cve
stringlengths
13
16
affected_component
stringlengths
0
177
summary
stringlengths
0
227
severity
stringclasses
5 values
cvss_v2
stringclasses
244 values
cvss_v3
stringlengths
37
48
description
stringlengths
30
4k
statement
stringlengths
31
2.49k
release_date
stringlengths
25
25
fixed_products
sequencelengths
0
28.2k
known_affected_products
sequencelengths
0
597
known_not_affected_products
sequencelengths
0
30k
under_investigation_products
sequencelengths
0
77
threat_categories
sequencelengths
0
4
threat_details
sequencelengths
0
4
threat_dates
sequencelengths
0
4
remediation_categories
sequencelengths
0
215
remediation_details
sequencelengths
0
215
remediation_dates
sequencelengths
0
215
CVE-2003-0548
security flaw
Low
null
null
The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549.
null
2025-01-08T19:57:44+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-08-21T16:10:00+00:00", "2003-08-21T19:16:00+00:00" ]
CVE-2003-0159
security flaw
Moderate
null
null
Heap-based buffer overflow in the NTLMSSP code for Ethereal 0.9.9 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code.
null
2025-01-08T20:09:03+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-07-08T19:59:00+00:00", "2003-04-23T20:20:00+00:00" ]
CVE-2003-0084
security flaw
Important
null
null
mod_auth_any package in Red Hat Enterprise Linux 2.1 and other operating systems does not properly escape arguments when calling other programs, which allows attackers to execute arbitrary commands via shell metacharacters.
null
2025-01-08T20:05:24+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-04-28T12:51:00+00:00", "2003-05-02T11:57:00+00:00" ]
CVE-2003-0987
httpd mod_digest nonce not verified
Low
null
null
mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret.
null
2025-01-09T01:52:17+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1", "Red Hat Stronghold 4", "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0j patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2004-12-13T19:26:00+00:00", "2004-12-20T16:40:00+00:00", "2005-11-02T09:23:00+00:00" ]
CVE-2003-0196
security flaw
Critical
null
null
Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.
null
2025-01-08T20:06:47+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-04-07T18:38:00+00:00", "2003-04-08T07:00:00+00:00" ]
CVE-2003-0246
security flaw
None
null
null
The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.
null
2025-01-08T20:08:22+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2003-05-30T01:33:00+00:00" ]
CVE-2003-0991
security flaw
Important
null
null
Unknown vulnerability in the mail command handler in Mailman before 2.0.14 allows remote attackers to cause a denial of service (crash) via malformed e-mail commands.
null
2025-01-08T19:58:10+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2004-02-09T18:37:00+00:00" ]
CVE-2003-0138
security flaw
Important
null
null
Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack.
null
2025-01-08T20:04:36+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-27T19:43:00+00:00", "2003-03-26T21:49:00+00:00", "2003-04-02T09:57:00+00:00" ]
CVE-2003-0354
security flaw
None
null
null
Unknown vulnerability in GNU Ghostscript before 7.07 allows attackers to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job.
null
2025-01-08T20:03:42+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-06-17T19:47:00+00:00", "2003-05-30T08:34:00+00:00" ]
CVE-2003-0211
security flaw
Important
null
null
Memory leak in xinetd 2.3.10 allows remote attackers to cause a denial of service (memory consumption) via a large number of rejected connections.
null
2025-01-08T20:04:12+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-05-22T17:29:00+00:00", "2003-05-13T17:15:00+00:00" ]
CVE-2003-1302
security flaw
Moderate
null
null
The IMAP functionality in PHP before 4.3.1 allows remote attackers to cause a denial of service via an e-mail message with a (1) To or (2) From header with an address that contains a large number of "\" (backslash) characters.
null
2025-01-08T20:03:26+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-05-23T20:09:00+00:00" ]
CVE-2003-0544
CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes
Moderate
null
null
OpenSSL 0.9.6 and 0.9.7 does not properly track the number of characters in certain ASN.1 inputs, which allows remote attackers to cause a denial of service (crash) via an SSL client certificate that causes OpenSSL to read past the end of a buffer when the long form is used.
For Red Hat Enterprise Linux 2.1 OpenSSL packages (openssl, openssl096, openssl095a) issue was addressed via RHSA-2003:293. The OpenSSL packages in Red Hat Enterprise Linux 3 and 4 (openssl, openssl096b) contain a backported patch since their initial release. The OpenSSL packages in Red Hat Enterprise Linux 5 are based on fixed upstream release (openssl), or contain backported patch since their initial release (openssl097a).
2025-01-09T02:16:03+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1", "Red Hat Stronghold 4" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0g patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4" ]
[ "2003-09-30T12:12:00+00:00", "2003-09-30T12:16:00+00:00", "2003-09-30T12:10:00+00:00", "2003-09-30T12:16:00+00:00" ]
CVE-2003-0682
security flaw
Important
null
null
"Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.
Not vulnerable. This flaw is fixed in Red Hat Enterprise Linux 2.1 via the errata RHSA-2003:280. This flaw is fixed in Red Hat Enterprise Linux 3 as a backported patch. The source RPM contains the patch openssh-3.6.1p2-owl-realloc.diff which resolved this flaw before Red Hat Enterprise Linux 3 GA. This flaw does not affect any subsequent versions of Red Hat Enterprise Linux.
2025-01-08T13:35:53+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-09-16T17:51:00+00:00", "2003-09-16T17:53:00+00:00" ]
CVE-2003-0552
security flaw
Moderate
null
null
Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
null
2025-01-08T20:02:04+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system." ]
[ "2003-08-21T17:40:00+00:00", "2003-08-21T17:23:00+00:00", "2003-07-21T15:36:00+00:00" ]
CVE-2003-0102
security flaw
Moderate
null
null
Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
null
2025-01-08T20:08:17+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-10T12:36:00+00:00", "2003-03-07T15:00:00+00:00" ]
CVE-2003-0694
security flaw
Critical
null
null
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
null
2025-01-08T19:57:36+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-09-17T19:13:00+00:00", "2003-09-17T23:42:00+00:00" ]
CVE-2003-0440
security flaw
Low
null
null
The (1) semi MIME library 1.14.5 and earlier, and (2) wemi 1.14.0 and possibly other versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
null
2025-01-08T20:08:01+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-10-02T19:53:00+00:00", "2003-07-23T16:33:00+00:00" ]
CVE-2003-0856
security flaw
Low
null
null
iproute 2.4.7 and earlier allows local users to cause a denial of service via spoofed messages as other users to the kernel netlink interface.
null
2025-01-08T20:00:40+00:00
[ "3AS:iproute-0:2.4.7-11.30E.1.i386", "3AS:iproute-0:2.4.7-11.30E.1.ia64", "3AS:iproute-0:2.4.7-11.30E.1.ppc", "3AS:iproute-0:2.4.7-11.30E.1.s390", "3AS:iproute-0:2.4.7-11.30E.1.s390x", "3AS:iproute-0:2.4.7-11.30E.1.src", "3AS:iproute-0:2.4.7-11.30E.1.x86_64", "3AS:iproute-debuginfo-0:2.4.7-11.30E.1.i386", "3AS:iproute-debuginfo-0:2.4.7-11.30E.1.ia64", "3AS:iproute-debuginfo-0:2.4.7-11.30E.1.ppc", "3AS:iproute-debuginfo-0:2.4.7-11.30E.1.s390", "3AS:iproute-debuginfo-0:2.4.7-11.30E.1.s390x", "3AS:iproute-debuginfo-0:2.4.7-11.30E.1.x86_64", "3Desktop:iproute-0:2.4.7-11.30E.1.i386", "3Desktop:iproute-0:2.4.7-11.30E.1.ia64", "3Desktop:iproute-0:2.4.7-11.30E.1.ppc", "3Desktop:iproute-0:2.4.7-11.30E.1.s390", "3Desktop:iproute-0:2.4.7-11.30E.1.s390x", "3Desktop:iproute-0:2.4.7-11.30E.1.src", "3Desktop:iproute-0:2.4.7-11.30E.1.x86_64", "3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.i386", "3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.ia64", "3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.ppc", "3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.s390", "3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.s390x", "3Desktop:iproute-debuginfo-0:2.4.7-11.30E.1.x86_64", "3ES:iproute-0:2.4.7-11.30E.1.i386", "3ES:iproute-0:2.4.7-11.30E.1.ia64", "3ES:iproute-0:2.4.7-11.30E.1.ppc", "3ES:iproute-0:2.4.7-11.30E.1.s390", "3ES:iproute-0:2.4.7-11.30E.1.s390x", "3ES:iproute-0:2.4.7-11.30E.1.src", "3ES:iproute-0:2.4.7-11.30E.1.x86_64", "3ES:iproute-debuginfo-0:2.4.7-11.30E.1.i386", "3ES:iproute-debuginfo-0:2.4.7-11.30E.1.ia64", "3ES:iproute-debuginfo-0:2.4.7-11.30E.1.ppc", "3ES:iproute-debuginfo-0:2.4.7-11.30E.1.s390", "3ES:iproute-debuginfo-0:2.4.7-11.30E.1.s390x", "3ES:iproute-debuginfo-0:2.4.7-11.30E.1.x86_64", "3WS:iproute-0:2.4.7-11.30E.1.i386", "3WS:iproute-0:2.4.7-11.30E.1.ia64", "3WS:iproute-0:2.4.7-11.30E.1.ppc", "3WS:iproute-0:2.4.7-11.30E.1.s390", "3WS:iproute-0:2.4.7-11.30E.1.s390x", "3WS:iproute-0:2.4.7-11.30E.1.src", "3WS:iproute-0:2.4.7-11.30E.1.x86_64", "3WS:iproute-debuginfo-0:2.4.7-11.30E.1.i386", "3WS:iproute-debuginfo-0:2.4.7-11.30E.1.ia64", "3WS:iproute-debuginfo-0:2.4.7-11.30E.1.ppc", "3WS:iproute-debuginfo-0:2.4.7-11.30E.1.s390", "3WS:iproute-debuginfo-0:2.4.7-11.30E.1.s390x", "3WS:iproute-debuginfo-0:2.4.7-11.30E.1.x86_64", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-11-12T14:08:00+00:00", "2003-11-24T08:39:00+00:00" ]
CVE-2003-0592
security flaw
Important
null
null
Konqueror in KDE 3.1.3 and earlier (kdelibs) allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
null
2025-01-08T20:00:18+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2004-03-10T14:36:00+00:00", "2004-03-10T14:37:00+00:00" ]
CVE-2003-0984
security flaw
Low
null
null
Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space.
null
2025-01-08T19:58:16+00:00
[ "3AS:kernel-0:2.4.21-15.EL.athlon", "3AS:kernel-0:2.4.21-15.EL.i686", "3AS:kernel-0:2.4.21-15.EL.ia32e", "3AS:kernel-0:2.4.21-15.EL.ia64", "3AS:kernel-0:2.4.21-15.EL.ppc64iseries", "3AS:kernel-0:2.4.21-15.EL.ppc64pseries", "3AS:kernel-0:2.4.21-15.EL.s390", "3AS:kernel-0:2.4.21-15.EL.s390x", "3AS:kernel-0:2.4.21-15.EL.src", "3AS:kernel-0:2.4.21-15.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-15.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-15.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-15.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-15.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-15.EL.x86_64", "3AS:kernel-doc-0:2.4.21-15.EL.i386", "3AS:kernel-doc-0:2.4.21-15.EL.ia64", "3AS:kernel-doc-0:2.4.21-15.EL.ppc64", "3AS:kernel-doc-0:2.4.21-15.EL.s390", "3AS:kernel-doc-0:2.4.21-15.EL.s390x", "3AS:kernel-doc-0:2.4.21-15.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-15.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686", "3AS:kernel-smp-0:2.4.21-15.EL.athlon", "3AS:kernel-smp-0:2.4.21-15.EL.i686", "3AS:kernel-smp-0:2.4.21-15.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-15.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-15.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64", "3AS:kernel-source-0:2.4.21-15.EL.i386", "3AS:kernel-source-0:2.4.21-15.EL.ia64", "3AS:kernel-source-0:2.4.21-15.EL.ppc64", "3AS:kernel-source-0:2.4.21-15.EL.s390", "3AS:kernel-source-0:2.4.21-15.EL.s390x", "3AS:kernel-source-0:2.4.21-15.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-15.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-15.EL.i686", "3AS:kernel-unsupported-0:2.4.21-15.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-15.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-15.EL.s390", "3AS:kernel-unsupported-0:2.4.21-15.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-0:2.4.21-15.EL.athlon", "3Desktop:kernel-0:2.4.21-15.EL.i686", "3Desktop:kernel-0:2.4.21-15.EL.ia32e", "3Desktop:kernel-0:2.4.21-15.EL.ia64", "3Desktop:kernel-0:2.4.21-15.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-15.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-15.EL.s390", "3Desktop:kernel-0:2.4.21-15.EL.s390x", "3Desktop:kernel-0:2.4.21-15.EL.src", "3Desktop:kernel-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-15.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-15.EL.i386", "3Desktop:kernel-doc-0:2.4.21-15.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-15.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-15.EL.s390", "3Desktop:kernel-doc-0:2.4.21-15.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-15.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-15.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-15.EL.i386", "3Desktop:kernel-source-0:2.4.21-15.EL.ia64", "3Desktop:kernel-source-0:2.4.21-15.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-15.EL.s390", "3Desktop:kernel-source-0:2.4.21-15.EL.s390x", "3Desktop:kernel-source-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.x86_64", "3ES:kernel-0:2.4.21-15.EL.athlon", "3ES:kernel-0:2.4.21-15.EL.i686", "3ES:kernel-0:2.4.21-15.EL.ia32e", "3ES:kernel-0:2.4.21-15.EL.ia64", "3ES:kernel-0:2.4.21-15.EL.ppc64iseries", "3ES:kernel-0:2.4.21-15.EL.ppc64pseries", "3ES:kernel-0:2.4.21-15.EL.s390", "3ES:kernel-0:2.4.21-15.EL.s390x", "3ES:kernel-0:2.4.21-15.EL.src", "3ES:kernel-0:2.4.21-15.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-15.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-15.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-15.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-15.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-15.EL.x86_64", "3ES:kernel-doc-0:2.4.21-15.EL.i386", "3ES:kernel-doc-0:2.4.21-15.EL.ia64", "3ES:kernel-doc-0:2.4.21-15.EL.ppc64", "3ES:kernel-doc-0:2.4.21-15.EL.s390", "3ES:kernel-doc-0:2.4.21-15.EL.s390x", "3ES:kernel-doc-0:2.4.21-15.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-15.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686", "3ES:kernel-smp-0:2.4.21-15.EL.athlon", "3ES:kernel-smp-0:2.4.21-15.EL.i686", "3ES:kernel-smp-0:2.4.21-15.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-15.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-15.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64", "3ES:kernel-source-0:2.4.21-15.EL.i386", "3ES:kernel-source-0:2.4.21-15.EL.ia64", "3ES:kernel-source-0:2.4.21-15.EL.ppc64", "3ES:kernel-source-0:2.4.21-15.EL.s390", "3ES:kernel-source-0:2.4.21-15.EL.s390x", "3ES:kernel-source-0:2.4.21-15.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-15.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-15.EL.i686", "3ES:kernel-unsupported-0:2.4.21-15.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-15.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-15.EL.s390", "3ES:kernel-unsupported-0:2.4.21-15.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-15.EL.x86_64", "3WS:kernel-0:2.4.21-15.EL.athlon", "3WS:kernel-0:2.4.21-15.EL.i686", "3WS:kernel-0:2.4.21-15.EL.ia32e", "3WS:kernel-0:2.4.21-15.EL.ia64", "3WS:kernel-0:2.4.21-15.EL.ppc64iseries", "3WS:kernel-0:2.4.21-15.EL.ppc64pseries", "3WS:kernel-0:2.4.21-15.EL.s390", "3WS:kernel-0:2.4.21-15.EL.s390x", "3WS:kernel-0:2.4.21-15.EL.src", "3WS:kernel-0:2.4.21-15.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-15.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-15.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-15.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-15.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-15.EL.x86_64", "3WS:kernel-doc-0:2.4.21-15.EL.i386", "3WS:kernel-doc-0:2.4.21-15.EL.ia64", "3WS:kernel-doc-0:2.4.21-15.EL.ppc64", "3WS:kernel-doc-0:2.4.21-15.EL.s390", "3WS:kernel-doc-0:2.4.21-15.EL.s390x", "3WS:kernel-doc-0:2.4.21-15.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-15.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686", "3WS:kernel-smp-0:2.4.21-15.EL.athlon", "3WS:kernel-smp-0:2.4.21-15.EL.i686", "3WS:kernel-smp-0:2.4.21-15.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-15.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-15.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64", "3WS:kernel-source-0:2.4.21-15.EL.i386", "3WS:kernel-source-0:2.4.21-15.EL.ia64", "3WS:kernel-source-0:2.4.21-15.EL.ppc64", "3WS:kernel-source-0:2.4.21-15.EL.s390", "3WS:kernel-source-0:2.4.21-15.EL.s390x", "3WS:kernel-source-0:2.4.21-15.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-15.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-15.EL.i686", "3WS:kernel-unsupported-0:2.4.21-15.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-15.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-15.EL.s390", "3WS:kernel-unsupported-0:2.4.21-15.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-15.EL.x86_64", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2004-05-12T01:07:00+00:00", "2004-01-05T12:50:00+00:00" ]
CVE-2003-0204
security flaw
None
null
null
KDE 2 and KDE 3.1.1 and earlier 3.x versions allows attackers to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer.
null
2025-01-08T20:06:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-05-22T16:50:00+00:00", "2003-05-12T16:32:00+00:00" ]
CVE-2003-0195
security flaw
None
null
null
CUPS before 1.1.19 allows remote attackers to cause a denial of service via a partial printing request to the IPP port (631), which does not time out.
null
2025-01-08T20:08:27+00:00
[ "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-05-27T09:41:00+00:00" ]
CVE-2003-0253
security flaw
None
null
null
The prefork MPM in Apache 2 before 2.0.47 does not properly handle certain errors from accept, which could lead to a denial of service.
null
2025-01-08T20:09:15+00:00
[ "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-09-04T07:40:00+00:00" ]
CVE-2003-1012
security flaw
Low
null
null
The SMB dissector in Ethereal before 0.10.0 allows remote attackers to cause a denial of service via a malformed SMB packet that triggers a segmentation fault during processing of Selected packets.
null
2025-01-08T20:00:46+00:00
[ "3AS:ethereal-0:0.10.0a-0.30E.1.i386", "3AS:ethereal-0:0.10.0a-0.30E.1.ia64", "3AS:ethereal-0:0.10.0a-0.30E.1.ppc", "3AS:ethereal-0:0.10.0a-0.30E.1.s390", "3AS:ethereal-0:0.10.0a-0.30E.1.s390x", "3AS:ethereal-0:0.10.0a-0.30E.1.src", "3AS:ethereal-0:0.10.0a-0.30E.1.x86_64", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.i386", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.ia64", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.ppc", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.s390", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.s390x", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64", "3Desktop:ethereal-0:0.10.0a-0.30E.1.i386", "3Desktop:ethereal-0:0.10.0a-0.30E.1.ia64", "3Desktop:ethereal-0:0.10.0a-0.30E.1.ppc", "3Desktop:ethereal-0:0.10.0a-0.30E.1.s390", "3Desktop:ethereal-0:0.10.0a-0.30E.1.s390x", "3Desktop:ethereal-0:0.10.0a-0.30E.1.src", "3Desktop:ethereal-0:0.10.0a-0.30E.1.x86_64", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.i386", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.ia64", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.ppc", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.s390", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.s390x", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64", "3ES:ethereal-0:0.10.0a-0.30E.1.i386", "3ES:ethereal-0:0.10.0a-0.30E.1.ia64", "3ES:ethereal-0:0.10.0a-0.30E.1.ppc", "3ES:ethereal-0:0.10.0a-0.30E.1.s390", "3ES:ethereal-0:0.10.0a-0.30E.1.s390x", "3ES:ethereal-0:0.10.0a-0.30E.1.src", "3ES:ethereal-0:0.10.0a-0.30E.1.x86_64", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.i386", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.ia64", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.ppc", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.s390", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.s390x", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64", "3WS:ethereal-0:0.10.0a-0.30E.1.i386", "3WS:ethereal-0:0.10.0a-0.30E.1.ia64", "3WS:ethereal-0:0.10.0a-0.30E.1.ppc", "3WS:ethereal-0:0.10.0a-0.30E.1.s390", "3WS:ethereal-0:0.10.0a-0.30E.1.s390x", "3WS:ethereal-0:0.10.0a-0.30E.1.src", "3WS:ethereal-0:0.10.0a-0.30E.1.x86_64", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.i386", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.ia64", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.ppc", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.s390", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.s390x", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2004-01-20T16:45:00+00:00", "2004-01-07T18:12:00+00:00" ]
CVE-2003-0615
security flaw
Important
null
null
Cross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter.
null
2025-01-08T19:59:32+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-09-22T08:46:00+00:00", "2003-09-22T08:52:00+00:00" ]
CVE-2003-0245
security flaw
None
null
null
Vulnerability in the apr_psprintf function in the Apache Portable Runtime (APR) library for Apache 2.0.37 through 2.0.45 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long strings, as demonstrated using XML objects to mod_dav, and possibly other vectors.
null
2025-01-08T20:07:36+00:00
[ "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-05-28T16:25:00+00:00" ]
CVE-2003-0992
security flaw
Important
null
null
Cross-site scripting (XSS) vulnerability in the create CGI script for Mailman before 2.1.3 allows remote attackers to steal cookies of other users.
null
2025-01-08T19:58:22+00:00
[ "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2004-02-05T08:51:00+00:00" ]
CVE-2003-0357
security flaw
Moderate
null
null
Multiple integer overflow vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) Mount and (2) PPP dissectors.
null
2025-01-08T20:06:14+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-07-08T19:59:00+00:00", "2003-07-03T08:31:00+00:00" ]
CVE-2003-0140
security flaw
Important
null
null
Buffer overflow in Mutt 1.4.0 and possibly earlier versions, 1.5.x up to 1.5.3, and other programs that use Mutt code such as Balsa before 2.0.10, allows a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a crafted folder.
null
2025-01-08T20:04:36+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-05-22T16:41:00+00:00", "2003-04-03T20:21:00+00:00" ]
CVE-2003-0455
security flaw
Important
null
null
The imagemagick libmagick library 5.5 and earlier creates temporary files insecurely, which allows local users to create or overwrite arbitrary files.
null
2025-01-08T20:09:27+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/" ]
[ "2004-10-20T19:17:00+00:00" ]
CVE-2003-0547
security flaw
Low
null
null
GDM before 2.4.1.6, when using the "examine session errors" feature, allows local users to read arbitrary files via a symlink attack on the ~/.xsession-errors file.
null
2025-01-08T20:01:48+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-08-21T19:16:00+00:00" ]
CVE-2003-0681
security flaw
Important
null
null
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
null
2025-01-08T19:59:50+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-09-17T23:42:00+00:00" ]
CVE-2003-0551
security flaw
Moderate
null
null
The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service.
null
2025-01-08T19:59:07+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system." ]
[ "2003-08-21T17:40:00+00:00", "2003-08-21T17:23:00+00:00", "2003-07-21T15:36:00+00:00" ]
CVE-2003-0855
security flaw
Low
null
null
Pan 0.13.3 and earlier allows remote attackers to cause a denial of service (crash) via a news post with a long author email address.
null
2025-01-08T19:59:56+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-12-10T16:52:00+00:00", "2003-11-24T08:51:00+00:00" ]
CVE-2003-0967
security flaw
Moderate
null
null
rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute.
null
2025-01-08T19:57:52+00:00
[ "3AS:freeradius-0:0.9.3-1.i386", "3AS:freeradius-0:0.9.3-1.ia64", "3AS:freeradius-0:0.9.3-1.ppc", "3AS:freeradius-0:0.9.3-1.s390", "3AS:freeradius-0:0.9.3-1.s390x", "3AS:freeradius-0:0.9.3-1.src", "3AS:freeradius-0:0.9.3-1.x86_64", "3AS:freeradius-debuginfo-0:0.9.3-1.i386", "3AS:freeradius-debuginfo-0:0.9.3-1.ia64", "3AS:freeradius-debuginfo-0:0.9.3-1.ppc", "3AS:freeradius-debuginfo-0:0.9.3-1.s390", "3AS:freeradius-debuginfo-0:0.9.3-1.s390x", "3AS:freeradius-debuginfo-0:0.9.3-1.x86_64", "3ES:freeradius-0:0.9.3-1.i386", "3ES:freeradius-0:0.9.3-1.ia64", "3ES:freeradius-0:0.9.3-1.ppc", "3ES:freeradius-0:0.9.3-1.s390", "3ES:freeradius-0:0.9.3-1.s390x", "3ES:freeradius-0:0.9.3-1.src", "3ES:freeradius-0:0.9.3-1.x86_64", "3ES:freeradius-debuginfo-0:0.9.3-1.i386", "3ES:freeradius-debuginfo-0:0.9.3-1.ia64", "3ES:freeradius-debuginfo-0:0.9.3-1.ppc", "3ES:freeradius-debuginfo-0:0.9.3-1.s390", "3ES:freeradius-debuginfo-0:0.9.3-1.s390x", "3ES:freeradius-debuginfo-0:0.9.3-1.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-12-10T16:59:00+00:00" ]
CVE-2003-0434
security flaw
Important
null
null
Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.
null
2025-01-08T20:09:11+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-06-18T17:27:00+00:00", "2003-06-18T17:32:00+00:00" ]
CVE-2003-0988
security flaw
Important
null
null
Buffer overflow in the VCF file information reader for KDE Personal Information Management (kdepim) suite in KDE 3.1.0 through 3.1.4 allows attackers to execute arbitrary code via a VCF file.
null
2025-01-08T20:03:15+00:00
[ "3AS:kdepim-6:3.1.3-3.3.i386", "3AS:kdepim-6:3.1.3-3.3.ia64", "3AS:kdepim-6:3.1.3-3.3.ppc", "3AS:kdepim-6:3.1.3-3.3.s390", "3AS:kdepim-6:3.1.3-3.3.s390x", "3AS:kdepim-6:3.1.3-3.3.src", "3AS:kdepim-6:3.1.3-3.3.x86_64", "3AS:kdepim-debuginfo-6:3.1.3-3.3.i386", "3AS:kdepim-debuginfo-6:3.1.3-3.3.ia64", "3AS:kdepim-debuginfo-6:3.1.3-3.3.ppc", "3AS:kdepim-debuginfo-6:3.1.3-3.3.s390", "3AS:kdepim-debuginfo-6:3.1.3-3.3.s390x", "3AS:kdepim-debuginfo-6:3.1.3-3.3.x86_64", "3AS:kdepim-devel-6:3.1.3-3.3.i386", "3AS:kdepim-devel-6:3.1.3-3.3.ia64", "3AS:kdepim-devel-6:3.1.3-3.3.ppc", "3AS:kdepim-devel-6:3.1.3-3.3.s390", "3AS:kdepim-devel-6:3.1.3-3.3.s390x", "3AS:kdepim-devel-6:3.1.3-3.3.x86_64", "3Desktop:kdepim-6:3.1.3-3.3.i386", "3Desktop:kdepim-6:3.1.3-3.3.ia64", "3Desktop:kdepim-6:3.1.3-3.3.ppc", "3Desktop:kdepim-6:3.1.3-3.3.s390", "3Desktop:kdepim-6:3.1.3-3.3.s390x", "3Desktop:kdepim-6:3.1.3-3.3.src", "3Desktop:kdepim-6:3.1.3-3.3.x86_64", "3Desktop:kdepim-debuginfo-6:3.1.3-3.3.i386", "3Desktop:kdepim-debuginfo-6:3.1.3-3.3.ia64", "3Desktop:kdepim-debuginfo-6:3.1.3-3.3.ppc", "3Desktop:kdepim-debuginfo-6:3.1.3-3.3.s390", "3Desktop:kdepim-debuginfo-6:3.1.3-3.3.s390x", "3Desktop:kdepim-debuginfo-6:3.1.3-3.3.x86_64", "3Desktop:kdepim-devel-6:3.1.3-3.3.i386", "3Desktop:kdepim-devel-6:3.1.3-3.3.ia64", "3Desktop:kdepim-devel-6:3.1.3-3.3.ppc", "3Desktop:kdepim-devel-6:3.1.3-3.3.s390", "3Desktop:kdepim-devel-6:3.1.3-3.3.s390x", "3Desktop:kdepim-devel-6:3.1.3-3.3.x86_64", "3ES:kdepim-6:3.1.3-3.3.i386", "3ES:kdepim-6:3.1.3-3.3.ia64", "3ES:kdepim-6:3.1.3-3.3.ppc", "3ES:kdepim-6:3.1.3-3.3.s390", "3ES:kdepim-6:3.1.3-3.3.s390x", "3ES:kdepim-6:3.1.3-3.3.src", "3ES:kdepim-6:3.1.3-3.3.x86_64", "3ES:kdepim-debuginfo-6:3.1.3-3.3.i386", "3ES:kdepim-debuginfo-6:3.1.3-3.3.ia64", "3ES:kdepim-debuginfo-6:3.1.3-3.3.ppc", "3ES:kdepim-debuginfo-6:3.1.3-3.3.s390", "3ES:kdepim-debuginfo-6:3.1.3-3.3.s390x", "3ES:kdepim-debuginfo-6:3.1.3-3.3.x86_64", "3ES:kdepim-devel-6:3.1.3-3.3.i386", "3ES:kdepim-devel-6:3.1.3-3.3.ia64", "3ES:kdepim-devel-6:3.1.3-3.3.ppc", "3ES:kdepim-devel-6:3.1.3-3.3.s390", "3ES:kdepim-devel-6:3.1.3-3.3.s390x", "3ES:kdepim-devel-6:3.1.3-3.3.x86_64", "3WS:kdepim-6:3.1.3-3.3.i386", "3WS:kdepim-6:3.1.3-3.3.ia64", "3WS:kdepim-6:3.1.3-3.3.ppc", "3WS:kdepim-6:3.1.3-3.3.s390", "3WS:kdepim-6:3.1.3-3.3.s390x", "3WS:kdepim-6:3.1.3-3.3.src", "3WS:kdepim-6:3.1.3-3.3.x86_64", "3WS:kdepim-debuginfo-6:3.1.3-3.3.i386", "3WS:kdepim-debuginfo-6:3.1.3-3.3.ia64", "3WS:kdepim-debuginfo-6:3.1.3-3.3.ppc", "3WS:kdepim-debuginfo-6:3.1.3-3.3.s390", "3WS:kdepim-debuginfo-6:3.1.3-3.3.s390x", "3WS:kdepim-debuginfo-6:3.1.3-3.3.x86_64", "3WS:kdepim-devel-6:3.1.3-3.3.i386", "3WS:kdepim-devel-6:3.1.3-3.3.ia64", "3WS:kdepim-devel-6:3.1.3-3.3.ppc", "3WS:kdepim-devel-6:3.1.3-3.3.s390", "3WS:kdepim-devel-6:3.1.3-3.3.s390x", "3WS:kdepim-devel-6:3.1.3-3.3.x86_64", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2004-01-14T13:10:00+00:00", "2004-01-14T13:09:00+00:00" ]
CVE-2003-0619
security flaw
Important
null
null
Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call.
null
2025-01-08T20:02:54+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2003-08-21T17:40:00+00:00", "2003-08-21T17:23:00+00:00" ]
CVE-2003-0926
security flaw
Low
null
null
Ethereal 0.9.15 and earlier, and Tethereal, allows remote attackers to cause a denial of service (crash) via certain malformed (1) ISAKMP or (2) MEGACO packets.
null
2025-01-08T20:01:58+00:00
[ "3AS:ethereal-0:0.9.16-0.30E.1.i386", "3AS:ethereal-0:0.9.16-0.30E.1.ia64", "3AS:ethereal-0:0.9.16-0.30E.1.ppc", "3AS:ethereal-0:0.9.16-0.30E.1.s390", "3AS:ethereal-0:0.9.16-0.30E.1.s390x", "3AS:ethereal-0:0.9.16-0.30E.1.src", "3AS:ethereal-0:0.9.16-0.30E.1.x86_64", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.i386", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.ia64", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.ppc", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.s390", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.s390x", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.x86_64", "3Desktop:ethereal-0:0.9.16-0.30E.1.i386", "3Desktop:ethereal-0:0.9.16-0.30E.1.ia64", "3Desktop:ethereal-0:0.9.16-0.30E.1.ppc", "3Desktop:ethereal-0:0.9.16-0.30E.1.s390", "3Desktop:ethereal-0:0.9.16-0.30E.1.s390x", "3Desktop:ethereal-0:0.9.16-0.30E.1.src", "3Desktop:ethereal-0:0.9.16-0.30E.1.x86_64", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.i386", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.ia64", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.ppc", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.s390", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.s390x", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.x86_64", "3ES:ethereal-0:0.9.16-0.30E.1.i386", "3ES:ethereal-0:0.9.16-0.30E.1.ia64", "3ES:ethereal-0:0.9.16-0.30E.1.ppc", "3ES:ethereal-0:0.9.16-0.30E.1.s390", "3ES:ethereal-0:0.9.16-0.30E.1.s390x", "3ES:ethereal-0:0.9.16-0.30E.1.src", "3ES:ethereal-0:0.9.16-0.30E.1.x86_64", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.i386", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.ia64", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.ppc", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.s390", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.s390x", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.x86_64", "3WS:ethereal-0:0.9.16-0.30E.1.i386", "3WS:ethereal-0:0.9.16-0.30E.1.ia64", "3WS:ethereal-0:0.9.16-0.30E.1.ppc", "3WS:ethereal-0:0.9.16-0.30E.1.s390", "3WS:ethereal-0:0.9.16-0.30E.1.s390x", "3WS:ethereal-0:0.9.16-0.30E.1.src", "3WS:ethereal-0:0.9.16-0.30E.1.x86_64", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.i386", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.ia64", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.ppc", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.s390", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.s390x", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.x86_64", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-11-12T14:05:00+00:00", "2003-11-10T17:53:00+00:00" ]
CVE-2003-0160
security flaw
None
null
null
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.2.11 allow remote attackers to inject arbitrary HTML code and steal information from a client's web browser.
null
2025-01-08T20:07:00+00:00
[ "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-04-24T20:37:00+00:00" ]
CVE-2003-0072
security flaw
Important
null
null
The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes an out-of-bounds read of an array (aka "array overrun").
null
2025-01-08T20:05:44+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-27T19:43:00+00:00", "2003-03-26T21:49:00+00:00" ]
CVE-2003-0971
security flaw
Important
null
null
GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.
null
2025-01-08T20:01:04+00:00
[ "3AS:gnupg-0:1.2.1-10.i386", "3AS:gnupg-0:1.2.1-10.ia64", "3AS:gnupg-0:1.2.1-10.ppc", "3AS:gnupg-0:1.2.1-10.s390", "3AS:gnupg-0:1.2.1-10.s390x", "3AS:gnupg-0:1.2.1-10.src", "3AS:gnupg-0:1.2.1-10.x86_64", "3AS:gnupg-debuginfo-0:1.2.1-10.i386", "3AS:gnupg-debuginfo-0:1.2.1-10.ia64", "3AS:gnupg-debuginfo-0:1.2.1-10.ppc", "3AS:gnupg-debuginfo-0:1.2.1-10.s390", "3AS:gnupg-debuginfo-0:1.2.1-10.s390x", "3AS:gnupg-debuginfo-0:1.2.1-10.x86_64", "3Desktop:gnupg-0:1.2.1-10.i386", "3Desktop:gnupg-0:1.2.1-10.ia64", "3Desktop:gnupg-0:1.2.1-10.ppc", "3Desktop:gnupg-0:1.2.1-10.s390", "3Desktop:gnupg-0:1.2.1-10.s390x", "3Desktop:gnupg-0:1.2.1-10.src", "3Desktop:gnupg-0:1.2.1-10.x86_64", "3Desktop:gnupg-debuginfo-0:1.2.1-10.i386", "3Desktop:gnupg-debuginfo-0:1.2.1-10.ia64", "3Desktop:gnupg-debuginfo-0:1.2.1-10.ppc", "3Desktop:gnupg-debuginfo-0:1.2.1-10.s390", "3Desktop:gnupg-debuginfo-0:1.2.1-10.s390x", "3Desktop:gnupg-debuginfo-0:1.2.1-10.x86_64", "3ES:gnupg-0:1.2.1-10.i386", "3ES:gnupg-0:1.2.1-10.ia64", "3ES:gnupg-0:1.2.1-10.ppc", "3ES:gnupg-0:1.2.1-10.s390", "3ES:gnupg-0:1.2.1-10.s390x", "3ES:gnupg-0:1.2.1-10.src", "3ES:gnupg-0:1.2.1-10.x86_64", "3ES:gnupg-debuginfo-0:1.2.1-10.i386", "3ES:gnupg-debuginfo-0:1.2.1-10.ia64", "3ES:gnupg-debuginfo-0:1.2.1-10.ppc", "3ES:gnupg-debuginfo-0:1.2.1-10.s390", "3ES:gnupg-debuginfo-0:1.2.1-10.s390x", "3ES:gnupg-debuginfo-0:1.2.1-10.x86_64", "3WS:gnupg-0:1.2.1-10.i386", "3WS:gnupg-0:1.2.1-10.ia64", "3WS:gnupg-0:1.2.1-10.ppc", "3WS:gnupg-0:1.2.1-10.s390", "3WS:gnupg-0:1.2.1-10.s390x", "3WS:gnupg-0:1.2.1-10.src", "3WS:gnupg-0:1.2.1-10.x86_64", "3WS:gnupg-debuginfo-0:1.2.1-10.i386", "3WS:gnupg-debuginfo-0:1.2.1-10.ia64", "3WS:gnupg-debuginfo-0:1.2.1-10.ppc", "3WS:gnupg-debuginfo-0:1.2.1-10.s390", "3WS:gnupg-debuginfo-0:1.2.1-10.s390x", "3WS:gnupg-debuginfo-0:1.2.1-10.x86_64", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-12-11T00:21:00+00:00", "2003-12-11T00:25:00+00:00" ]
CVE-2003-0459
security flaw
Moderate
null
null
KDE Konqueror for KDE 3.1.2 and earlier does not remove authentication credentials from URLs of the "user:password@host" form in the HTTP-Referer header, which could allow remote web sites to steal the credentials for pages that link to the sites.
null
2025-01-08T20:09:40+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-07-30T20:48:00+00:00", "2003-08-11T07:50:00+00:00" ]
CVE-2003-0789
security flaw
Moderate
null
null
mod_cgid in Apache before 2.0.48, when using a threaded MPM, does not properly handle CGI redirect paths, which could cause Apache to send the output of a CGI program to the wrong client.
null
2025-01-08T20:00:34+00:00
[ "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nAfter the errata packages are installed, restart the HTTP service by\nrunning (as root) the following command:\n\n/sbin/service httpd restart\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-12-16T21:48:00+00:00" ]
CVE-2003-0859
security flaw
Low
null
null
The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.
null
2025-01-08T20:02:06+00:00
[ "3AS:glibc-0:2.3.2-95.6.i386", "3AS:glibc-0:2.3.2-95.6.i686", "3AS:glibc-0:2.3.2-95.6.ia64", "3AS:glibc-0:2.3.2-95.6.ppc", "3AS:glibc-0:2.3.2-95.6.ppc64", "3AS:glibc-0:2.3.2-95.6.s390", "3AS:glibc-0:2.3.2-95.6.s390x", "3AS:glibc-0:2.3.2-95.6.src", "3AS:glibc-0:2.3.2-95.6.x86_64", "3AS:glibc-common-0:2.3.2-95.6.i386", "3AS:glibc-common-0:2.3.2-95.6.ia64", "3AS:glibc-common-0:2.3.2-95.6.ppc", "3AS:glibc-common-0:2.3.2-95.6.s390", "3AS:glibc-common-0:2.3.2-95.6.s390x", "3AS:glibc-common-0:2.3.2-95.6.x86_64", "3AS:glibc-debuginfo-0:2.3.2-95.6.i386", "3AS:glibc-debuginfo-0:2.3.2-95.6.i686", "3AS:glibc-debuginfo-0:2.3.2-95.6.ia64", "3AS:glibc-debuginfo-0:2.3.2-95.6.ppc", "3AS:glibc-debuginfo-0:2.3.2-95.6.ppc64", "3AS:glibc-debuginfo-0:2.3.2-95.6.s390", "3AS:glibc-debuginfo-0:2.3.2-95.6.s390x", "3AS:glibc-debuginfo-0:2.3.2-95.6.x86_64", "3AS:glibc-debuginfo-common-0:2.3.2-95.6.i386", "3AS:glibc-devel-0:2.3.2-95.6.i386", "3AS:glibc-devel-0:2.3.2-95.6.ia64", "3AS:glibc-devel-0:2.3.2-95.6.ppc", "3AS:glibc-devel-0:2.3.2-95.6.ppc64", "3AS:glibc-devel-0:2.3.2-95.6.s390", "3AS:glibc-devel-0:2.3.2-95.6.s390x", "3AS:glibc-devel-0:2.3.2-95.6.x86_64", "3AS:glibc-headers-0:2.3.2-95.6.i386", "3AS:glibc-headers-0:2.3.2-95.6.ia64", "3AS:glibc-headers-0:2.3.2-95.6.ppc", "3AS:glibc-headers-0:2.3.2-95.6.s390", "3AS:glibc-headers-0:2.3.2-95.6.s390x", "3AS:glibc-headers-0:2.3.2-95.6.x86_64", "3AS:glibc-profile-0:2.3.2-95.6.i386", "3AS:glibc-profile-0:2.3.2-95.6.ia64", "3AS:glibc-profile-0:2.3.2-95.6.ppc", "3AS:glibc-profile-0:2.3.2-95.6.s390", "3AS:glibc-profile-0:2.3.2-95.6.s390x", "3AS:glibc-profile-0:2.3.2-95.6.x86_64", "3AS:glibc-utils-0:2.3.2-95.6.i386", "3AS:glibc-utils-0:2.3.2-95.6.ia64", "3AS:glibc-utils-0:2.3.2-95.6.ppc", "3AS:glibc-utils-0:2.3.2-95.6.s390", "3AS:glibc-utils-0:2.3.2-95.6.s390x", "3AS:glibc-utils-0:2.3.2-95.6.x86_64", "3AS:nptl-devel-0:2.3.2-95.6.i686", "3AS:nptl-devel-0:2.3.2-95.6.ia64", "3AS:nptl-devel-0:2.3.2-95.6.ppc", "3AS:nptl-devel-0:2.3.2-95.6.s390", "3AS:nptl-devel-0:2.3.2-95.6.s390x", "3AS:nptl-devel-0:2.3.2-95.6.x86_64", "3AS:nscd-0:2.3.2-95.6.i386", "3AS:nscd-0:2.3.2-95.6.ia64", "3AS:nscd-0:2.3.2-95.6.ppc", "3AS:nscd-0:2.3.2-95.6.s390", "3AS:nscd-0:2.3.2-95.6.s390x", "3AS:nscd-0:2.3.2-95.6.x86_64", "3Desktop:glibc-0:2.3.2-95.6.i386", "3Desktop:glibc-0:2.3.2-95.6.i686", "3Desktop:glibc-0:2.3.2-95.6.ia64", "3Desktop:glibc-0:2.3.2-95.6.ppc", "3Desktop:glibc-0:2.3.2-95.6.ppc64", "3Desktop:glibc-0:2.3.2-95.6.s390", "3Desktop:glibc-0:2.3.2-95.6.s390x", "3Desktop:glibc-0:2.3.2-95.6.src", "3Desktop:glibc-0:2.3.2-95.6.x86_64", "3Desktop:glibc-common-0:2.3.2-95.6.i386", "3Desktop:glibc-common-0:2.3.2-95.6.ia64", "3Desktop:glibc-common-0:2.3.2-95.6.ppc", "3Desktop:glibc-common-0:2.3.2-95.6.s390", "3Desktop:glibc-common-0:2.3.2-95.6.s390x", "3Desktop:glibc-common-0:2.3.2-95.6.x86_64", "3Desktop:glibc-debuginfo-0:2.3.2-95.6.i386", "3Desktop:glibc-debuginfo-0:2.3.2-95.6.i686", "3Desktop:glibc-debuginfo-0:2.3.2-95.6.ia64", "3Desktop:glibc-debuginfo-0:2.3.2-95.6.ppc", "3Desktop:glibc-debuginfo-0:2.3.2-95.6.ppc64", "3Desktop:glibc-debuginfo-0:2.3.2-95.6.s390", "3Desktop:glibc-debuginfo-0:2.3.2-95.6.s390x", "3Desktop:glibc-debuginfo-0:2.3.2-95.6.x86_64", "3Desktop:glibc-debuginfo-common-0:2.3.2-95.6.i386", "3Desktop:glibc-devel-0:2.3.2-95.6.i386", "3Desktop:glibc-devel-0:2.3.2-95.6.ia64", "3Desktop:glibc-devel-0:2.3.2-95.6.ppc", "3Desktop:glibc-devel-0:2.3.2-95.6.ppc64", "3Desktop:glibc-devel-0:2.3.2-95.6.s390", "3Desktop:glibc-devel-0:2.3.2-95.6.s390x", "3Desktop:glibc-devel-0:2.3.2-95.6.x86_64", "3Desktop:glibc-headers-0:2.3.2-95.6.i386", "3Desktop:glibc-headers-0:2.3.2-95.6.ia64", "3Desktop:glibc-headers-0:2.3.2-95.6.ppc", "3Desktop:glibc-headers-0:2.3.2-95.6.s390", "3Desktop:glibc-headers-0:2.3.2-95.6.s390x", "3Desktop:glibc-headers-0:2.3.2-95.6.x86_64", "3Desktop:glibc-profile-0:2.3.2-95.6.i386", "3Desktop:glibc-profile-0:2.3.2-95.6.ia64", "3Desktop:glibc-profile-0:2.3.2-95.6.ppc", "3Desktop:glibc-profile-0:2.3.2-95.6.s390", "3Desktop:glibc-profile-0:2.3.2-95.6.s390x", "3Desktop:glibc-profile-0:2.3.2-95.6.x86_64", "3Desktop:glibc-utils-0:2.3.2-95.6.i386", "3Desktop:glibc-utils-0:2.3.2-95.6.ia64", "3Desktop:glibc-utils-0:2.3.2-95.6.ppc", "3Desktop:glibc-utils-0:2.3.2-95.6.s390", "3Desktop:glibc-utils-0:2.3.2-95.6.s390x", "3Desktop:glibc-utils-0:2.3.2-95.6.x86_64", "3Desktop:nptl-devel-0:2.3.2-95.6.i686", "3Desktop:nptl-devel-0:2.3.2-95.6.ia64", "3Desktop:nptl-devel-0:2.3.2-95.6.ppc", "3Desktop:nptl-devel-0:2.3.2-95.6.s390", "3Desktop:nptl-devel-0:2.3.2-95.6.s390x", "3Desktop:nptl-devel-0:2.3.2-95.6.x86_64", "3Desktop:nscd-0:2.3.2-95.6.i386", "3Desktop:nscd-0:2.3.2-95.6.ia64", "3Desktop:nscd-0:2.3.2-95.6.ppc", "3Desktop:nscd-0:2.3.2-95.6.s390", "3Desktop:nscd-0:2.3.2-95.6.s390x", "3Desktop:nscd-0:2.3.2-95.6.x86_64", "3ES:glibc-0:2.3.2-95.6.i386", "3ES:glibc-0:2.3.2-95.6.i686", "3ES:glibc-0:2.3.2-95.6.ia64", "3ES:glibc-0:2.3.2-95.6.ppc", "3ES:glibc-0:2.3.2-95.6.ppc64", "3ES:glibc-0:2.3.2-95.6.s390", "3ES:glibc-0:2.3.2-95.6.s390x", "3ES:glibc-0:2.3.2-95.6.src", "3ES:glibc-0:2.3.2-95.6.x86_64", "3ES:glibc-common-0:2.3.2-95.6.i386", "3ES:glibc-common-0:2.3.2-95.6.ia64", "3ES:glibc-common-0:2.3.2-95.6.ppc", "3ES:glibc-common-0:2.3.2-95.6.s390", "3ES:glibc-common-0:2.3.2-95.6.s390x", "3ES:glibc-common-0:2.3.2-95.6.x86_64", "3ES:glibc-debuginfo-0:2.3.2-95.6.i386", "3ES:glibc-debuginfo-0:2.3.2-95.6.i686", "3ES:glibc-debuginfo-0:2.3.2-95.6.ia64", "3ES:glibc-debuginfo-0:2.3.2-95.6.ppc", "3ES:glibc-debuginfo-0:2.3.2-95.6.ppc64", "3ES:glibc-debuginfo-0:2.3.2-95.6.s390", "3ES:glibc-debuginfo-0:2.3.2-95.6.s390x", "3ES:glibc-debuginfo-0:2.3.2-95.6.x86_64", "3ES:glibc-debuginfo-common-0:2.3.2-95.6.i386", "3ES:glibc-devel-0:2.3.2-95.6.i386", "3ES:glibc-devel-0:2.3.2-95.6.ia64", "3ES:glibc-devel-0:2.3.2-95.6.ppc", "3ES:glibc-devel-0:2.3.2-95.6.ppc64", "3ES:glibc-devel-0:2.3.2-95.6.s390", "3ES:glibc-devel-0:2.3.2-95.6.s390x", "3ES:glibc-devel-0:2.3.2-95.6.x86_64", "3ES:glibc-headers-0:2.3.2-95.6.i386", "3ES:glibc-headers-0:2.3.2-95.6.ia64", "3ES:glibc-headers-0:2.3.2-95.6.ppc", "3ES:glibc-headers-0:2.3.2-95.6.s390", "3ES:glibc-headers-0:2.3.2-95.6.s390x", "3ES:glibc-headers-0:2.3.2-95.6.x86_64", "3ES:glibc-profile-0:2.3.2-95.6.i386", "3ES:glibc-profile-0:2.3.2-95.6.ia64", "3ES:glibc-profile-0:2.3.2-95.6.ppc", "3ES:glibc-profile-0:2.3.2-95.6.s390", "3ES:glibc-profile-0:2.3.2-95.6.s390x", "3ES:glibc-profile-0:2.3.2-95.6.x86_64", "3ES:glibc-utils-0:2.3.2-95.6.i386", "3ES:glibc-utils-0:2.3.2-95.6.ia64", "3ES:glibc-utils-0:2.3.2-95.6.ppc", "3ES:glibc-utils-0:2.3.2-95.6.s390", "3ES:glibc-utils-0:2.3.2-95.6.s390x", "3ES:glibc-utils-0:2.3.2-95.6.x86_64", "3ES:nptl-devel-0:2.3.2-95.6.i686", "3ES:nptl-devel-0:2.3.2-95.6.ia64", "3ES:nptl-devel-0:2.3.2-95.6.ppc", "3ES:nptl-devel-0:2.3.2-95.6.s390", "3ES:nptl-devel-0:2.3.2-95.6.s390x", "3ES:nptl-devel-0:2.3.2-95.6.x86_64", "3ES:nscd-0:2.3.2-95.6.i386", "3ES:nscd-0:2.3.2-95.6.ia64", "3ES:nscd-0:2.3.2-95.6.ppc", "3ES:nscd-0:2.3.2-95.6.s390", "3ES:nscd-0:2.3.2-95.6.s390x", "3ES:nscd-0:2.3.2-95.6.x86_64", "3WS:glibc-0:2.3.2-95.6.i386", "3WS:glibc-0:2.3.2-95.6.i686", "3WS:glibc-0:2.3.2-95.6.ia64", "3WS:glibc-0:2.3.2-95.6.ppc", "3WS:glibc-0:2.3.2-95.6.ppc64", "3WS:glibc-0:2.3.2-95.6.s390", "3WS:glibc-0:2.3.2-95.6.s390x", "3WS:glibc-0:2.3.2-95.6.src", "3WS:glibc-0:2.3.2-95.6.x86_64", "3WS:glibc-common-0:2.3.2-95.6.i386", "3WS:glibc-common-0:2.3.2-95.6.ia64", "3WS:glibc-common-0:2.3.2-95.6.ppc", "3WS:glibc-common-0:2.3.2-95.6.s390", "3WS:glibc-common-0:2.3.2-95.6.s390x", "3WS:glibc-common-0:2.3.2-95.6.x86_64", "3WS:glibc-debuginfo-0:2.3.2-95.6.i386", "3WS:glibc-debuginfo-0:2.3.2-95.6.i686", "3WS:glibc-debuginfo-0:2.3.2-95.6.ia64", "3WS:glibc-debuginfo-0:2.3.2-95.6.ppc", "3WS:glibc-debuginfo-0:2.3.2-95.6.ppc64", "3WS:glibc-debuginfo-0:2.3.2-95.6.s390", "3WS:glibc-debuginfo-0:2.3.2-95.6.s390x", "3WS:glibc-debuginfo-0:2.3.2-95.6.x86_64", "3WS:glibc-debuginfo-common-0:2.3.2-95.6.i386", "3WS:glibc-devel-0:2.3.2-95.6.i386", "3WS:glibc-devel-0:2.3.2-95.6.ia64", "3WS:glibc-devel-0:2.3.2-95.6.ppc", "3WS:glibc-devel-0:2.3.2-95.6.ppc64", "3WS:glibc-devel-0:2.3.2-95.6.s390", "3WS:glibc-devel-0:2.3.2-95.6.s390x", "3WS:glibc-devel-0:2.3.2-95.6.x86_64", "3WS:glibc-headers-0:2.3.2-95.6.i386", "3WS:glibc-headers-0:2.3.2-95.6.ia64", "3WS:glibc-headers-0:2.3.2-95.6.ppc", "3WS:glibc-headers-0:2.3.2-95.6.s390", "3WS:glibc-headers-0:2.3.2-95.6.s390x", "3WS:glibc-headers-0:2.3.2-95.6.x86_64", "3WS:glibc-profile-0:2.3.2-95.6.i386", "3WS:glibc-profile-0:2.3.2-95.6.ia64", "3WS:glibc-profile-0:2.3.2-95.6.ppc", "3WS:glibc-profile-0:2.3.2-95.6.s390", "3WS:glibc-profile-0:2.3.2-95.6.s390x", "3WS:glibc-profile-0:2.3.2-95.6.x86_64", "3WS:glibc-utils-0:2.3.2-95.6.i386", "3WS:glibc-utils-0:2.3.2-95.6.ia64", "3WS:glibc-utils-0:2.3.2-95.6.ppc", "3WS:glibc-utils-0:2.3.2-95.6.s390", "3WS:glibc-utils-0:2.3.2-95.6.s390x", "3WS:glibc-utils-0:2.3.2-95.6.x86_64", "3WS:nptl-devel-0:2.3.2-95.6.i686", "3WS:nptl-devel-0:2.3.2-95.6.ia64", "3WS:nptl-devel-0:2.3.2-95.6.ppc", "3WS:nptl-devel-0:2.3.2-95.6.s390", "3WS:nptl-devel-0:2.3.2-95.6.s390x", "3WS:nptl-devel-0:2.3.2-95.6.x86_64", "3WS:nscd-0:2.3.2-95.6.i386", "3WS:nscd-0:2.3.2-95.6.ia64", "3WS:nscd-0:2.3.2-95.6.ppc", "3WS:nscd-0:2.3.2-95.6.s390", "3WS:nscd-0:2.3.2-95.6.s390x", "3WS:nscd-0:2.3.2-95.6.x86_64", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run the following\ncommand at a shell prompt:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. On the i686\narchitecture, *.i686.rpm packages should be installed where available\nrather than *.i386.rpm.\n\nIf you are unsure which architecture you are on, run the following\ncommand at a shell prompt:\n\nrpm -q --qf '%{arch}\\n' glibc\n\nOnly those RPMs which are currently installed will be updated. Those RPMs\nwhich are not installed but included in the list will not be updated.\nNote that you can also use wildcards (*.rpm) if your current directory\nonly contains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate\nErrors, you need to install a version of the up2date client with an updated\ncertificate. The latest version of up2date is available from the Red Hat\nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-11-14T15:19:00+00:00", "2003-11-12T16:19:00+00:00" ]
CVE-2003-0858
security flaw
Low
null
null
Zebra 0.93b and earlier, and quagga before 0.95, allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.
null
2025-01-08T19:59:50+00:00
[ "3AS:quagga-0:0.96.2-8.3E.i386", "3AS:quagga-0:0.96.2-8.3E.ia64", "3AS:quagga-0:0.96.2-8.3E.ppc", "3AS:quagga-0:0.96.2-8.3E.s390", "3AS:quagga-0:0.96.2-8.3E.s390x", "3AS:quagga-0:0.96.2-8.3E.src", "3AS:quagga-0:0.96.2-8.3E.x86_64", "3AS:quagga-debuginfo-0:0.96.2-8.3E.i386", "3AS:quagga-debuginfo-0:0.96.2-8.3E.ia64", "3AS:quagga-debuginfo-0:0.96.2-8.3E.ppc", "3AS:quagga-debuginfo-0:0.96.2-8.3E.s390", "3AS:quagga-debuginfo-0:0.96.2-8.3E.s390x", "3AS:quagga-debuginfo-0:0.96.2-8.3E.x86_64", "3ES:quagga-0:0.96.2-8.3E.i386", "3ES:quagga-0:0.96.2-8.3E.ia64", "3ES:quagga-0:0.96.2-8.3E.ppc", "3ES:quagga-0:0.96.2-8.3E.s390", "3ES:quagga-0:0.96.2-8.3E.s390x", "3ES:quagga-0:0.96.2-8.3E.src", "3ES:quagga-0:0.96.2-8.3E.x86_64", "3ES:quagga-debuginfo-0:0.96.2-8.3E.i386", "3ES:quagga-debuginfo-0:0.96.2-8.3E.ia64", "3ES:quagga-debuginfo-0:0.96.2-8.3E.ppc", "3ES:quagga-debuginfo-0:0.96.2-8.3E.s390", "3ES:quagga-debuginfo-0:0.96.2-8.3E.s390x", "3ES:quagga-debuginfo-0:0.96.2-8.3E.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-11-12T14:16:00+00:00", "2003-11-12T14:08:00+00:00", "2003-11-13T08:34:00+00:00" ]
CVE-2003-0788
security flaw
Moderate
null
null
Unknown vulnerability in the Internet Printing Protocol (IPP) implementation in CUPS before 1.1.19 allows remote attackers to cause a denial of service (CPU consumption from a "busy loop") via certain inputs to the IPP port (TCP 631).
null
2025-01-08T20:01:10+00:00
[ "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-11-03T09:25:00+00:00" ]
CVE-2003-0730
security flaw
Important
null
null
Multiple integer overflows in the font libraries for XFree86 4.3.0 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks.
null
2025-01-08T19:59:56+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-11-12T14:12:00+00:00", "2003-11-25T09:22:00+00:00", "2003-11-25T09:54:00+00:00", "2003-11-17T20:25:00+00:00" ]
CVE-2003-0073
security flaw
Important
null
null
Double-free vulnerability in mysqld for MySQL before 3.23.55 allows attackers with MySQL access to cause a denial of service (crash) via mysql_change_user.
null
2025-01-08T20:05:42+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-04-28T12:53:00+00:00", "2003-04-29T18:58:00+00:00" ]
CVE-2003-0136
security flaw
None
null
null
psbanner in the LPRng package allows local users to overwrite arbitrary files via a symbolic link attack on the /tmp/before file.
null
2025-01-08T20:04:26+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-05-22T17:32:00+00:00", "2003-04-24T20:55:00+00:00" ]
CVE-2003-0927
security flaw
Moderate
null
null
Heap-based buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the SOCKS dissector.
null
2025-01-08T19:59:06+00:00
[ "3AS:ethereal-0:0.9.16-0.30E.1.i386", "3AS:ethereal-0:0.9.16-0.30E.1.ia64", "3AS:ethereal-0:0.9.16-0.30E.1.ppc", "3AS:ethereal-0:0.9.16-0.30E.1.s390", "3AS:ethereal-0:0.9.16-0.30E.1.s390x", "3AS:ethereal-0:0.9.16-0.30E.1.src", "3AS:ethereal-0:0.9.16-0.30E.1.x86_64", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.i386", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.ia64", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.ppc", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.s390", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.s390x", "3AS:ethereal-gnome-0:0.9.16-0.30E.1.x86_64", "3Desktop:ethereal-0:0.9.16-0.30E.1.i386", "3Desktop:ethereal-0:0.9.16-0.30E.1.ia64", "3Desktop:ethereal-0:0.9.16-0.30E.1.ppc", "3Desktop:ethereal-0:0.9.16-0.30E.1.s390", "3Desktop:ethereal-0:0.9.16-0.30E.1.s390x", "3Desktop:ethereal-0:0.9.16-0.30E.1.src", "3Desktop:ethereal-0:0.9.16-0.30E.1.x86_64", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.i386", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.ia64", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.ppc", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.s390", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.s390x", "3Desktop:ethereal-gnome-0:0.9.16-0.30E.1.x86_64", "3ES:ethereal-0:0.9.16-0.30E.1.i386", "3ES:ethereal-0:0.9.16-0.30E.1.ia64", "3ES:ethereal-0:0.9.16-0.30E.1.ppc", "3ES:ethereal-0:0.9.16-0.30E.1.s390", "3ES:ethereal-0:0.9.16-0.30E.1.s390x", "3ES:ethereal-0:0.9.16-0.30E.1.src", "3ES:ethereal-0:0.9.16-0.30E.1.x86_64", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.i386", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.ia64", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.ppc", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.s390", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.s390x", "3ES:ethereal-gnome-0:0.9.16-0.30E.1.x86_64", "3WS:ethereal-0:0.9.16-0.30E.1.i386", "3WS:ethereal-0:0.9.16-0.30E.1.ia64", "3WS:ethereal-0:0.9.16-0.30E.1.ppc", "3WS:ethereal-0:0.9.16-0.30E.1.s390", "3WS:ethereal-0:0.9.16-0.30E.1.s390x", "3WS:ethereal-0:0.9.16-0.30E.1.src", "3WS:ethereal-0:0.9.16-0.30E.1.x86_64", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.i386", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.ia64", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.ppc", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.s390", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.s390x", "3WS:ethereal-gnome-0:0.9.16-0.30E.1.x86_64", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-11-12T14:05:00+00:00", "2003-11-10T17:53:00+00:00" ]
CVE-2003-0161
security flaw
Critical
null
null
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
null
2025-01-08T20:05:00+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-31T15:23:00+00:00", "2003-03-31T17:14:00+00:00" ]
CVE-2003-0248
security flaw
Moderate
null
null
The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address.
null
2025-01-08T20:06:08+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system." ]
[ "2003-06-19T13:55:00+00:00", "2003-06-03T10:40:00+00:00" ]
CVE-2003-0618
leaks file existance information
Low
null
null
Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions.
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 4.
2025-01-07T21:21:25+00:00
[ "Red Hat Desktop version 3", "Red Hat Enterprise Linux AS version 3", "Red Hat Enterprise Linux ES version 3", "Red Hat Enterprise Linux WS version 3" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2006-07-20T00:00:00+00:00" ]
CVE-2003-0462
security flaw
Important
null
null
A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash).
null
2025-01-08T20:06:52+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system." ]
[ "2003-08-21T17:40:00+00:00", "2003-08-21T17:23:00+00:00", "2003-07-21T15:36:00+00:00" ]
CVE-2003-0966
security flaw
Important
null
null
Buffer overflow in the frm command in elm 2.5.6 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code via a long Subject line.
null
2025-01-08T19:58:42+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2004-01-14T13:16:00+00:00" ]
CVE-2003-0989
security flaw
Moderate
null
null
tcpdump before 3.8.1 allows remote attackers to cause a denial of service (infinite loop) via certain ISAKMP packets, a different vulnerability than CVE-2004-0057.
null
2025-01-08T19:58:42+00:00
[ "2.1AS:arpwatch-14:2.1a11-12.2.1AS.5.i386", "2.1AS:arpwatch-14:2.1a11-12.2.1AS.5.ia64", "2.1AS:libpcap-14:0.6.2-12.2.1AS.5.i386", "2.1AS:libpcap-14:0.6.2-12.2.1AS.5.ia64", "2.1AS:tcpdump-14:3.6.2-12.2.1AS.5.i386", "2.1AS:tcpdump-14:3.6.2-12.2.1AS.5.ia64", "2.1AS:tcpdump-14:3.6.2-12.2.1AS.5.src", "2.1AW:arpwatch-14:2.1a11-12.2.1AS.5.i386", "2.1AW:arpwatch-14:2.1a11-12.2.1AS.5.ia64", "2.1AW:libpcap-14:0.6.2-12.2.1AS.5.i386", "2.1AW:libpcap-14:0.6.2-12.2.1AS.5.ia64", "2.1AW:tcpdump-14:3.6.2-12.2.1AS.5.i386", "2.1AW:tcpdump-14:3.6.2-12.2.1AS.5.ia64", "2.1AW:tcpdump-14:3.6.2-12.2.1AS.5.src", "2.1ES:arpwatch-14:2.1a11-12.2.1AS.5.i386", "2.1ES:arpwatch-14:2.1a11-12.2.1AS.5.ia64", "2.1ES:libpcap-14:0.6.2-12.2.1AS.5.i386", "2.1ES:libpcap-14:0.6.2-12.2.1AS.5.ia64", "2.1ES:tcpdump-14:3.6.2-12.2.1AS.5.i386", "2.1ES:tcpdump-14:3.6.2-12.2.1AS.5.ia64", "2.1ES:tcpdump-14:3.6.2-12.2.1AS.5.src", "2.1WS:arpwatch-14:2.1a11-12.2.1AS.5.i386", "2.1WS:arpwatch-14:2.1a11-12.2.1AS.5.ia64", "2.1WS:libpcap-14:0.6.2-12.2.1AS.5.i386", "2.1WS:libpcap-14:0.6.2-12.2.1AS.5.ia64", "2.1WS:tcpdump-14:3.6.2-12.2.1AS.5.i386", "2.1WS:tcpdump-14:3.6.2-12.2.1AS.5.ia64", "2.1WS:tcpdump-14:3.6.2-12.2.1AS.5.src", "3AS:libpcap-14:0.7.2-7.E3.1.i386", "3AS:libpcap-14:0.7.2-7.E3.1.ia64", "3AS:libpcap-14:0.7.2-7.E3.1.ppc", "3AS:libpcap-14:0.7.2-7.E3.1.ppc64", "3AS:libpcap-14:0.7.2-7.E3.1.s390", "3AS:libpcap-14:0.7.2-7.E3.1.s390x", "3AS:libpcap-14:0.7.2-7.E3.1.x86_64", "3AS:tcpdump-14:3.7.2-7.E3.1.i386", "3AS:tcpdump-14:3.7.2-7.E3.1.ia64", "3AS:tcpdump-14:3.7.2-7.E3.1.ppc", "3AS:tcpdump-14:3.7.2-7.E3.1.s390", "3AS:tcpdump-14:3.7.2-7.E3.1.s390x", "3AS:tcpdump-14:3.7.2-7.E3.1.src", "3AS:tcpdump-14:3.7.2-7.E3.1.x86_64", "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.i386", "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ia64", "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc", "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc64", "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390", "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390x", "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.1.x86_64", "3Desktop:libpcap-14:0.7.2-7.E3.1.i386", "3Desktop:libpcap-14:0.7.2-7.E3.1.ia64", "3Desktop:libpcap-14:0.7.2-7.E3.1.ppc", "3Desktop:libpcap-14:0.7.2-7.E3.1.ppc64", "3Desktop:libpcap-14:0.7.2-7.E3.1.s390", "3Desktop:libpcap-14:0.7.2-7.E3.1.s390x", "3Desktop:libpcap-14:0.7.2-7.E3.1.x86_64", "3Desktop:tcpdump-14:3.7.2-7.E3.1.i386", "3Desktop:tcpdump-14:3.7.2-7.E3.1.ia64", "3Desktop:tcpdump-14:3.7.2-7.E3.1.ppc", "3Desktop:tcpdump-14:3.7.2-7.E3.1.s390", "3Desktop:tcpdump-14:3.7.2-7.E3.1.s390x", "3Desktop:tcpdump-14:3.7.2-7.E3.1.src", "3Desktop:tcpdump-14:3.7.2-7.E3.1.x86_64", "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.i386", "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.ia64", "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc", "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc64", "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390", "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390x", "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.1.x86_64", "3ES:libpcap-14:0.7.2-7.E3.1.i386", "3ES:libpcap-14:0.7.2-7.E3.1.ia64", "3ES:libpcap-14:0.7.2-7.E3.1.ppc", "3ES:libpcap-14:0.7.2-7.E3.1.ppc64", "3ES:libpcap-14:0.7.2-7.E3.1.s390", "3ES:libpcap-14:0.7.2-7.E3.1.s390x", "3ES:libpcap-14:0.7.2-7.E3.1.x86_64", "3ES:tcpdump-14:3.7.2-7.E3.1.i386", "3ES:tcpdump-14:3.7.2-7.E3.1.ia64", "3ES:tcpdump-14:3.7.2-7.E3.1.ppc", "3ES:tcpdump-14:3.7.2-7.E3.1.s390", "3ES:tcpdump-14:3.7.2-7.E3.1.s390x", "3ES:tcpdump-14:3.7.2-7.E3.1.src", "3ES:tcpdump-14:3.7.2-7.E3.1.x86_64", "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.i386", "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.ia64", "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc", "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc64", "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390", "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390x", "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.1.x86_64", "3WS:libpcap-14:0.7.2-7.E3.1.i386", "3WS:libpcap-14:0.7.2-7.E3.1.ia64", "3WS:libpcap-14:0.7.2-7.E3.1.ppc", "3WS:libpcap-14:0.7.2-7.E3.1.ppc64", "3WS:libpcap-14:0.7.2-7.E3.1.s390", "3WS:libpcap-14:0.7.2-7.E3.1.s390x", "3WS:libpcap-14:0.7.2-7.E3.1.x86_64", "3WS:tcpdump-14:3.7.2-7.E3.1.i386", "3WS:tcpdump-14:3.7.2-7.E3.1.ia64", "3WS:tcpdump-14:3.7.2-7.E3.1.ppc", "3WS:tcpdump-14:3.7.2-7.E3.1.s390", "3WS:tcpdump-14:3.7.2-7.E3.1.s390x", "3WS:tcpdump-14:3.7.2-7.E3.1.src", "3WS:tcpdump-14:3.7.2-7.E3.1.x86_64", "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.i386", "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ia64", "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc", "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.ppc64", "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390", "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.s390x", "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.1.x86_64", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2004-01-15T10:31:00+00:00", "2004-01-14T19:43:00+00:00" ]
CVE-2003-1418
httpd information disclosure in FileEtag
Low
2.6/AV:N/AC:H/Au:N/C:P/I:N/A:N
null
Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).
Red Hat does not consider this to be a security issue. The information returned poses no threat to the target machine running httpd.
2025-01-08T04:10:35+00:00
[]
[ "red_hat_enterprise_linux_4:httpd", "red_hat_enterprise_linux_5:httpd", "red_hat_enterprise_linux_6:httpd" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned" ]
[ "Will not fix" ]
[ null ]
CVE-2003-0854
security flaw
Important
null
null
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
null
2025-01-08T20:01:44+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-11-12T14:06:00+00:00", "2003-11-03T15:26:00+00:00" ]
CVE-2003-0442
security flaw
None
null
null
Cross-site scripting (XSS) vulnerability in the transparent SID support capability for PHP before 4.3.2 (session.use_trans_sid) allows remote attackers to insert arbitrary script via the PHPSESSID parameter.
null
2025-01-08T20:04:12+00:00
[ "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-07-02T15:30:00+00:00" ]
CVE-2003-0550
security flaw
Moderate
null
null
The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows attackers to modify the bridge topology.
null
2025-01-08T20:01:58+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system." ]
[ "2003-08-21T17:40:00+00:00", "2003-08-21T17:23:00+00:00", "2003-07-21T15:36:00+00:00" ]
CVE-2003-0546
security flaw
None
null
null
up2date 3.0.7 and 3.1.23 does not properly verify RPM GPG signatures, which could allow remote attackers to cause unsigned packages to be installed from the Red Hat Network, if that network is compromised.
null
2025-01-08T19:58:00+00:00
[ "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-08-08T16:32:00+00:00" ]
CVE-2003-0356
security flaw
Moderate
null
null
Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not properly use the tvb_get_nstringz and tvb_get_nstringz0 functions.
null
2025-01-08T20:09:19+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-07-08T19:59:00+00:00", "2003-07-03T08:31:00+00:00" ]
CVE-2003-0244
security flaw
Important
null
null
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
null
2025-01-08T20:06:02+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2003-05-27T18:52:00+00:00", "2003-05-30T01:33:00+00:00", "2003-06-25T17:45:00+00:00" ]
CVE-2003-0028
security flaw
Critical
null
null
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391.
null
2025-01-08T20:06:24+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-27T19:43:00+00:00", "2003-03-26T21:49:00+00:00", "2003-04-02T09:57:00+00:00" ]
CVE-2003-0252
security flaw
Important
null
null
Off-by-one error in the xlog function of mountd in the Linux NFS utils package (nfs-utils) before 1.0.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain RPC requests to mountd that do not contain newlines.
This issue has been addressed in nfs-utils packages as shipped in Red Hat Enterprise Linux 2 via https://rhn.redhat.com/errata/RHSA-2003-207.html.
2025-01-08T13:35:49+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-07-14T16:08:00+00:00", "2003-07-14T16:10:00+00:00" ]
CVE-2003-1013
security flaw
Low
null
null
The Q.931 dissector in Ethereal before 0.10.0, and Tethereal, allows remote attackers to cause a denial of service (crash) via a malformed Q.931, which triggers a null dereference.
null
2025-01-08T20:01:04+00:00
[ "3AS:ethereal-0:0.10.0a-0.30E.1.i386", "3AS:ethereal-0:0.10.0a-0.30E.1.ia64", "3AS:ethereal-0:0.10.0a-0.30E.1.ppc", "3AS:ethereal-0:0.10.0a-0.30E.1.s390", "3AS:ethereal-0:0.10.0a-0.30E.1.s390x", "3AS:ethereal-0:0.10.0a-0.30E.1.src", "3AS:ethereal-0:0.10.0a-0.30E.1.x86_64", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.i386", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.ia64", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.ppc", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.s390", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.s390x", "3AS:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64", "3Desktop:ethereal-0:0.10.0a-0.30E.1.i386", "3Desktop:ethereal-0:0.10.0a-0.30E.1.ia64", "3Desktop:ethereal-0:0.10.0a-0.30E.1.ppc", "3Desktop:ethereal-0:0.10.0a-0.30E.1.s390", "3Desktop:ethereal-0:0.10.0a-0.30E.1.s390x", "3Desktop:ethereal-0:0.10.0a-0.30E.1.src", "3Desktop:ethereal-0:0.10.0a-0.30E.1.x86_64", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.i386", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.ia64", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.ppc", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.s390", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.s390x", "3Desktop:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64", "3ES:ethereal-0:0.10.0a-0.30E.1.i386", "3ES:ethereal-0:0.10.0a-0.30E.1.ia64", "3ES:ethereal-0:0.10.0a-0.30E.1.ppc", "3ES:ethereal-0:0.10.0a-0.30E.1.s390", "3ES:ethereal-0:0.10.0a-0.30E.1.s390x", "3ES:ethereal-0:0.10.0a-0.30E.1.src", "3ES:ethereal-0:0.10.0a-0.30E.1.x86_64", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.i386", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.ia64", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.ppc", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.s390", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.s390x", "3ES:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64", "3WS:ethereal-0:0.10.0a-0.30E.1.i386", "3WS:ethereal-0:0.10.0a-0.30E.1.ia64", "3WS:ethereal-0:0.10.0a-0.30E.1.ppc", "3WS:ethereal-0:0.10.0a-0.30E.1.s390", "3WS:ethereal-0:0.10.0a-0.30E.1.s390x", "3WS:ethereal-0:0.10.0a-0.30E.1.src", "3WS:ethereal-0:0.10.0a-0.30E.1.x86_64", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.i386", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.ia64", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.ppc", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.s390", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.s390x", "3WS:ethereal-gnome-0:0.10.0a-0.30E.1.x86_64", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2004-01-20T16:45:00+00:00", "2004-01-07T18:12:00+00:00" ]
CVE-2003-0194
security flaw
None
null
null
tcpdump does not properly drop privileges to the pcap user when starting up.
null
2025-01-08T20:04:31+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-06-09T13:44:00+00:00", "2003-05-15T08:00:00+00:00" ]
CVE-2003-0985
security flaw
Important
null
null
The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077.
null
2025-01-07T23:17:31+00:00
[ "3AS:kernel-0:2.4.21-4.0.2.EL.athlon", "3AS:kernel-0:2.4.21-4.0.2.EL.i686", "3AS:kernel-0:2.4.21-4.0.2.EL.ia64", "3AS:kernel-0:2.4.21-4.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-4.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-4.0.2.EL.s390", "3AS:kernel-0:2.4.21-4.0.2.EL.s390x", "3AS:kernel-0:2.4.21-4.0.2.EL.src", "3AS:kernel-0:2.4.21-4.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-4.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-4.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-4.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-4.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-4.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-4.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-4.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-4.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-4.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-4.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-4.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-4.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-4.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-4.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-4.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-4.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-4.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-4.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-4.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-4.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-4.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-4.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-4.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-4.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-4.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-4.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-4.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-4.0.2.EL.src", "3Desktop:kernel-0:2.4.21-4.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-4.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-4.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-4.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-4.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-4.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-4.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-4.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-4.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-4.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-4.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-4.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-4.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-4.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-4.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-4.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-4.0.2.EL.athlon", "3ES:kernel-0:2.4.21-4.0.2.EL.i686", "3ES:kernel-0:2.4.21-4.0.2.EL.ia64", "3ES:kernel-0:2.4.21-4.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-4.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-4.0.2.EL.s390", "3ES:kernel-0:2.4.21-4.0.2.EL.s390x", "3ES:kernel-0:2.4.21-4.0.2.EL.src", "3ES:kernel-0:2.4.21-4.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-4.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-4.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-4.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-4.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-4.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-4.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-4.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-4.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-4.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-4.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-4.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-4.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-4.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-4.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-4.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-4.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-4.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-4.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-4.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-4.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-4.0.2.EL.athlon", "3WS:kernel-0:2.4.21-4.0.2.EL.i686", "3WS:kernel-0:2.4.21-4.0.2.EL.ia64", "3WS:kernel-0:2.4.21-4.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-4.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-4.0.2.EL.s390", "3WS:kernel-0:2.4.21-4.0.2.EL.s390x", "3WS:kernel-0:2.4.21-4.0.2.EL.src", "3WS:kernel-0:2.4.21-4.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-4.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-4.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-4.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-4.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-4.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-4.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-4.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-4.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-4.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-4.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-4.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-4.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-4.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-4.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-4.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-4.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-4.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-4.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-4.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-4.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-4.0.2.EL.x86_64", "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2004-01-07T18:20:00+00:00", "2004-01-05T14:41:00+00:00", "2004-01-05T14:51:00+00:00", "2004-01-05T12:50:00+00:00" ]
CVE-2003-0086
security flaw
Moderate
null
null
The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown.
null
2025-01-08T20:08:25+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-20T21:19:00+00:00", "2003-03-18T00:56:00+00:00" ]
CVE-2003-0432
security flaw
Low
null
null
Ethereal 0.9.12 and earlier does not handle certain strings properly, with unknown consequences, in the (1) BGP, (2) WTP, (3) DNS, (4) 802.11, (5) ISAKMP, (6) WSP, (7) CLNP, (8) ISIS, and (9) RMI dissectors.
null
2025-01-08T20:08:46+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-07-08T19:59:00+00:00", "2003-07-03T08:31:00+00:00" ]
CVE-2003-0961
security flaw
Important
null
null
Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges.
null
2025-01-08T19:59:28+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux AS version 3", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Enterprise Linux WS version 3", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system." ]
[ "2003-12-19T18:10:00+00:00", "2003-12-02T00:00:00+00:00", "2003-12-01T19:18:00+00:00", "2003-12-02T03:28:00+00:00" ]
CVE-2003-0127
security flaw
Important
null
null
The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
null
2025-01-08T20:05:13+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo use Red Hat Network to upgrade the kernel, launch the Red Hat Update\nAgent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the\nkernel explicitly if you are using the default configuration of up2date.\n\nTo install kernel packages manually, use \"rpm -ivh <package>\" and\nmodify system settings to boot the kernel you have installed. To\ndo this, edit /boot/grub/grub.conf and change the default entry to\n\"default=0\" (or, if you have chosen to use LILO as your boot loader,\nedit /etc/lilo.conf and run lilo)\n\nDo not use \"rpm -Uvh\" as that will remove your running kernel binaries\nfrom your system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2003-03-21T08:53:00+00:00", "2003-03-20T08:56:00+00:00", "2003-03-17T16:11:00+00:00", "2003-04-08T16:34:00+00:00", "2003-05-27T18:52:00+00:00" ]
CVE-2003-0465
security flaw
Low
null
null
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
null
2025-01-08T20:02:12+00:00
[ "3AS:kernel-0:2.4.21-15.EL.athlon", "3AS:kernel-0:2.4.21-15.EL.i686", "3AS:kernel-0:2.4.21-15.EL.ia32e", "3AS:kernel-0:2.4.21-15.EL.ia64", "3AS:kernel-0:2.4.21-15.EL.ppc64iseries", "3AS:kernel-0:2.4.21-15.EL.ppc64pseries", "3AS:kernel-0:2.4.21-15.EL.s390", "3AS:kernel-0:2.4.21-15.EL.s390x", "3AS:kernel-0:2.4.21-15.EL.src", "3AS:kernel-0:2.4.21-15.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-15.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-15.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-15.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-15.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-15.EL.x86_64", "3AS:kernel-doc-0:2.4.21-15.EL.i386", "3AS:kernel-doc-0:2.4.21-15.EL.ia64", "3AS:kernel-doc-0:2.4.21-15.EL.ppc64", "3AS:kernel-doc-0:2.4.21-15.EL.s390", "3AS:kernel-doc-0:2.4.21-15.EL.s390x", "3AS:kernel-doc-0:2.4.21-15.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-15.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686", "3AS:kernel-smp-0:2.4.21-15.EL.athlon", "3AS:kernel-smp-0:2.4.21-15.EL.i686", "3AS:kernel-smp-0:2.4.21-15.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-15.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-15.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64", "3AS:kernel-source-0:2.4.21-15.EL.i386", "3AS:kernel-source-0:2.4.21-15.EL.ia64", "3AS:kernel-source-0:2.4.21-15.EL.ppc64", "3AS:kernel-source-0:2.4.21-15.EL.s390", "3AS:kernel-source-0:2.4.21-15.EL.s390x", "3AS:kernel-source-0:2.4.21-15.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-15.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-15.EL.i686", "3AS:kernel-unsupported-0:2.4.21-15.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-15.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-15.EL.s390", "3AS:kernel-unsupported-0:2.4.21-15.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-0:2.4.21-15.EL.athlon", "3Desktop:kernel-0:2.4.21-15.EL.i686", "3Desktop:kernel-0:2.4.21-15.EL.ia32e", "3Desktop:kernel-0:2.4.21-15.EL.ia64", "3Desktop:kernel-0:2.4.21-15.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-15.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-15.EL.s390", "3Desktop:kernel-0:2.4.21-15.EL.s390x", "3Desktop:kernel-0:2.4.21-15.EL.src", "3Desktop:kernel-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-15.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-15.EL.i386", "3Desktop:kernel-doc-0:2.4.21-15.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-15.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-15.EL.s390", "3Desktop:kernel-doc-0:2.4.21-15.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-15.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-15.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-15.EL.i386", "3Desktop:kernel-source-0:2.4.21-15.EL.ia64", "3Desktop:kernel-source-0:2.4.21-15.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-15.EL.s390", "3Desktop:kernel-source-0:2.4.21-15.EL.s390x", "3Desktop:kernel-source-0:2.4.21-15.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-15.EL.x86_64", "3ES:kernel-0:2.4.21-15.EL.athlon", "3ES:kernel-0:2.4.21-15.EL.i686", "3ES:kernel-0:2.4.21-15.EL.ia32e", "3ES:kernel-0:2.4.21-15.EL.ia64", "3ES:kernel-0:2.4.21-15.EL.ppc64iseries", "3ES:kernel-0:2.4.21-15.EL.ppc64pseries", "3ES:kernel-0:2.4.21-15.EL.s390", "3ES:kernel-0:2.4.21-15.EL.s390x", "3ES:kernel-0:2.4.21-15.EL.src", "3ES:kernel-0:2.4.21-15.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-15.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-15.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-15.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-15.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-15.EL.x86_64", "3ES:kernel-doc-0:2.4.21-15.EL.i386", "3ES:kernel-doc-0:2.4.21-15.EL.ia64", "3ES:kernel-doc-0:2.4.21-15.EL.ppc64", "3ES:kernel-doc-0:2.4.21-15.EL.s390", "3ES:kernel-doc-0:2.4.21-15.EL.s390x", "3ES:kernel-doc-0:2.4.21-15.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-15.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686", "3ES:kernel-smp-0:2.4.21-15.EL.athlon", "3ES:kernel-smp-0:2.4.21-15.EL.i686", "3ES:kernel-smp-0:2.4.21-15.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-15.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-15.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64", "3ES:kernel-source-0:2.4.21-15.EL.i386", "3ES:kernel-source-0:2.4.21-15.EL.ia64", "3ES:kernel-source-0:2.4.21-15.EL.ppc64", "3ES:kernel-source-0:2.4.21-15.EL.s390", "3ES:kernel-source-0:2.4.21-15.EL.s390x", "3ES:kernel-source-0:2.4.21-15.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-15.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-15.EL.i686", "3ES:kernel-unsupported-0:2.4.21-15.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-15.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-15.EL.s390", "3ES:kernel-unsupported-0:2.4.21-15.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-15.EL.x86_64", "3WS:kernel-0:2.4.21-15.EL.athlon", "3WS:kernel-0:2.4.21-15.EL.i686", "3WS:kernel-0:2.4.21-15.EL.ia32e", "3WS:kernel-0:2.4.21-15.EL.ia64", "3WS:kernel-0:2.4.21-15.EL.ppc64iseries", "3WS:kernel-0:2.4.21-15.EL.ppc64pseries", "3WS:kernel-0:2.4.21-15.EL.s390", "3WS:kernel-0:2.4.21-15.EL.s390x", "3WS:kernel-0:2.4.21-15.EL.src", "3WS:kernel-0:2.4.21-15.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-15.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-15.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-15.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-15.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-15.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-15.EL.x86_64", "3WS:kernel-doc-0:2.4.21-15.EL.i386", "3WS:kernel-doc-0:2.4.21-15.EL.ia64", "3WS:kernel-doc-0:2.4.21-15.EL.ppc64", "3WS:kernel-doc-0:2.4.21-15.EL.s390", "3WS:kernel-doc-0:2.4.21-15.EL.s390x", "3WS:kernel-doc-0:2.4.21-15.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-15.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-15.EL.i686", "3WS:kernel-smp-0:2.4.21-15.EL.athlon", "3WS:kernel-smp-0:2.4.21-15.EL.i686", "3WS:kernel-smp-0:2.4.21-15.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-15.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-15.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-15.EL.x86_64", "3WS:kernel-source-0:2.4.21-15.EL.i386", "3WS:kernel-source-0:2.4.21-15.EL.ia64", "3WS:kernel-source-0:2.4.21-15.EL.ppc64", "3WS:kernel-source-0:2.4.21-15.EL.s390", "3WS:kernel-source-0:2.4.21-15.EL.s390x", "3WS:kernel-source-0:2.4.21-15.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-15.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-15.EL.i686", "3WS:kernel-unsupported-0:2.4.21-15.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-15.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-15.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-15.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-15.EL.s390", "3WS:kernel-unsupported-0:2.4.21-15.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-15.EL.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2004-05-12T01:07:00+00:00" ]
CVE-2003-0189
security flaw
None
null
null
The authentication module for Apache 2.0.40 through 2.0.45 on Unix does not properly handle threads safely when using the crypt_r or crypt functions, which allows remote attackers to cause a denial of service (failed Basic authentication with valid usernames and passwords) when a threaded MPM is used.
null
2025-01-08T20:04:26+00:00
[ "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-05-28T16:25:00+00:00" ]
CVE-2003-0023
security flaw
Important
null
null
The menuBar feature in rxvt 2.7.8 allows attackers to modify menu options and execute arbitrary commands via a certain character escape sequence that inserts the commands into the menu.
null
2025-01-08T20:09:51+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-11T08:52:00+00:00", "2003-03-17T13:44:00+00:00" ]
CVE-2003-0977
security flaw
Low
null
null
CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests.
null
2025-01-08T19:58:23+00:00
[ "3AS:cvs-0:1.11.2-14.i386", "3AS:cvs-0:1.11.2-14.ia64", "3AS:cvs-0:1.11.2-14.ppc", "3AS:cvs-0:1.11.2-14.s390", "3AS:cvs-0:1.11.2-14.s390x", "3AS:cvs-0:1.11.2-14.src", "3AS:cvs-0:1.11.2-14.x86_64", "3Desktop:cvs-0:1.11.2-14.i386", "3Desktop:cvs-0:1.11.2-14.ia64", "3Desktop:cvs-0:1.11.2-14.ppc", "3Desktop:cvs-0:1.11.2-14.s390", "3Desktop:cvs-0:1.11.2-14.s390x", "3Desktop:cvs-0:1.11.2-14.src", "3Desktop:cvs-0:1.11.2-14.x86_64", "3ES:cvs-0:1.11.2-14.i386", "3ES:cvs-0:1.11.2-14.ia64", "3ES:cvs-0:1.11.2-14.ppc", "3ES:cvs-0:1.11.2-14.s390", "3ES:cvs-0:1.11.2-14.s390x", "3ES:cvs-0:1.11.2-14.src", "3ES:cvs-0:1.11.2-14.x86_64", "3WS:cvs-0:1.11.2-14.i386", "3WS:cvs-0:1.11.2-14.ia64", "3WS:cvs-0:1.11.2-14.ppc", "3WS:cvs-0:1.11.2-14.s390", "3WS:cvs-0:1.11.2-14.s390x", "3WS:cvs-0:1.11.2-14.src", "3WS:cvs-0:1.11.2-14.x86_64", "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2004-01-14T13:16:00+00:00", "2004-01-12T15:44:00+00:00" ]
CVE-2003-0131
security flaw
Important
null
null
The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and 0.9.7a allow remote attackers to perform an unauthorized RSA private key operation via a modified Bleichenbacher attack that uses a large number of SSL or TLS connections using PKCS #1 v1.5 padding that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext, aka the "Klima-Pokorny-Rosa attack."
Red Hat Enterprise Linux 4 and 5 are not vulnerable to this issue as they both contain a backported patch.
2025-01-08T13:35:31+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1", "Red Hat Stronghold 3", "Red Hat Stronghold 4" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "We have backported the security fixes for the versions of OpenSSL included\nin Stronghold 3. Stronghold 3.0 build code 3022 is now available, includes\nthese fixes, and can be downloaded from:\n\nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3.0, see:\n\nhttp://stronghold.redhat.com/support/upgrade-sh3.xml", "Fixed Stronghold 4 packages are now available via the update agent service; run\n\n$ bin/agent\n\nfrom the Stronghold 4 install root to upgrade an existing Stronghold 4\ninstallation to the new package versions. After upgrading Stronghold, the\nserver must be completely restarted by running the following commands from\nthe install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nsee http://stronghold.redhat.com/support/upgrade-sh4" ]
[ "2003-03-31T12:00:00+00:00", "2003-04-01T15:50:00+00:00", "2003-04-15T13:13:00+00:00", "2003-03-28T13:43:00+00:00" ]
CVE-2003-0776
security flaw
Moderate
null
null
saned in sane-backends 1.0.7 and earlier does not properly "check the validity of the RPC numbers it gets before getting the parameters," with unknown consequences.
null
2025-01-08T20:00:22+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-10-07T15:52:00+00:00", "2003-10-07T19:10:00+00:00" ]
CVE-2003-0721
security flaw
Important
null
null
Integer signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number.
null
2025-01-08T19:57:17+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-09-11T06:48:00+00:00", "2003-09-11T06:51:00+00:00" ]
CVE-2003-0058
security flaw
Moderate
null
null
MIT Kerberos V5 Key Distribution Center (KDC) before 1.2.5 allows remote authenticated attackers to cause a denial of service (crash) on KDCs within the same realm via a certain protocol request that causes a null dereference.
null
2025-01-08T20:06:56+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-27T19:43:00+00:00", "2003-03-26T21:49:00+00:00" ]
CVE-2003-0367
gzip
symlink attack on temporary files leads to arbitrary file overwrite
Moderate
null
6.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
2025-01-07T23:04:44+00:00
[]
[]
[ "red_hat_enterprise_linux_5:gzip", "red_hat_enterprise_linux_6:gzip", "red_hat_enterprise_linux_7:gzip", "red_hat_enterprise_linux_8:gzip" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2003-0388
security flaw
Low
null
null
pam_wheel in Linux-PAM 0.78, with the trust option enabled and the use_uid option disabled, allows local users to spoof log entries and gain privileges by causing getlogin() to return a spoofed user name.
null
2025-01-08T20:06:14+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/" ]
[ "2004-08-18T15:12:00+00:00" ]
CVE-2003-0019
security flaw
None
null
null
uml_net in the kernel-utils package for Red Hat Linux 8.0 has incorrect setuid root privileges, which allows local users to modify network interfaces, e.g. by modifying ARP entries or placing interfaces into promiscuous mode.
null
2025-01-08T20:05:50+00:00
[ "Red Hat Linux 8.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nNote that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that you must select kernel-utils explicitly on default configurations\nof up2date." ]
[ "2003-02-07T18:15:00+00:00" ]
CVE-2003-0594
security flaw
Low
null
null
Mozilla allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Mozilla to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
null
2025-01-08T20:03:18+00:00
[ "Red Hat Linux 9" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2004-03-17T22:53:00+00:00" ]
CVE-2003-0081
security flaw
Moderate
null
null
Format string vulnerability in packet-socks.c of the SOCKS dissector for Ethereal 0.8.7 through 0.9.9 allows remote attackers to execute arbitrary code via SOCKS packets containing format string specifiers.
null
2025-01-08T20:05:36+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-07-08T19:59:00+00:00", "2003-04-23T20:20:00+00:00" ]
CVE-2003-0039
security flaw
None
null
null
ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count.
null
2025-01-08T20:08:25+00:00
[ "Red Hat Linux 8.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-31T17:20:00+00:00" ]
CVE-2003-0255
security flaw
Moderate
null
null
The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path.
null
2025-01-08T20:04:28+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-06-23T12:24:00+00:00", "2003-05-21T03:45:00+00:00" ]
CVE-2003-0740
security flaw
Important
null
null
Stunnel 4.00, and 3.24 and earlier, leaks a privileged file descriptor returned by listen(), which allows local users to hijack the Stunnel server.
null
2025-01-08T20:00:10+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-11-12T14:06:00+00:00", "2003-11-24T08:44:00+00:00" ]
CVE-2003-0428
security flaw
Low
null
null
Unknown vulnerability in the DCERPC (DCE/RPC) dissector in Ethereal 0.9.12 and earlier allows remote attackers to cause a denial of service (memory consumption) via a certain NDR string.
null
2025-01-08T20:03:48+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-07-08T19:59:00+00:00", "2003-07-03T08:31:00+00:00" ]
CVE-2003-0078
security flaw
Moderate
null
null
ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."
null
2025-01-08T20:07:05+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux Advanced Workstation 2.1", "Red Hat Stronghold 3", "Red Hat Stronghold 4" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "We have backported the security fixes for the versions of OpenSSL, Apache\nand PHP included in Stronghold 3. Stronghold 3.0 build code 3021 is now\navailable which includes these fixes, and can be downloaded from\nhttp://stronghold.redhat.com/sh3/\n\nFor information on how to upgrade between releases of Stronghold 3.0, see\nhttp://stronghold.redhat.com/support/upgrade-sh3.xml", "Fixed Stronghold 4 packages are now available via the update agent service; run\n\n$ bin/agent\n\nfrom the Stronghold 4 install root to upgrade an existing Stronghold 4\ninstallation to the new package versions. After upgrading Stronghold, the\nserver must be completely restarted by running the following commands from\nthe install root:\n\n$ bin/stop-server\n$ bin/stop-tomcat\n$ bin/start-tomcat\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nsee http://stronghold.redhat.com/support/upgrade-sh4" ]
[ "2003-03-10T15:18:00+00:00", "2003-03-06T15:10:00+00:00", "2003-03-18T11:01:00+00:00", "2003-03-03T09:16:00+00:00" ]
CVE-2003-0644
security flaw
Low
null
null
Kdbg 1.1.0 through 1.2.8 does not check permissions of the .kdbgrc file, which allows local users to execute arbitrary commands.
null
2025-01-08T20:02:12+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/" ]
[ "2005-06-02T14:32:00+00:00" ]
CVE-2003-0845
JBoss HSQLDB component remote command injection
Moderate
null
null
Unknown vulnerability in the HSQLDB component in JBoss 3.2.1 and 3.0.8 on Java 1.4.x platforms, when running in the default configuration, allows remote attackers to conduct unauthorized activities and possibly execute arbitrary code via certain SQL statements to (1) TCP port 1701 in JBoss 3.2.1, and (2) port 1476 in JBoss 3.0.8.
null
2025-01-09T02:00:33+00:00
[ "5Client:hsqldb-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-1:1.8.0.4-3jpp.6.src", "5Client:hsqldb-1:1.8.0.4-3jpp.6.x86_64", "5Client:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.x86_64", "5Client:hsqldb-demo-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-demo-1:1.8.0.4-3jpp.6.x86_64", "5Client:hsqldb-javadoc-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-javadoc-1:1.8.0.4-3jpp.6.x86_64", "5Client:hsqldb-manual-1:1.8.0.4-3jpp.6.i386", "5Client:hsqldb-manual-1:1.8.0.4-3jpp.6.x86_64", "5Client:openoffice.org-1:2.0.4-5.4.25.src", "5Client:openoffice.org-base-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-base-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-calc-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-calc-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-core-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-core-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-debuginfo-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-debuginfo-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-draw-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-draw-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-emailmerge-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-emailmerge-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-graphicfilter-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-graphicfilter-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-impress-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-impress-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-javafilter-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-javafilter-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ar-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ar-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-bn-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-bn-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-de-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-de-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-es-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-es-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-fr-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-fr-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-it-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-it-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nl-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nl-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ru-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ru-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-sv-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-sv-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ur-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ur-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-math-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-math-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-pyuno-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-pyuno-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-testtools-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-testtools-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-writer-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-writer-1:2.0.4-5.4.25.x86_64", "5Client:openoffice.org-xsltfilter-1:2.0.4-5.4.25.i386", "5Client:openoffice.org-xsltfilter-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.src", "5Server-DPAS:hsqldb-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-debuginfo-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:hsqldb-demo-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-demo-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:hsqldb-javadoc-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-javadoc-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:hsqldb-manual-1:1.8.0.4-3jpp.6.i386", "5Server-DPAS:hsqldb-manual-1:1.8.0.4-3jpp.6.x86_64", "5Server-DPAS:openoffice.org-1:2.0.4-5.4.25.src", "5Server-DPAS:openoffice.org-base-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-base-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-calc-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-calc-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-core-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-core-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-debuginfo-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-debuginfo-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-draw-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-draw-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-emailmerge-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-emailmerge-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-graphicfilter-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-graphicfilter-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-impress-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-impress-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-javafilter-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-javafilter-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-af_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ar-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ar-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-as_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-bg_BG-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-bn-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-bn-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ca_ES-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-cs_CZ-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-cy_GB-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-da_DK-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-de-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-de-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-el_GR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-es-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-es-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-et_EE-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-eu_ES-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-fi_FI-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-fr-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-fr-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ga_IE-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-gl_ES-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-gu_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-he_IL-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-hi_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-hr_HR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-hu_HU-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-it-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-it-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ja_JP-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-kn_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ko_KR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-lt_LT-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ml_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-mr_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ms_MY-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nb_NO-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nl-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nl-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nn_NO-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nr_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-nso_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-or_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-pa_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-pl_PL-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-pt_BR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-pt_PT-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ru-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ru-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-sk_SK-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-sl_SI-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-sr_CS-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ss_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-st_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-sv-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-sv-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ta_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-te_IN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-th_TH-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-tn_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-tr_TR-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ts_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ur-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ur-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-ve_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-xh_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-zh_CN-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-zh_TW-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-langpack-zu_ZA-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-math-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-math-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-pyuno-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-pyuno-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-testtools-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-testtools-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-writer-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-writer-1:2.0.4-5.4.25.x86_64", "5Server-DPAS:openoffice.org-xsltfilter-1:2.0.4-5.4.25.i386", "5Server-DPAS:openoffice.org-xsltfilter-1:2.0.4-5.4.25.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188" ]
[ "2007-12-05T14:34:00+00:00" ]
CVE-2003-0146
security flaw
Important
null
null
Multiple vulnerabilities in NetPBM 9.20 and earlier, and possibly other versions, may allow remote attackers to cause a denial of service or execute arbitrary code via "maths overflow errors" such as (1) integer signedness errors or (2) integer overflows, which lead to buffer overflows.
null
2025-01-08T20:07:17+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-03-31T15:31:00+00:00", "2003-04-03T08:08:00+00:00" ]
CVE-2003-0795
security flaw
Important
null
null
The vty layer in Quagga before 0.96.4, and Zebra 0.93b and earlier, does not verify that sub-negotiation is taking place when processing the SE marker, which allows remote attackers to cause a denial of service (crash) via a malformed telnet command to the telnet CLI port, which may trigger a null dereference.
null
2025-01-08T20:02:22+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-11-12T14:08:00+00:00", "2003-11-13T08:34:00+00:00" ]
CVE-2003-0541
security flaw
None
null
null
gtkhtml before 1.1.10, as used in Evolution, allows remote attackers to cause a denial of service (crash) via a malformed message that causes a null pointer dereference.
null
2025-01-08T20:01:28+00:00
[ "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-09-09T13:05:00+00:00" ]
CVE-2003-0107
security flaw
Moderate
null
null
Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled without vsnprintf or when long inputs are truncated using vsnprintf, allows attackers to cause a denial of service or possibly execute arbitrary code.
null
2025-01-08T20:07:11+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-05-22T17:13:00+00:00", "2003-04-29T08:12:00+00:00" ]
CVE-2003-0150
security flaw
Important
null
null
MySQL 3.23.55 and earlier creates world-writeable files and allows mysql users to gain root privileges by using the "SELECT * INFO OUTFILE" operator to overwrite a configuration file and cause mysql to run as root upon restart, as demonstrated by modifying my.cnf.
null
2025-01-08T20:08:11+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2003-04-28T12:53:00+00:00", "2003-04-29T18:58:00+00:00" ]
CVE-2003-0853
security flaw
Moderate
null
null
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
null
2025-01-08T19:57:51+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", "Red Hat Linux 9", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate \nErrors, you need to install a version of the up2date client with an updated \ncertificate. The latest version of up2date is available from the Red Hat \nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt" ]
[ "2003-11-12T14:06:00+00:00", "2003-11-03T15:26:00+00:00" ]
CVE-2003-1604
kernel
Missing NULL pointer check in nf_nat_redirect_ipv4
Moderate
5.4/AV:N/AC:H/Au:N/C:N/I:N/A:C
null
The redirect_target function in net/ipv4/netfilter/ipt_REDIRECT.c in the Linux kernel before 2.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending packets to an interface that has a 0.0.0.0 IP address, a related issue to CVE-2015-8787.
null
2025-01-08T22:38:16+00:00
[]
[]
[ "red_hat_enterprise_linux_5:kernel", "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_mrg_2:realtime-kernel" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]