i386",
"3ES:ethereal-0:0.10.0a-0.30E.1.ia64",
"3ES:ethereal-0:0.10.0a-0.30E.1.ppc",
"3ES:ethereal-0:0.10.0a-0.30E.1.s390",
"3ES:ethereal-0:0.10.0a-0.30E.1.s390x",
"3ES:ethereal-0:0.10.0a-0.30E.1.src",
"3ES:ethereal-0:0.10.0a-0.30E.1.x86_64",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.i386",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.ia64",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.ppc",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.s390",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.s390x",
"3ES:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64",
"3WS:ethereal-0:0.10.0a-0.30E.1.i386",
"3WS:ethereal-0:0.10.0a-0.30E.1.ia64",
"3WS:ethereal-0:0.10.0a-0.30E.1.ppc",
"3WS:ethereal-0:0.10.0a-0.30E.1.s390",
"3WS:ethereal-0:0.10.0a-0.30E.1.s390x",
"3WS:ethereal-0:0.10.0a-0.30E.1.src",
"3WS:ethereal-0:0.10.0a-0.30E.1.x86_64",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.i386",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.ia64",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.ppc",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.s390",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.s390x",
"3WS:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2004-01-20T16:45:00+00:00",
"2004-01-07T18:12:00+00:00"
] |
|
CVE-2003-0194 | security flaw | None | null | null | tcpdump does not properly drop privileges to the pcap user when starting up. | null | 2025-01-08T20:04:31+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-06-09T13:44:00+00:00",
"2003-05-15T08:00:00+00:00"
] |
|
CVE-2003-0985 | security flaw | Important | null | null | The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077. | null | 2025-01-07T23:17:31+00:00 | [
"3AS:kernel-0:2.4.21-4.0.2.EL.athlon",
"3AS:kernel-0:2.4.21-4.0.2.EL.i686",
"3AS:kernel-0:2.4.21-4.0.2.EL.ia64",
"3AS:kernel-0:2.4.21-4.0.2.EL.ppc64iseries",
"3AS:kernel-0:2.4.21-4.0.2.EL.ppc64pseries",
"3AS:kernel-0:2.4.21-4.0.2.EL.s390",
"3AS:kernel-0:2.4.21-4.0.2.EL.s390x",
"3AS:kernel-0:2.4.21-4.0.2.EL.src",
"3AS:kernel-0:2.4.21-4.0.2.EL.x86_64",
"3AS:kernel-BOOT-0:2.4.21-4.0.2.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.athlon",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.i686",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ia64",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64iseries",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64pseries",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390x",
"3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.x86_64",
"3AS:kernel-doc-0:2.4.21-4.0.2.EL.i386",
"3AS:kernel-doc-0:2.4.21-4.0.2.EL.ia64",
"3AS:kernel-doc-0:2.4.21-4.0.2.EL.ppc64",
"3AS:kernel-doc-0:2.4.21-4.0.2.EL.s390",
"3AS:kernel-doc-0:2.4.21-4.0.2.EL.s390x",
"3AS:kernel-doc-0:2.4.21-4.0.2.EL.x86_64",
"3AS:kernel-hugemem-0:2.4.21-4.0.2.EL.i686",
"3AS:kernel-hugemem-unsupported-0:2.4.21-4.0.2.EL.i686",
"3AS:kernel-smp-0:2.4.21-4.0.2.EL.athlon",
"3AS:kernel-smp-0:2.4.21-4.0.2.EL.i686",
"3AS:kernel-smp-0:2.4.21-4.0.2.EL.x86_64",
"3AS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.athlon",
"3AS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.i686",
"3AS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.x86_64",
"3AS:kernel-source-0:2.4.21-4.0.2.EL.i386",
"3AS:kernel-source-0:2.4.21-4.0.2.EL.ia64",
"3AS:kernel-source-0:2.4.21-4.0.2.EL.ppc64",
"3AS:kernel-source-0:2.4.21-4.0.2.EL.s390",
"3AS:kernel-source-0:2.4.21-4.0.2.EL.s390x",
"3AS:kernel-source-0:2.4.21-4.0.2.EL.x86_64",
"3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.athlon",
"3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.i686",
"3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.ia64",
"3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64iseries",
"3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64pseries",
"3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.s390",
"3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.s390x",
"3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.x86_64",
"3Desktop:kernel-0:2.4.21-4.0.2.EL.athlon",
"3Desktop:kernel-0:2.4.21-4.0.2.EL.i686",
"3Desktop:kernel-0:2.4.21-4.0.2.EL.ia64",
"3Desktop:kernel-0:2.4.21-4.0.2.EL.ppc64iseries",
"3Desktop:kernel-0:2.4.21-4.0.2.EL.ppc64pseries",
"3Desktop:kernel-0:2.4.21-4.0.2.EL.s390",
"3Desktop:kernel-0:2.4.21-4.0.2.EL.s390x",
"3Desktop:kernel-0:2.4.21-4.0.2.EL.src",
"3Desktop:kernel-0:2.4.21-4.0.2.EL.x86_64",
"3Desktop:kernel-BOOT-0:2.4.21-4.0.2.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.athlon",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.i686",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.ia64",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64iseries",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64pseries",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390x",
"3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.x86_64",
"3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.i386",
"3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.ia64",
"3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.ppc64",
"3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.s390",
"3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.s390x",
"3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.x86_64",
"3Desktop:kernel-hugemem-0:2.4.21-4.0.2.EL.i686",
"3Desktop:kernel-hugemem-unsupported-0:2.4.21-4.0.2.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-4.0.2.EL.athlon",
"3Desktop:kernel-smp-0:2.4.21-4.0.2.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-4.0.2.EL.x86_64",
"3Desktop:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.athlon",
"3Desktop:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.i686",
"3Desktop:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.x86_64",
"3Desktop:kernel-source-0:2.4.21-4.0.2.EL.i386",
"3Desktop:kernel-source-0:2.4.21-4.0.2.EL.ia64",
"3Desktop:kernel-source-0:2.4.21-4.0.2.EL.ppc64",
"3Desktop:kernel-source-0:2.4.21-4.0.2.EL.s390",
"3Desktop:kernel-source-0:2.4.21-4.0.2.EL.s390x",
"3Desktop:kernel-source-0:2.4.21-4.0.2.EL.x86_64",
"3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.athlon",
"3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.i686",
"3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.ia64",
"3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64iseries",
"3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64pseries",
"3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.s390",
"3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.s390x",
"3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.x86_64",
"3ES:kernel-0:2.4.21-4.0.2.EL.athlon",
"3ES:kernel-0:2.4.21-4.0.2.EL.i686",
"3ES:kernel-0:2.4.21-4.0.2.EL.ia64",
"3ES:kernel-0:2.4.21-4.0.2.EL.ppc64iseries",
"3ES:kernel-0:2.4.21-4.0.2.EL.ppc64pseries",
"3ES:kernel-0:2.4.21-4.0.2.EL.s390",
"3ES:kernel-0:2.4.21-4.0.2.EL.s390x",
"3ES:kernel-0:2.4.21-4.0.2.EL.src",
"3ES:kernel-0:2.4.21-4.0.2.EL.x86_64",
"3ES:kernel-BOOT-0:2.4.21-4.0.2.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.athlon",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.i686",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.ia64",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64iseries",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64pseries",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390x",
"3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.x86_64",
"3ES:kernel-doc-0:2.4.21-4.0.2.EL.i386",
"3ES:kernel-doc-0:2.4.21-4.0.2.EL.ia64",
"3ES:kernel-doc-0:2.4.21-4.0.2.EL.ppc64",
"3ES:kernel-doc-0:2.4.21-4.0.2.EL.s390",
"3ES:kernel-doc-0:2.4.21-4.0.2.EL.s390x",
"3ES:kernel-doc-0:2.4.21-4.0.2.EL.x86_64",
"3ES:kernel-hugemem-0:2.4.21-4.0.2.EL.i686",
"3ES:kernel-hugemem-unsupported-0:2.4.21-4.0.2.EL.i686",
"3ES:kernel-smp-0:2.4.21-4.0.2.EL.athlon",
"3ES:kernel-smp-0:2.4.21-4.0.2.EL.i686",
"3ES:kernel-smp-0:2.4.21-4.0.2.EL.x86_64",
"3ES:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.athlon",
"3ES:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.i686",
"3ES:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.x86_64",
"3ES:kernel-source-0:2.4.21-4.0.2.EL.i386",
"3ES:kernel-source-0:2.4.21-4.0.2.EL.ia64",
"3ES:kernel-source-0:2.4.21-4.0.2.EL.ppc64",
"3ES:kernel-source-0:2.4.21-4.0.2.EL.s390",
"3ES:kernel-source-0:2.4.21-4.0.2.EL.s390x",
"3ES:kernel-source-0:2.4.21-4.0.2.EL.x86_64",
"3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.athlon",
"3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.i686",
"3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.ia64",
"3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64iseries",
"3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64pseries",
"3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.s390",
"3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.s390x",
"3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.x86_64",
"3WS:kernel-0:2.4.21-4.0.2.EL.athlon",
"3WS:kernel-0:2.4.21-4.0.2.EL.i686",
"3WS:kernel-0:2.4.21-4.0.2.EL.ia64",
"3WS:kernel-0:2.4.21-4.0.2.EL.ppc64iseries",
"3WS:kernel-0:2.4.21-4.0.2.EL.ppc64pseries",
"3WS:kernel-0:2.4.21-4.0.2.EL.s390",
"3WS:kernel-0:2.4.21-4.0.2.EL.s390x",
"3WS:kernel-0:2.4.21-4.0.2.EL.src",
"3WS:kernel-0:2.4.21-4.0.2.EL.x86_64",
"3WS:kernel-BOOT-0:2.4.21-4.0.2.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.athlon",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.i686",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ia64",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64iseries",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64pseries",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390x",
"3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.x86_64",
"3WS:kernel-doc-0:2.4.21-4.0.2.EL.i386",
"3WS:kernel-doc-0:2.4.21-4.0.2.EL.ia64",
"3WS:kernel-doc-0:2.4.21-4.0.2.EL.ppc64",
"3WS:kernel-doc-0:2.4.21-4.0.2.EL.s390",
"3WS:kernel-doc-0:2.4.21-4.0.2.EL.s390x",
"3WS:kernel-doc-0:2.4.21-4.0.2.EL.x86_64",
"3WS:kernel-hugemem-0:2.4.21-4.0.2.EL.i686",
"3WS:kernel-hugemem-unsupported-0:2.4.21-4.0.2.EL.i686",
"3WS:kernel-smp-0:2.4.21-4.0.2.EL.athlon",
"3WS:kernel-smp-0:2.4.21-4.0.2.EL.i686",
"3WS:kernel-smp-0:2.4.21-4.0.2.EL.x86_64",
"3WS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.athlon",
"3WS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.i686",
"3WS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.x86_64",
"3WS:kernel-source-0:2.4.21-4.0.2.EL.i386",
"3WS:kernel-source-0:2.4.21-4.0.2.EL.ia64",
"3WS:kernel-source-0:2.4.21-4.0.2.EL.ppc64",
"3WS:kernel-source-0:2.4.21-4.0.2.EL.s390",
"3WS:kernel-source-0:2.4.21-4.0.2.EL.s390x",
"3WS:kernel-source-0:2.4.21-4.0.2.EL.x86_64",
"3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.athlon",
"3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.i686",
"3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.ia64",
"3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64iseries",
"3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64pseries",
"3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.s390",
"3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.s390x",
"3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.x86_64",
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2004-01-07T18:20:00+00:00",
"2004-01-05T14:41:00+00:00",
"2004-01-05T14:51:00+00:00",
"2004-01-05T12:50:00+00:00"
] |
|
CVE-2003-0086 | security flaw | Moderate | null | null | The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown. | null | 2025-01-08T20:08:25+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-20T21:19:00+00:00",
"2003-03-18T00:56:00+00:00"
] |
|
CVE-2003-0432 | security flaw | Low | null | null | Ethereal 0.9.12 and earlier does not handle certain strings properly, with unknown consequences, in the (1) BGP, (2) WTP, (3) DNS, (4) 802.11, (5) ISAKMP, (6) WSP, (7) CLNP, (8) ISIS, and (9) RMI dissectors. | null | 2025-01-08T20:08:46+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-07-08T19:59:00+00:00",
"2003-07-03T08:31:00+00:00"
] |
|
CVE-2003-0961 | security flaw | Important | null | null | Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges. | null | 2025-01-08T19:59:28+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux AS version 3",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Enterprise Linux WS version 3",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system."
] | [
"2003-12-19T18:10:00+00:00",
"2003-12-02T00:00:00+00:00",
"2003-12-01T19:18:00+00:00",
"2003-12-02T03:28:00+00:00"
] |
|
CVE-2003-0127 | security flaw | Important | null | null | The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel. | null | 2025-01-08T20:05:13+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date."
] | [
"2003-03-21T08:53:00+00:00",
"2003-03-20T08:56:00+00:00",
"2003-03-17T16:11:00+00:00",
"2003-04-08T16:34:00+00:00",
"2003-05-27T18:52:00+00:00"
] |
|
CVE-2003-0465 | security flaw | Low | null | null | The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks. | null | 2025-01-08T20:02:12+00:00 | [
"3AS:kernel-0:2.4.21-15.EL.athlon",
"3AS:kernel-0:2.4.21-15.EL.i686",
"3AS:kernel-0:2.4.21-15.EL.ia32e",
"3AS:kernel-0:2.4.21-15.EL.ia64",
"3AS:kernel-0:2.4.21-15.EL.ppc64iseries",
"3AS:kernel-0:2.4.21-15.EL.ppc64pseries",
"3AS:kernel-0:2.4.21-15.EL.s390",
"3AS:kernel-0:2.4.21-15.EL.s390x",
"3AS:kernel-0:2.4.21-15.EL.src",
"3AS:kernel-0:2.4.21-15.EL.x86_64",
"3AS:kernel-BOOT-0:2.4.21-15.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.athlon",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.i386",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.i686",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ia32e",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ia64",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.s390",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.s390x",
"3AS:kernel-debuginfo-0:2.4.21-15.EL.x86_64",
"3AS:kernel-doc-0:2.4.21-15.EL.i386",
"3AS:kernel-doc-0:2.4.21-15.EL.ia64",
"3AS:kernel-doc-0:2.4.21-15.EL.ppc64",
"3AS:kernel-doc-0:2.4.21-15.EL.s390",
"3AS:kernel-doc-0:2.4.21-15.EL.s390x",
"3AS:kernel-doc-0:2.4.21-15.EL.x86_64",
"3AS:kernel-hugemem-0:2.4.21-15.EL.i686",
"3AS:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686",
"3AS:kernel-smp-0:2.4.21-15.EL.athlon",
"3AS:kernel-smp-0:2.4.21-15.EL.i686",
"3AS:kernel-smp-0:2.4.21-15.EL.x86_64",
"3AS:kernel-smp-unsupported-0:2.4.21-15.EL.athlon",
"3AS:kernel-smp-unsupported-0:2.4.21-15.EL.i686",
"3AS:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64",
"3AS:kernel-source-0:2.4.21-15.EL.i386",
"3AS:kernel-source-0:2.4.21-15.EL.ia64",
"3AS:kernel-source-0:2.4.21-15.EL.ppc64",
"3AS:kernel-source-0:2.4.21-15.EL.s390",
"3AS:kernel-source-0:2.4.21-15.EL.s390x",
"3AS:kernel-source-0:2.4.21-15.EL.x86_64",
"3AS:kernel-unsupported-0:2.4.21-15.EL.athlon",
"3AS:kernel-unsupported-0:2.4.21-15.EL.i686",
"3AS:kernel-unsupported-0:2.4.21-15.EL.ia32e",
"3AS:kernel-unsupported-0:2.4.21-15.EL.ia64",
"3AS:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries",
"3AS:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries",
"3AS:kernel-unsupported-0:2.4.21-15.EL.s390",
"3AS:kernel-unsupported-0:2.4.21-15.EL.s390x",
"3AS:kernel-unsupported-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-0:2.4.21-15.EL.i686",
"3Desktop:kernel-0:2.4.21-15.EL.ia32e",
"3Desktop:kernel-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-0:2.4.21-15.EL.ppc64iseries",
"3Desktop:kernel-0:2.4.21-15.EL.ppc64pseries",
"3Desktop:kernel-0:2.4.21-15.EL.s390",
"3Desktop:kernel-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-0:2.4.21-15.EL.src",
"3Desktop:kernel-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-BOOT-0:2.4.21-15.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.i386",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.i686",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ia32e",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.s390",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-debuginfo-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-doc-0:2.4.21-15.EL.i386",
"3Desktop:kernel-doc-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-doc-0:2.4.21-15.EL.ppc64",
"3Desktop:kernel-doc-0:2.4.21-15.EL.s390",
"3Desktop:kernel-doc-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-doc-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-hugemem-0:2.4.21-15.EL.i686",
"3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-smp-0:2.4.21-15.EL.i686",
"3Desktop:kernel-smp-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.i686",
"3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-source-0:2.4.21-15.EL.i386",
"3Desktop:kernel-source-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-source-0:2.4.21-15.EL.ppc64",
"3Desktop:kernel-source-0:2.4.21-15.EL.s390",
"3Desktop:kernel-source-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-source-0:2.4.21-15.EL.x86_64",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.athlon",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.i686",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.ia32e",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.ia64",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.s390",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.s390x",
"3Desktop:kernel-unsupported-0:2.4.21-15.EL.x86_64",
"3ES:kernel-0:2.4.21-15.EL.athlon",
"3ES:kernel-0:2.4.21-15.EL.i686",
"3ES:kernel-0:2.4.21-15.EL.ia32e",
"3ES:kernel-0:2.4.21-15.EL.ia64",
"3ES:kernel-0:2.4.21-15.EL.ppc64iseries",
"3ES:kernel-0:2.4.21-15.EL.ppc64pseries",
"3ES:kernel-0:2.4.21-15.EL.s390",
"3ES:kernel-0:2.4.21-15.EL.s390x",
"3ES:kernel-0:2.4.21-15.EL.src",
"3ES:kernel-0:2.4.21-15.EL.x86_64",
"3ES:kernel-BOOT-0:2.4.21-15.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.athlon",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.i386",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.i686",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ia32e",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ia64",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.s390",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.s390x",
"3ES:kernel-debuginfo-0:2.4.21-15.EL.x86_64",
"3ES:kernel-doc-0:2.4.21-15.EL.i386",
"3ES:kernel-doc-0:2.4.21-15.EL.ia64",
"3ES:kernel-doc-0:2.4.21-15.EL.ppc64",
"3ES:kernel-doc-0:2.4.21-15.EL.s390",
"3ES:kernel-doc-0:2.4.21-15.EL.s390x",
"3ES:kernel-doc-0:2.4.21-15.EL.x86_64",
"3ES:kernel-hugemem-0:2.4.21-15.EL.i686",
"3ES:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686",
"3ES:kernel-smp-0:2.4.21-15.EL.athlon",
"3ES:kernel-smp-0:2.4.21-15.EL.i686",
"3ES:kernel-smp-0:2.4.21-15.EL.x86_64",
"3ES:kernel-smp-unsupported-0:2.4.21-15.EL.athlon",
"3ES:kernel-smp-unsupported-0:2.4.21-15.EL.i686",
"3ES:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64",
"3ES:kernel-source-0:2.4.21-15.EL.i386",
"3ES:kernel-source-0:2.4.21-15.EL.ia64",
"3ES:kernel-source-0:2.4.21-15.EL.ppc64",
"3ES:kernel-source-0:2.4.21-15.EL.s390",
"3ES:kernel-source-0:2.4.21-15.EL.s390x",
"3ES:kernel-source-0:2.4.21-15.EL.x86_64",
"3ES:kernel-unsupported-0:2.4.21-15.EL.athlon",
"3ES:kernel-unsupported-0:2.4.21-15.EL.i686",
"3ES:kernel-unsupported-0:2.4.21-15.EL.ia32e",
"3ES:kernel-unsupported-0:2.4.21-15.EL.ia64",
"3ES:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries",
"3ES:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries",
"3ES:kernel-unsupported-0:2.4.21-15.EL.s390",
"3ES:kernel-unsupported-0:2.4.21-15.EL.s390x",
"3ES:kernel-unsupported-0:2.4.21-15.EL.x86_64",
"3WS:kernel-0:2.4.21-15.EL.athlon",
"3WS:kernel-0:2.4.21-15.EL.i686",
"3WS:kernel-0:2.4.21-15.EL.ia32e",
"3WS:kernel-0:2.4.21-15.EL.ia64",
"3WS:kernel-0:2.4.21-15.EL.ppc64iseries",
"3WS:kernel-0:2.4.21-15.EL.ppc64pseries",
"3WS:kernel-0:2.4.21-15.EL.s390",
"3WS:kernel-0:2.4.21-15.EL.s390x",
"3WS:kernel-0:2.4.21-15.EL.src",
"3WS:kernel-0:2.4.21-15.EL.x86_64",
"3WS:kernel-BOOT-0:2.4.21-15.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.athlon",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.i386",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.i686",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ia32e",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ia64",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.s390",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.s390x",
"3WS:kernel-debuginfo-0:2.4.21-15.EL.x86_64",
"3WS:kernel-doc-0:2.4.21-15.EL.i386",
"3WS:kernel-doc-0:2.4.21-15.EL.ia64",
"3WS:kernel-doc-0:2.4.21-15.EL.ppc64",
"3WS:kernel-doc-0:2.4.21-15.EL.s390",
"3WS:kernel-doc-0:2.4.21-15.EL.s390x",
"3WS:kernel-doc-0:2.4.21-15.EL.x86_64",
"3WS:kernel-hugemem-0:2.4.21-15.EL.i686",
"3WS:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686",
"3WS:kernel-smp-0:2.4.21-15.EL.athlon",
"3WS:kernel-smp-0:2.4.21-15.EL.i686",
"3WS:kernel-smp-0:2.4.21-15.EL.x86_64",
"3WS:kernel-smp-unsupported-0:2.4.21-15.EL.athlon",
"3WS:kernel-smp-unsupported-0:2.4.21-15.EL.i686",
"3WS:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64",
"3WS:kernel-source-0:2.4.21-15.EL.i386",
"3WS:kernel-source-0:2.4.21-15.EL.ia64",
"3WS:kernel-source-0:2.4.21-15.EL.ppc64",
"3WS:kernel-source-0:2.4.21-15.EL.s390",
"3WS:kernel-source-0:2.4.21-15.EL.s390x",
"3WS:kernel-source-0:2.4.21-15.EL.x86_64",
"3WS:kernel-unsupported-0:2.4.21-15.EL.athlon",
"3WS:kernel-unsupported-0:2.4.21-15.EL.i686",
"3WS:kernel-unsupported-0:2.4.21-15.EL.ia32e",
"3WS:kernel-unsupported-0:2.4.21-15.EL.ia64",
"3WS:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries",
"3WS:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries",
"3WS:kernel-unsupported-0:2.4.21-15.EL.s390",
"3WS:kernel-unsupported-0:2.4.21-15.EL.s390x",
"3WS:kernel-unsupported-0:2.4.21-15.EL.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2004-05-12T01:07:00+00:00"
] |
|
CVE-2003-0189 | security flaw | None | null | null | The authentication module for Apache 2.0.40 through 2.0.45 on Unix does not properly handle threads safely when using the crypt_r or crypt functions, which allows remote attackers to cause a denial of service (failed Basic authentication with valid usernames and passwords) when a threaded MPM is used. | null | 2025-01-08T20:04:26+00:00 | [
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-28T16:25:00+00:00"
] |
|
CVE-2003-0023 | security flaw | Important | null | null | The menuBar feature in rxvt 2.7.8 allows attackers to modify menu options and execute arbitrary commands via a certain character escape sequence that inserts the commands into the menu. | null | 2025-01-08T20:09:51+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-11T08:52:00+00:00",
"2003-03-17T13:44:00+00:00"
] |
|
CVE-2003-0977 | security flaw | Low | null | null | CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests. | null | 2025-01-08T19:58:23+00:00 | [
"3AS:cvs-0:1.11.2-14.i386",
"3AS:cvs-0:1.11.2-14.ia64",
"3AS:cvs-0:1.11.2-14.ppc",
"3AS:cvs-0:1.11.2-14.s390",
"3AS:cvs-0:1.11.2-14.s390x",
"3AS:cvs-0:1.11.2-14.src",
"3AS:cvs-0:1.11.2-14.x86_64",
"3Desktop:cvs-0:1.11.2-14.i386",
"3Desktop:cvs-0:1.11.2-14.ia64",
"3Desktop:cvs-0:1.11.2-14.ppc",
"3Desktop:cvs-0:1.11.2-14.s390",
"3Desktop:cvs-0:1.11.2-14.s390x",
"3Desktop:cvs-0:1.11.2-14.src",
"3Desktop:cvs-0:1.11.2-14.x86_64",
"3ES:cvs-0:1.11.2-14.i386",
"3ES:cvs-0:1.11.2-14.ia64",
"3ES:cvs-0:1.11.2-14.ppc",
"3ES:cvs-0:1.11.2-14.s390",
"3ES:cvs-0:1.11.2-14.s390x",
"3ES:cvs-0:1.11.2-14.src",
"3ES:cvs-0:1.11.2-14.x86_64",
"3WS:cvs-0:1.11.2-14.i386",
"3WS:cvs-0:1.11.2-14.ia64",
"3WS:cvs-0:1.11.2-14.ppc",
"3WS:cvs-0:1.11.2-14.s390",
"3WS:cvs-0:1.11.2-14.s390x",
"3WS:cvs-0:1.11.2-14.src",
"3WS:cvs-0:1.11.2-14.x86_64",
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2004-01-14T13:16:00+00:00",
"2004-01-12T15:44:00+00:00"
] |
|
CVE-2003-0131 | security flaw | Important | null | null | The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and 0.9.7a allow remote attackers to perform an unauthorized RSA private key operation via a modified Bleichenbacher attack that uses a large number of SSL or TLS connections using PKCS #1 v1.5 padding that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext, aka the "Klima-Pokorny-Rosa attack." | Red Hat Enterprise Linux 4 and 5 are not vulnerable to this issue as they both contain a backported patch. | 2025-01-08T13:35:31+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1",
"Red Hat Stronghold 3",
"Red Hat Stronghold 4"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"We have backported the security fixes for the versions of OpenSSL included\nin Stronghold 3. Stronghold 3.0 build code 3022 is now available, includes\nthese fixes, and can be downloaded from:\n\nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3.0, see:\n\nhttp://stronghold.redhat.com/support/upgrade-sh3.xml",
"Fixed Stronghold 4 packages are now available via the update agent service; run\n\n$ bin/agent\n\nfrom the Stronghold 4 install root to upgrade an existing Stronghold 4\ninstallation to the new package versions. After upgrading Stronghold, the\nserver must be completely restarted by running the following commands from\nthe install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nsee http://stronghold.redhat.com/support/upgrade-sh4"
] | [
"2003-03-31T12:00:00+00:00",
"2003-04-01T15:50:00+00:00",
"2003-04-15T13:13:00+00:00",
"2003-03-28T13:43:00+00:00"
] |
|
CVE-2003-0776 | security flaw | Moderate | null | null | saned in sane-backends 1.0.7 and earlier does not properly "check the validity of the RPC numbers it gets before getting the parameters," with unknown consequences. | null | 2025-01-08T20:00:22+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-10-07T15:52:00+00:00",
"2003-10-07T19:10:00+00:00"
] |
|
CVE-2003-0721 | security flaw | Important | null | null | Integer signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number. | null | 2025-01-08T19:57:17+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-09-11T06:48:00+00:00",
"2003-09-11T06:51:00+00:00"
] |
|
CVE-2003-0058 | security flaw | Moderate | null | null | MIT Kerberos V5 Key Distribution Center (KDC) before 1.2.5 allows remote authenticated attackers to cause a denial of service (crash) on KDCs within the same realm via a certain protocol request that causes a null dereference. | null | 2025-01-08T20:06:56+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-27T19:43:00+00:00",
"2003-03-26T21:49:00+00:00"
] |
|
CVE-2003-0367 | gzip | symlink attack on temporary files leads to arbitrary file overwrite | Moderate | null | 6.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N | znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files. | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. | 2025-01-07T23:04:44+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:gzip",
"red_hat_enterprise_linux_6:gzip",
"red_hat_enterprise_linux_7:gzip",
"red_hat_enterprise_linux_8:gzip"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2003-0388 | security flaw | Low | null | null | pam_wheel in Linux-PAM 0.78, with the trust option enabled and the use_uid option disabled, allows local users to spoof log entries and gain privileges by causing getlogin() to return a spoofed user name. | null | 2025-01-08T20:06:14+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] | [
"2004-08-18T15:12:00+00:00"
] |
|
CVE-2003-0019 | security flaw | None | null | null | uml_net in the kernel-utils package for Red Hat Linux 8.0 has incorrect setuid root privileges, which allows local users to modify network interfaces, e.g. by modifying ARP entries or placing interfaces into promiscuous mode. | null | 2025-01-08T20:05:50+00:00 | [
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nNote that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that you must select kernel-utils explicitly on default configurations\nof up2date."
] | [
"2003-02-07T18:15:00+00:00"
] |
|
CVE-2003-0594 | security flaw | Low | null | null | Mozilla allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Mozilla to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application. | null | 2025-01-08T20:03:18+00:00 | [
"Red Hat Linux 9"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2004-03-17T22:53:00+00:00"
] |
|
CVE-2003-0081 | security flaw | Moderate | null | null | Format string vulnerability in packet-socks.c of the SOCKS dissector for Ethereal 0.8.7 through 0.9.9 allows remote attackers to execute arbitrary code via SOCKS packets containing format string specifiers. | null | 2025-01-08T20:05:36+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-07-08T19:59:00+00:00",
"2003-04-23T20:20:00+00:00"
] |
|
CVE-2003-0039 | security flaw | None | null | null | ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count. | null | 2025-01-08T20:08:25+00:00 | [
"Red Hat Linux 8.0"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-31T17:20:00+00:00"
] |
|
CVE-2003-0255 | security flaw | Moderate | null | null | The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path. | null | 2025-01-08T20:04:28+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-06-23T12:24:00+00:00",
"2003-05-21T03:45:00+00:00"
] |
|
CVE-2003-0740 | security flaw | Important | null | null | Stunnel 4.00, and 3.24 and earlier, leaks a privileged file descriptor returned by listen(), which allows local users to hijack the Stunnel server. | null | 2025-01-08T20:00:10+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-11-12T14:06:00+00:00",
"2003-11-24T08:44:00+00:00"
] |
|
CVE-2003-0428 | security flaw | Low | null | null | Unknown vulnerability in the DCERPC (DCE/RPC) dissector in Ethereal 0.9.12 and earlier allows remote attackers to cause a denial of service (memory consumption) via a certain NDR string. | null | 2025-01-08T20:03:48+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-07-08T19:59:00+00:00",
"2003-07-03T08:31:00+00:00"
] |
|
CVE-2003-0078 | security flaw | Moderate | null | null | ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack." | null | 2025-01-08T20:07:05+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 6.2",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1",
"Red Hat Stronghold 3",
"Red Hat Stronghold 4"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"We have backported the security fixes for the versions of OpenSSL, Apache\nand PHP included in Stronghold 3. Stronghold 3.0 build code 3021 is now\navailable which includes these fixes, and can be downloaded from\nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3.0, see\nhttp://stronghold.redhat.com/support/upgrade-sh3.xml",
"Fixed Stronghold 4 packages are now available via the update agent service; run\n\n$ bin/agent\n\nfrom the Stronghold 4 install root to upgrade an existing Stronghold 4\ninstallation to the new package versions. After upgrading Stronghold, the\nserver must be completely restarted by running the following commands from\nthe install root:\n\n$ bin/stop-server\n$ bin/stop-tomcat\n$ bin/start-tomcat\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nsee http://stronghold.redhat.com/support/upgrade-sh4"
] | [
"2003-03-10T15:18:00+00:00",
"2003-03-06T15:10:00+00:00",
"2003-03-18T11:01:00+00:00",
"2003-03-03T09:16:00+00:00"
] |
|
CVE-2003-0644 | security flaw | Low | null | null | Kdbg 1.1.0 through 1.2.8 does not check permissions of the .kdbgrc file, which allows local users to execute arbitrary commands. | null | 2025-01-08T20:02:12+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/"
] | [
"2005-06-02T14:32:00+00:00"
] |
|
CVE-2003-0845 | JBoss HSQLDB component remote command injection | Moderate | null | null | Unknown vulnerability in the HSQLDB component in JBoss 3.2.1 and 3.0.8 on Java 1.4.x platforms, when running in the default configuration, allows remote attackers to conduct unauthorized activities and possibly execute arbitrary code via certain SQL statements to (1) TCP port 1701 in JBoss 3.2.1, and (2) port 1476 in JBoss 3.0.8. | null | 2025-01-09T02:00:33+00:00 | [
"5Client:hsqldb-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-1:1.8.0.4-3jpp.6.src",
"5Client:hsqldb-1:1.8.0.4-3jpp.6.x86_64",
"5Client:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.x86_64",
"5Client:hsqldb-demo-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-demo-1:1.8.0.4-3jpp.6.x86_64",
"5Client:hsqldb-javadoc-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-javadoc-1:1.8.0.4-3jpp.6.x86_64",
"5Client:hsqldb-manual-1:1.8.0.4-3jpp.6.i386",
"5Client:hsqldb-manual-1:1.8.0.4-3jpp.6.x86_64",
"5Client:openoffice.org-1:2.0.4-5.4.25.src",
"5Client:openoffice.org-base-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-base-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-calc-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-calc-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-core-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-core-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-debuginfo-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-debuginfo-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-draw-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-draw-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-emailmerge-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-emailmerge-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-graphicfilter-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-graphicfilter-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-impress-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-impress-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-javafilter-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-javafilter-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ar-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ar-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-bn-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-bn-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-de-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-de-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-es-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-es-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-fr-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-fr-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-it-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-it-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nl-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nl-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ru-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ru-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-sv-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-sv-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ur-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ur-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-math-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-math-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-pyuno-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-pyuno-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-testtools-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-testtools-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-writer-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-writer-1:2.0.4-5.4.25.x86_64",
"5Client:openoffice.org-xsltfilter-1:2.0.4-5.4.25.i386",
"5Client:openoffice.org-xsltfilter-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.src",
"5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:hsqldb-demo-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-demo-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:hsqldb-javadoc-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-javadoc-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:hsqldb-manual-1:1.8.0.4-3jpp.6.i386",
"5Server-DPAS:hsqldb-manual-1:1.8.0.4-3jpp.6.x86_64",
"5Server-DPAS:openoffice.org-1:2.0.4-5.4.25.src",
"5Server-DPAS:openoffice.org-base-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-base-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-calc-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-calc-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-core-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-core-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-debuginfo-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-debuginfo-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-draw-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-draw-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-emailmerge-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-emailmerge-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-graphicfilter-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-graphicfilter-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-impress-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-impress-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-javafilter-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-javafilter-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ar-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ar-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-bn-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-bn-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-de-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-de-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-es-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-es-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-fr-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-fr-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-it-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-it-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nl-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nl-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ru-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ru-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-sv-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-sv-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ur-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ur-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-math-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-math-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-pyuno-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-pyuno-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-testtools-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-testtools-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-writer-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-writer-1:2.0.4-5.4.25.x86_64",
"5Server-DPAS:openoffice.org-xsltfilter-1:2.0.4-5.4.25.i386",
"5Server-DPAS:openoffice.org-xsltfilter-1:2.0.4-5.4.25.x86_64"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix"
] | [
"Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188"
] | [
"2007-12-05T14:34:00+00:00"
] |
|
CVE-2003-0146 | security flaw | Important | null | null | Multiple vulnerabilities in NetPBM 9.20 and earlier, and possibly other versions, may allow remote attackers to cause a denial of service or execute arbitrary code via "maths overflow errors" such as (1) integer signedness errors or (2) integer overflows, which lead to buffer overflows. | null | 2025-01-08T20:07:17+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.0",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-03-31T15:31:00+00:00",
"2003-04-03T08:08:00+00:00"
] |
|
CVE-2003-0795 | security flaw | Important | null | null | The vty layer in Quagga before 0.96.4, and Zebra 0.93b and earlier, does not verify that sub-negotiation is taking place when processing the SE marker, which allows remote attackers to cause a denial of service (crash) via a malformed telnet command to the telnet CLI port, which may trigger a null dereference. | null | 2025-01-08T20:02:22+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-11-12T14:08:00+00:00",
"2003-11-13T08:34:00+00:00"
] |
|
CVE-2003-0541 | security flaw | None | null | null | gtkhtml before 1.1.10, as used in Evolution, allows remote attackers to cause a denial of service (crash) via a malformed message that causes a null pointer dereference. | null | 2025-01-08T20:01:28+00:00 | [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9"
] | [] | [] | [] | [] | [] | [] | [
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-09-09T13:05:00+00:00"
] |
|
CVE-2003-0107 | security flaw | Moderate | null | null | Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled without vsnprintf or when long inputs are truncated using vsnprintf, allows attackers to cause a denial of service or possibly execute arbitrary code. | null | 2025-01-08T20:07:11+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-05-22T17:13:00+00:00",
"2003-04-29T08:12:00+00:00"
] |
|
CVE-2003-0150 | security flaw | Important | null | null | MySQL 3.23.55 and earlier creates world-writeable files and allows mysql users to gain root privileges by using the "SELECT * INFO OUTFILE" operator to overwrite a configuration file and cause mysql to run as root upon restart, as demonstrated by modifying my.cnf. | null | 2025-01-08T20:08:11+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system."
] | [
"2003-04-28T12:53:00+00:00",
"2003-04-29T18:58:00+00:00"
] |
|
CVE-2003-0853 | security flaw | Moderate | null | null | An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd. | null | 2025-01-08T19:57:51+00:00 | [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux 7.1",
"Red Hat Linux 7.2",
"Red Hat Linux 7.3",
"Red Hat Linux 8.0",
"Red Hat Linux 9",
"Red Hat Linux Advanced Workstation 2.1"
] | [] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt"
] | [
"2003-11-12T14:06:00+00:00",
"2003-11-03T15:26:00+00:00"
] |
|
CVE-2003-1604 | kernel | Missing NULL pointer check in nf_nat_redirect_ipv4 | Moderate | 5.4/AV:N/AC:H/Au:N/C:N/I:N/A:C | null | The redirect_target function in net/ipv4/netfilter/ipt_REDIRECT.c in the Linux kernel before 2.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending packets to an interface that has a 0.0.0.0 IP address, a related issue to CVE-2015-8787. | null | 2025-01-08T22:38:16+00:00 | [] | [] | [
"red_hat_enterprise_linux_5:kernel",
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_mrg_2:realtime-kernel"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |