Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-0876 (GCVE-0-2012-0876)
Vulnerability from cvelistv5 – Published: 2012-07-03 19:00 – Updated: 2024-08-06 18:38- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:38:15.063Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "49504",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49504"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2016-20"
},
{
"name": "USN-1527-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1527-1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.python.org/issue13703#msg151870"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/HT205637"
},
{
"name": "51040",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/51040"
},
{
"name": "RHSA-2012:0731",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html"
},
{
"name": "52379",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/52379"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/"
},
{
"name": "RHSA-2016:0062",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
},
{
"name": "APPLE-SA-2013-10-22-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"name": "APPLE-SA-2015-12-08-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"name": "DSA-2525",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2525"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "MDVSA-2012:041",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041"
},
{
"name": "RHSA-2016:2957",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "USN-1613-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1613-2"
},
{
"name": "[Expat-discuss] 20120304 Announcement: Expat 2.1.0 Beta can be tested",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html"
},
{
"name": "51024",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/51024"
},
{
"name": "USN-1613-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1613-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-03-04T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-31T07:06:47.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "49504",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49504"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tenable.com/security/tns-2016-20"
},
{
"name": "USN-1527-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1527-1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.python.org/issue13703#msg151870"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/HT205637"
},
{
"name": "51040",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/51040"
},
{
"name": "RHSA-2012:0731",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html"
},
{
"name": "52379",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/52379"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/"
},
{
"name": "RHSA-2016:0062",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
},
{
"name": "APPLE-SA-2013-10-22-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"name": "APPLE-SA-2015-12-08-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"name": "DSA-2525",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2525"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "MDVSA-2012:041",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041"
},
{
"name": "RHSA-2016:2957",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "USN-1613-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1613-2"
},
{
"name": "[Expat-discuss] 20120304 Announcement: Expat 2.1.0 Beta can be tested",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html"
},
{
"name": "51024",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/51024"
},
{
"name": "USN-1613-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1613-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0876",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "49504",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49504"
},
{
"name": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127"
},
{
"name": "https://www.tenable.com/security/tns-2016-20",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-20"
},
{
"name": "USN-1527-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1527-1"
},
{
"name": "http://bugs.python.org/issue13703#msg151870",
"refsource": "MISC",
"url": "http://bugs.python.org/issue13703#msg151870"
},
{
"name": "https://support.apple.com/HT205637",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205637"
},
{
"name": "51040",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51040"
},
{
"name": "RHSA-2012:0731",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html"
},
{
"name": "52379",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52379"
},
{
"name": "http://sourceforge.net/projects/expat/files/expat/2.1.0/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/"
},
{
"name": "RHSA-2016:0062",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
},
{
"name": "APPLE-SA-2013-10-22-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"name": "APPLE-SA-2015-12-08-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"name": "DSA-2525",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2525"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "MDVSA-2012:041",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "USN-1613-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1613-2"
},
{
"name": "[Expat-discuss] 20120304 Announcement: Expat 2.1.0 Beta can be tested",
"refsource": "MLIST",
"url": "http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html"
},
{
"name": "51024",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51024"
},
{
"name": "USN-1613-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1613-1"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-0876",
"datePublished": "2012-07-03T19:00:00.000Z",
"dateReserved": "2012-01-19T00:00:00.000Z",
"dateUpdated": "2024-08-06T18:38:15.063Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2012-0876",
"date": "2026-05-22",
"epss": "0.00306",
"percentile": "0.53962"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.1.0\", \"matchCriteriaId\": \"B435E8AA-8792-4F5A-9F06-203D998E1A32\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.6.0\", \"versionEndExcluding\": \"2.6.8\", \"matchCriteriaId\": \"6229588C-F7CC-4B5B-B3EF-88B5C8DFB989\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.7.0\", \"versionEndExcluding\": \"2.7.3\", \"matchCriteriaId\": \"B2AACE9B-4A26-436B-A75A-FE1AB98B7706\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.1.0\", \"versionEndExcluding\": \"3.1.5\", \"matchCriteriaId\": \"4267C919-3B32-46A1-8B95-514E0B721440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.2.0\", \"versionEndExcluding\": \"3.2.3\", \"matchCriteriaId\": \"B1FCEF2B-A273-431E-819A-A5CE0F52A63C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"036E8A89-7A16-411F-9D31-676313BB7244\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"7EBFE35C-E243-43D1-883D-4398D71763CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"01EDA41C-6B2E-49AF-B503-EB3882265C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF49D26F-142E-468B-87C1-BABEA445255C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4174F4F-149E-41A6-BBCC-D01114C05F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79A602C5-61FE-47BA-9786-F045B6C6DBA8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52B90A04-DD6D-4AE7-A0E5-6B381127D507\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0554C89-3716-49F3-BFAE-E008D5E4E29C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BBCD86A-E6C7-4444-9D74-F861084090F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD6D0378-F0F4-4AAA-80AF-8287C790EC96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.\"}, {\"lang\": \"es\", \"value\": \"El analizador XML (xmlparse.c) en expat antes de v2.1.0 calcula los valores de hash sin restringir la capacidad de desencadenar colisiones hash de forma predecible, lo que permite causar una denegaci\\u00f3n de servicio (por consumo de CPU) a atacantes dependientes de contexto a trav\\u00e9s de un archivo XML con muchos identificadores con el mismo valor.\"}]",
"id": "CVE-2012-0876",
"lastModified": "2024-11-21T01:35:53.543",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2012-07-03T19:55:02.210",
"references": "[{\"url\": \"http://bugs.python.org/issue13703#msg151870\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\", \"Mailing List\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\", \"Mailing List\"]}, {\"url\": \"http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0731.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0062.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2957.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/49504\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/51024\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/51040\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://sourceforge.net/projects/expat/files/expat/2.1.0/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2012/dsa-2525\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2012:041\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/52379\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1527-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1613-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1613-2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://support.apple.com/HT205637\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2016-20\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://bugs.python.org/issue13703#msg151870\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Mailing List\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Mailing List\"]}, {\"url\": \"http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0731.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0062.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2957.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/49504\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/51024\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/51040\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://sourceforge.net/projects/expat/files/expat/2.1.0/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2012/dsa-2525\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2012:041\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/52379\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1527-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1613-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1613-2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://support.apple.com/HT205637\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2016-20\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2012-0876\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-07-03T19:55:02.210\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.\"},{\"lang\":\"es\",\"value\":\"El analizador XML (xmlparse.c) en expat antes de v2.1.0 calcula los valores de hash sin restringir la capacidad de desencadenar colisiones hash de forma predecible, lo que permite causar una denegaci\u00f3n de servicio (por consumo de CPU) a atacantes dependientes de contexto a trav\u00e9s de un archivo XML con muchos identificadores con el mismo valor.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1.0\",\"matchCriteriaId\":\"B435E8AA-8792-4F5A-9F06-203D998E1A32\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.0\",\"versionEndExcluding\":\"2.6.8\",\"matchCriteriaId\":\"6229588C-F7CC-4B5B-B3EF-88B5C8DFB989\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndExcluding\":\"2.7.3\",\"matchCriteriaId\":\"B2AACE9B-4A26-436B-A75A-FE1AB98B7706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1.0\",\"versionEndExcluding\":\"3.1.5\",\"matchCriteriaId\":\"4267C919-3B32-46A1-8B95-514E0B721440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.2.0\",\"versionEndExcluding\":\"3.2.3\",\"matchCriteriaId\":\"B1FCEF2B-A273-431E-819A-A5CE0F52A63C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF49D26F-142E-468B-87C1-BABEA445255C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4174F4F-149E-41A6-BBCC-D01114C05F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A602C5-61FE-47BA-9786-F045B6C6DBA8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52B90A04-DD6D-4AE7-A0E5-6B381127D507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0554C89-3716-49F3-BFAE-E008D5E4E29C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6D0378-F0F4-4AAA-80AF-8287C790EC96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}],\"references\":[{\"url\":\"http://bugs.python.org/issue13703#msg151870\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0731.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0062.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2957.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/49504\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/51024\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/51040\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://sourceforge.net/projects/expat/files/expat/2.1.0/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2525\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:041\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/52379\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1527-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1613-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1613-2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://support.apple.com/HT205637\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-20\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://bugs.python.org/issue13703#msg151870\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0731.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0062.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2957.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/49504\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/51024\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/51040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://sourceforge.net/projects/expat/files/expat/2.1.0/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2525\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:041\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/52379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1527-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1613-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1613-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://support.apple.com/HT205637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2015-AVI-534
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Apple OS X. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple OS X El Capitan versions ant\u00e9rieures \u00e0 10.11.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "OS X Yosemite versions ant\u00e9rieures \u00e0 Security Update 2015-008",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "OS X Mavericks versions ant\u00e9rieures \u00e0 Security Update 2015-008",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-7067",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7067"
},
{
"name": "CVE-2015-7001",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7001"
},
{
"name": "CVE-2015-7075",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7075"
},
{
"name": "CVE-2015-7076",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7076"
},
{
"name": "CVE-2015-6908",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6908"
},
{
"name": "CVE-2015-7073",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7073"
},
{
"name": "CVE-2015-7094",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7094"
},
{
"name": "CVE-2015-7107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7107"
},
{
"name": "CVE-2015-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7039"
},
{
"name": "CVE-2015-7074",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7074"
},
{
"name": "CVE-2015-7060",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7060"
},
{
"name": "CVE-2015-7068",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7068"
},
{
"name": "CVE-2015-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3807"
},
{
"name": "CVE-2015-7110",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7110"
},
{
"name": "CVE-2015-7058",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7058"
},
{
"name": "CVE-2015-7062",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7062"
},
{
"name": "CVE-2015-7043",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7043"
},
{
"name": "CVE-2015-7066",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7066"
},
{
"name": "CVE-2015-7077",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7077"
},
{
"name": "CVE-2015-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7042"
},
{
"name": "CVE-2015-7109",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7109"
},
{
"name": "CVE-2012-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1148"
},
{
"name": "CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"name": "CVE-2015-7105",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7105"
},
{
"name": "CVE-2015-7804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7804"
},
{
"name": "CVE-2015-7106",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7106"
},
{
"name": "CVE-2015-7063",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7063"
},
{
"name": "CVE-2015-7081",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7081"
},
{
"name": "CVE-2015-7038",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7038"
},
{
"name": "CVE-2015-7061",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7061"
},
{
"name": "CVE-2015-7803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7803"
},
{
"name": "CVE-2015-7053",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7053"
},
{
"name": "CVE-2015-7059",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7059"
},
{
"name": "CVE-2015-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5333"
},
{
"name": "CVE-2015-7046",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7046"
},
{
"name": "CVE-2015-7064",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7064"
},
{
"name": "CVE-2015-7078",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7078"
},
{
"name": "CVE-2015-7083",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7083"
},
{
"name": "CVE-2015-7108",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7108"
},
{
"name": "CVE-2015-7084",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7084"
},
{
"name": "CVE-2015-7112",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7112"
},
{
"name": "CVE-2015-5334",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5334"
},
{
"name": "CVE-2015-7041",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7041"
},
{
"name": "CVE-2015-7044",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7044"
},
{
"name": "CVE-2015-7054",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7054"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2015-7111",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7111"
},
{
"name": "CVE-2012-1147",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1147"
},
{
"name": "CVE-2015-7047",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7047"
},
{
"name": "CVE-2015-7065",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7065"
},
{
"name": "CVE-2015-7071",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7071"
},
{
"name": "CVE-2015-7045",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7045"
},
{
"name": "CVE-2015-7040",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7040"
},
{
"name": "CVE-2015-7052",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7052"
}
],
"links": [],
"reference": "CERTFR-2015-AVI-534",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-12-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nune ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT205637 du 08 d\u00e9cembre 2015",
"url": "https://support.apple.com/en-us/HT205637"
}
]
}
CERTFR-2018-AVI-288
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus toutes versions ant\u00e9rieures \u00e0 7.1.1",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2017-9233",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9233"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2015-3217",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3217"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2016-3191",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3191"
},
{
"name": "CVE-2017-11742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11742"
},
{
"name": "CVE-2015-5073",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5073"
},
{
"name": "CVE-2017-7245",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7245"
},
{
"name": "CVE-2016-9842",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9842"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2014-9769",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9769"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2017-1000061",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000061"
},
{
"name": "CVE-2017-9048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9048"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2016-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1283"
},
{
"name": "CVE-2017-9050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9050"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2016-0718",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0718"
},
{
"name": "CVE-2016-5300",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5300"
},
{
"name": "CVE-2016-4472",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4472"
},
{
"name": "CVE-2016-9063",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9063"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"name": "CVE-2012-6702",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6702"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2014-8964",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8964"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2016-9841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9841"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-8384",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8384"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2015-8380",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8380"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2015-8382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8382"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2017-9049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9049"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2017-8872",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8872"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2015-8389",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8389"
},
{
"name": "CVE-2017-5969",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5969"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-288",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable TNS-2018-08 du 13 juin 2018",
"url": "https://www.tenable.com/security/tns-2018-08"
}
]
}
CERTFR-2018-AVI-293
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus Agent. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Nessus Agent | Nessus Agent versions 7.0.3 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus Agent versions 7.0.3 et ant\u00e9rieures",
"product": {
"name": "Nessus Agent",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2017-9233",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9233"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2015-3217",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3217"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2016-3191",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3191"
},
{
"name": "CVE-2017-11742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11742"
},
{
"name": "CVE-2015-5073",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5073"
},
{
"name": "CVE-2017-7245",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7245"
},
{
"name": "CVE-2016-9842",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9842"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2014-9769",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9769"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2017-1000061",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000061"
},
{
"name": "CVE-2017-9048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9048"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2016-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1283"
},
{
"name": "CVE-2017-9050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9050"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2016-0718",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0718"
},
{
"name": "CVE-2016-5300",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5300"
},
{
"name": "CVE-2016-4472",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4472"
},
{
"name": "CVE-2016-9063",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9063"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2018-0733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0733"
},
{
"name": "CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"name": "CVE-2012-6702",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6702"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2014-8964",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8964"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2016-9841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9841"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-8384",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8384"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2015-8380",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8380"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2015-8382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8382"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2017-9049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9049"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2017-8872",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8872"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2015-8389",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8389"
},
{
"name": "CVE-2017-5969",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5969"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-293",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus\nAgent. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus Agent",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable TNS-2018-09 du 14 juin 2018",
"url": "https://www.tenable.com/security/tns-2018-09"
}
]
}
CERTFR-2022-AVI-650
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos Space Security Director Policy Enforcer versions antérieures à 22.1R1 | ||
| Juniper Networks | N/A | Juniper Networks Contrail Networking versions antérieures à 21.4.0 | ||
| Juniper Networks | N/A | Contrôleur Juniper Networks NorthStar versions antérieures à 5.1.0 Service Pack 6 | ||
| Juniper Networks | N/A | Contrôleur Juniper Networks NorthStar versions 6.x antérieures à 6.2.2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.4.x antérieures à 20.4R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.2.x antérieures à 20.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.2.x antérieures à 20.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.2.x antérieures à 20.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.3.x antérieures à 20.3R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.2.x antérieures à 21.2R2-S3, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 19.2.x antérieures à 19.2R1-S9, 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.1.x antérieures à 21.1R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.2.x antérieures à 20.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.1.x antérieures à 21.1R3-S1 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.4.x antérieures à 20.4R3-S2, 20.4R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 21.3.x antérieures à 21.3R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.3.x antérieures à 21.3R2-S1, 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.4.x antérieures à 20.4R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.2.x antérieures à 19.2R1-S9, 19.2R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions antérieures à 19.2R1-S9, 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.3.x antérieures à 21.3R1-S2, 21.3R2, 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.2.x antérieures à 21.2R2-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.3.x antérieures à 20.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.4.x antérieures à 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.4.x antérieures à 20.4R2-S2, 20.4R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.4.x antérieures à 19.4R2-S6, 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.4.x antérieures à 18.4R2-S10, 18.4R3-S9 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions antérieures à 19.1R3-S9 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.2.x antérieures à 21.2R2-S2, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.4.x antérieures à 21.4R1-S1, 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.3.x antérieures à 20.3R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions antérieures à 19.2R1-S9, 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions supérieures à 20.1R1 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.4.x antérieures à 20.4R3-S2, 20.4R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 21.2.x antérieures à 21.2R2-S1, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 20.3.x antérieures à 20.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.1.x antérieures à 21.1R2-S1, 21.1R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.2.x antérieures à 21.2R1-S1, 21.2R2, 21.2R3-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.3.x antérieures à 19.3R2-S7, 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3.x antérieures à 17.3R3-S12 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.4.x antérieures à 21.4R1-S1, 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 19.4.x antérieures à 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.4.x antérieures à 21.4R1-S2, 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.1.x antérieures à 19.1R2-S3, 19.1R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49, 15.1X49-D100 et suivantes antérieures à 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.3.x antérieures à 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S21 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.3.x antérieures à 21.3R1-S2, 21.3R2, 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 19.2.x antérieures à 19.2R1-S8, 19.2R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 19.4.x antérieures à 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.3.x antérieures à 20.3R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.1.x antérieures à 21.1R3-S1 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 20.4.x antérieures à 20.4R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.4.x antérieures à 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 22.1.x antérieures à 22.1R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.3.x antérieures à 21.3R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX toutes versions antérieures à 19.1R3-S9 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 19.4.x antérieures à 19.4R2-S5, 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 19.4.x antérieures à 19.4R2-S6, 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.2.x antérieures à 20.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.1.x antérieures à 21.1R2, 21.1R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 21.1.x antérieures à 21.1R2-S1, 21.1R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.2.x antérieures à 21.2R2-S2, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.3.x antérieures à 20.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.3.x antérieures à 18.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1.x antérieures à 15.1R7-S10 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 20.2.x antérieures à 20.2R3-S5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.3.x antérieures à 21.3R2-S1-EVO, 21.3R3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.2.x antérieures à 21.2R1-S1-EVO, 21.2R3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.4.x antérieures à 21.4R1-S1-EVO, 21.4R2-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.1.x aantérieures à 21.1R3-S1-EVO | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.1R1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space Security Director Policy Enforcer versions ant\u00e9rieures \u00e0 22.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 21.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contr\u00f4leur Juniper Networks NorthStar versions ant\u00e9rieures \u00e0 5.1.0 Service Pack 6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contr\u00f4leur Juniper Networks NorthStar versions 6.x ant\u00e9rieures \u00e0 6.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S3, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 19.2.x ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.1.x ant\u00e9rieures \u00e0 21.1R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.1.x ant\u00e9rieures \u00e0 21.1R3-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2, 20.4R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 21.3.x ant\u00e9rieures \u00e0 21.3R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.3.x ant\u00e9rieures \u00e0 21.3R2-S1, 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.2.x ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.3.x ant\u00e9rieures \u00e0 21.3R1-S2, 21.3R2, 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.4.x ant\u00e9rieures \u00e0 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.4.x ant\u00e9rieures \u00e0 20.4R2-S2, 20.4R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.4.x ant\u00e9rieures \u00e0 19.4R2-S6, 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.4.x ant\u00e9rieures \u00e0 18.4R2-S10, 18.4R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions ant\u00e9rieures \u00e0 19.1R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S2, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S1, 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions sup\u00e9rieures \u00e0 20.1R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2, 20.4R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S1, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.1.x ant\u00e9rieures \u00e0 21.1R2-S1, 21.1R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.2.x ant\u00e9rieures \u00e0 21.2R1-S1, 21.2R2, 21.2R3-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.3.x ant\u00e9rieures \u00e0 19.3R2-S7, 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3.x ant\u00e9rieures \u00e0 17.3R3-S12",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S1, 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 19.4.x ant\u00e9rieures \u00e0 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S2, 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.1.x ant\u00e9rieures \u00e0 19.1R2-S3, 19.1R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49, 15.1X49-D100 et suivantes ant\u00e9rieures \u00e0 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.3.x ant\u00e9rieures \u00e0 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S21",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.3.x ant\u00e9rieures \u00e0 21.3R1-S2, 21.3R2, 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 19.2.x ant\u00e9rieures \u00e0 19.2R1-S8, 19.2R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 19.4.x ant\u00e9rieures \u00e0 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.1.x ant\u00e9rieures \u00e0 21.1R3-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.4.x ant\u00e9rieures \u00e0 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 22.1.x ant\u00e9rieures \u00e0 22.1R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.3.x ant\u00e9rieures \u00e0 21.3R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX toutes versions ant\u00e9rieures \u00e0 19.1R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 19.4.x ant\u00e9rieures \u00e0 19.4R2-S5, 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 19.4.x ant\u00e9rieures \u00e0 19.4R2-S6, 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.1.x ant\u00e9rieures \u00e0 21.1R2, 21.1R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 21.1.x ant\u00e9rieures \u00e0 21.1R2-S1, 21.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S2, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.3.x ant\u00e9rieures \u00e0 18.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1.x ant\u00e9rieures \u00e0 15.1R7-S10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.3.x ant\u00e9rieures \u00e0 21.3R2-S1-EVO, 21.3R3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.2.x ant\u00e9rieures \u00e0 21.2R1-S1-EVO, 21.2R3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S1-EVO, 21.4R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.1.x aant\u00e9rieures \u00e0 21.1R3-S1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"name": "CVE-2003-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-0001"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2013-7422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7422"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2016-2516",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2516"
},
{
"name": "CVE-2016-4612",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4612"
},
{
"name": "CVE-2016-4610",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4610"
},
{
"name": "CVE-2016-4608",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4608"
},
{
"name": "CVE-2016-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4609"
},
{
"name": "CVE-2016-4607",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4607"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4738"
},
{
"name": "CVE-2016-5300",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5300"
},
{
"name": "CVE-2016-9063",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9063"
},
{
"name": "CVE-2016-8618",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8618"
},
{
"name": "CVE-2016-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8622"
},
{
"name": "CVE-2016-8619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8619"
},
{
"name": "CVE-2016-5180",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5180"
},
{
"name": "CVE-2016-9538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9538"
},
{
"name": "CVE-2016-9539",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9539"
},
{
"name": "CVE-2017-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0553"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-1000368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000368"
},
{
"name": "CVE-2017-10989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10989"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-8817",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8817"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8380",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8380"
},
{
"name": "CVE-2016-3191",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3191"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2019-9518",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
},
{
"name": "CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"name": "CVE-2019-8457",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
},
{
"name": "CVE-2019-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1354"
},
{
"name": "CVE-2019-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1352"
},
{
"name": "CVE-2019-1387",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1387"
},
{
"name": "CVE-2019-1349",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1349"
},
{
"name": "CVE-2019-1350",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1350"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2020-8616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8616"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2017-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14867"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2020-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1968"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2020-25696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25696"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2020-13435",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2020-25717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
},
{
"name": "CVE-2016-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2018-1000654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000654"
},
{
"name": "CVE-2014-9471",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9471"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2019-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
},
{
"name": "CVE-2017-12562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12562"
},
{
"name": "CVE-2018-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14567"
},
{
"name": "CVE-2022-22217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22217"
},
{
"name": "CVE-2016-4484",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4484"
},
{
"name": "CVE-2015-4042",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4042"
},
{
"name": "CVE-2016-7943",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7943"
},
{
"name": "CVE-2016-6318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6318"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2016-7942",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7942"
},
{
"name": "CVE-2017-9117",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9117"
},
{
"name": "CVE-2022-22203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22203"
},
{
"name": "CVE-2015-5228",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5228"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2022-22216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22216"
},
{
"name": "CVE-2015-7805",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7805"
},
{
"name": "CVE-2017-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8779"
},
{
"name": "CVE-2022-22206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22206"
},
{
"name": "CVE-2016-7947",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7947"
},
{
"name": "CVE-2016-7951",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7951"
},
{
"name": "CVE-2018-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8088"
},
{
"name": "CVE-2018-6954",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6954"
},
{
"name": "CVE-2014-9488",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9488"
},
{
"name": "CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"name": "CVE-2017-15994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15994"
},
{
"name": "CVE-2022-22209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22209"
},
{
"name": "CVE-2015-8540",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8540"
},
{
"name": "CVE-2016-7950",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7950"
},
{
"name": "CVE-2017-14930",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14930"
},
{
"name": "CVE-2017-8105",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8105"
},
{
"name": "CVE-2016-7949",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7949"
},
{
"name": "CVE-2017-5225",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5225"
},
{
"name": "CVE-2016-1951",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1951"
},
{
"name": "CVE-2017-8871",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8871"
},
{
"name": "CVE-2018-19362",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19362"
},
{
"name": "CVE-2022-22215",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22215"
},
{
"name": "CVE-2015-7036",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7036"
},
{
"name": "CVE-2016-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2779"
},
{
"name": "CVE-2022-22213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22213"
},
{
"name": "CVE-2016-10195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10195"
},
{
"name": "CVE-2014-5044",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5044"
},
{
"name": "CVE-2016-7944",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7944"
},
{
"name": "CVE-2014-9114",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9114"
},
{
"name": "CVE-2014-9474",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9474"
},
{
"name": "CVE-2015-2059",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2059"
},
{
"name": "CVE-2022-22207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22207"
},
{
"name": "CVE-2022-22205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22205"
},
{
"name": "CVE-2022-22204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22204"
},
{
"name": "CVE-2017-5929",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
},
{
"name": "CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"name": "CVE-2017-10685",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10685"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2015-8947",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8947"
},
{
"name": "CVE-2019-9893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9893"
},
{
"name": "CVE-2016-1238",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1238"
},
{
"name": "CVE-2016-7948",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7948"
},
{
"name": "CVE-2014-9746",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9746"
},
{
"name": "CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"name": "CVE-2016-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2052"
},
{
"name": "CVE-2021-3487",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3487"
},
{
"name": "CVE-2022-22214",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22214"
},
{
"name": "CVE-2014-4043",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4043"
},
{
"name": "CVE-2022-22221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22221"
},
{
"name": "CVE-2022-22212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22212"
},
{
"name": "CVE-2017-16548",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16548"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2014-9939",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9939"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2015-3308",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3308"
},
{
"name": "CVE-2017-7614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7614"
},
{
"name": "CVE-2022-22202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22202"
},
{
"name": "CVE-2017-8421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8421"
},
{
"name": "CVE-2017-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14062"
},
{
"name": "CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"name": "CVE-2022-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
},
{
"name": "CVE-2017-10684",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10684"
},
{
"name": "CVE-2022-22210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22210"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2015-5602",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5602"
},
{
"name": "CVE-2018-11307",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11307"
},
{
"name": "CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"name": "CVE-2017-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17434"
},
{
"name": "CVE-2017-8287",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8287"
},
{
"name": "CVE-2017-8804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8804"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-650",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69723 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-Space-Security-Director-Policy-Enforcer-upgraded-to-CentOS-7-9"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69722 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release-CVE-2022-22218"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69713 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-RIB-and-PFEs-can-get-out-of-sync-due-to-a-memory-leak-caused-by-interface-flaps-or-route-churn-CVE-2022-22209"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69710 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-series-The-PFE-will-crash-when-specific-traffic-is-scanned-by-Enhanced-Web-Filtering-safe-search-CVE-2022-22206"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69717 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Denial-of-Service-DoS-vulnerability-in-RPD-upon-receipt-of-specific-BGP-update-CVE-2022-22213"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69707 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-Receipt-of-specific-traffic-will-lead-to-an-fxpc-process-crash-followed-by-an-FPC-reboot-CVE-2022-22203"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69714 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-MX-Series-An-l2alm-crash-leading-to-an-FPC-crash-can-be-observed-in-VxLAN-scenario-CVE-2022-22210"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69718 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-MPLS-scenario-upon-receipt-of-a-specific-IPv6-packet-an-FPC-will-crash-CVE-2022-22214"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69726 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Contrail-Networking-Multiple-vulnerabilities-resolved-in-Contrail-Networking-21-4"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69711 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC11-In-a-GNF-node-slicing-scenario-gathering-AF-interface-statistics-can-lead-to-a-kernel-crash-CVE-2022-22207"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69715 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-OpenSSL-security-fixes"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69708 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-When-receiving-a-specific-SIP-packets-stale-call-table-entries-are-created-which-eventually-leads-to-a-DoS-for-all-SIP-traffic-CVE-2022-22204"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69716 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-hostbound-traffic-will-cause-unexpected-hostbound-traffic-delays-or-drops-CVE-2022-22212"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69719 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-var-run-pid-env-files-are-potentially-not-deleted-during-termination-of-a-gRPC-connection-causing-inode-exhaustion-CVE-2022-22215"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69703 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Northstar-Controller-nginx-component-allows-remote-attacker-to-cause-worker-process-crash-or-potentially-arbitrary-code-execution-CVE-2021-23017-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69721 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX10k-Series-Denial-of-Service-DoS-upon-receipt-of-crafted-MLD-packets-on-multi-homing-ESI-in-VXLAN-CVE-2022-22217"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69720 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Etherleak-memory-disclosure-in-Ethernet-padding-data-CVE-2022-22216"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69725 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-and-EX-Series-Local-privilege-escalation-flaw-in-download-functionality-CVE-2022-22221"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69705 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-in-SQLite-resolved"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69709 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-Series-An-FPC-memory-leak-can-occur-in-an-APBR-scenario-CVE-2022-22205"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69706 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-FPCs-may-restart-unexpectedly-upon-receipt-of-specific-MPLS-packets-with-certain-multi-unit-interface-configurations-CVE-2022-22202"
}
]
}
FKIE_CVE-2012-0876
Vulnerability from fkie_nvd - Published: 2012-07-03 19:55 - Updated: 2026-04-29 01:13| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://bugs.python.org/issue13703#msg151870 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html | Broken Link, Mailing List | |
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html | Broken Link, Mailing List | |
| secalert@redhat.com | http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html | Broken Link | |
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2012-0731.html | Third Party Advisory | |
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-0062.html | Third Party Advisory | |
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-2957.html | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/49504 | Not Applicable | |
| secalert@redhat.com | http://secunia.com/advisories/51024 | Not Applicable | |
| secalert@redhat.com | http://secunia.com/advisories/51040 | Not Applicable | |
| secalert@redhat.com | http://sourceforge.net/projects/expat/files/expat/2.1.0/ | Release Notes, Third Party Advisory | |
| secalert@redhat.com | http://sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=10127 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2012/dsa-2525 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2012:041 | Broken Link | |
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html | Third Party Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/bid/52379 | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.ubuntu.com/usn/USN-1527-1 | Third Party Advisory | |
| secalert@redhat.com | http://www.ubuntu.com/usn/USN-1613-1 | Third Party Advisory | |
| secalert@redhat.com | http://www.ubuntu.com/usn/USN-1613-2 | Third Party Advisory | |
| secalert@redhat.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Broken Link | |
| secalert@redhat.com | https://support.apple.com/HT205637 | Third Party Advisory | |
| secalert@redhat.com | https://www.tenable.com/security/tns-2016-20 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.python.org/issue13703#msg151870 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html | Broken Link, Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html | Broken Link, Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2012-0731.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0062.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2957.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49504 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/51024 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/51040 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/projects/expat/files/expat/2.1.0/ | Release Notes, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=10127 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2012/dsa-2525 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2012:041 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/52379 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1527-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1613-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1613-2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT205637 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2016-20 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| libexpat_project | libexpat | * | |
| python | python | * | |
| python | python | * | |
| python | python | * | |
| python | python | * | |
| debian | debian_linux | 6.0 | |
| debian | debian_linux | 7.0 | |
| canonical | ubuntu_linux | 8.04 | |
| canonical | ubuntu_linux | 10.04 | |
| canonical | ubuntu_linux | 11.04 | |
| canonical | ubuntu_linux | 11.10 | |
| canonical | ubuntu_linux | 12.04 | |
| oracle | solaris | 11.3 | |
| redhat | storage | 2.0 | |
| redhat | enterprise_linux_desktop | 5.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_eus | 6.2 | |
| redhat | enterprise_linux_server | 5.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server_aus | 6.2 | |
| redhat | enterprise_linux_workstation | 5.0 | |
| redhat | enterprise_linux_workstation | 6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B435E8AA-8792-4F5A-9F06-203D998E1A32",
"versionEndExcluding": "2.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6229588C-F7CC-4B5B-B3EF-88B5C8DFB989",
"versionEndExcluding": "2.6.8",
"versionStartIncluding": "2.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AACE9B-4A26-436B-A75A-FE1AB98B7706",
"versionEndExcluding": "2.7.3",
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4267C919-3B32-46A1-8B95-514E0B721440",
"versionEndExcluding": "3.1.5",
"versionStartIncluding": "3.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1FCEF2B-A273-431E-819A-A5CE0F52A63C",
"versionEndExcluding": "3.2.3",
"versionStartIncluding": "3.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
"matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52B90A04-DD6D-4AE7-A0E5-6B381127D507",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0554C89-3716-49F3-BFAE-E008D5E4E29C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6D0378-F0F4-4AAA-80AF-8287C790EC96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value."
},
{
"lang": "es",
"value": "El analizador XML (xmlparse.c) en expat antes de v2.1.0 calcula los valores de hash sin restringir la capacidad de desencadenar colisiones hash de forma predecible, lo que permite causar una denegaci\u00f3n de servicio (por consumo de CPU) a atacantes dependientes de contexto a trav\u00e9s de un archivo XML con muchos identificadores con el mismo valor."
}
],
"id": "CVE-2012-0876",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-07-03T19:55:02.210",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugs.python.org/issue13703#msg151870"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/49504"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/51024"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/51040"
},
{
"source": "secalert@redhat.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2012/dsa-2525"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/52379"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1527-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1613-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1613-2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/HT205637"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/tns-2016-20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugs.python.org/issue13703#msg151870"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/49504"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/51024"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/51040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2012/dsa-2525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/52379"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1527-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1613-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1613-2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/HT205637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/tns-2016-20"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-Q8W9-7FWW-V592
Vulnerability from github – Published: 2022-05-13 01:07 – Updated: 2025-04-11 03:58The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
{
"affected": [],
"aliases": [
"CVE-2012-0876"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-07-03T19:55:00Z",
"severity": "MODERATE"
},
"details": "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.",
"id": "GHSA-q8w9-7fww-v592",
"modified": "2025-04-11T03:58:59Z",
"published": "2022-05-13T01:07:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876"
},
{
"type": "WEB",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT205637"
},
{
"type": "WEB",
"url": "https://www.tenable.com/security/tns-2016-20"
},
{
"type": "WEB",
"url": "http://bugs.python.org/issue13703#msg151870"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"type": "WEB",
"url": "http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/49504"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/51024"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/51040"
},
{
"type": "WEB",
"url": "http://sourceforge.net/projects/expat/files/expat/2.1.0"
},
{
"type": "WEB",
"url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2012/dsa-2525"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/52379"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1527-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1613-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1613-2"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2012-0876
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-0876",
"description": "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.",
"id": "GSD-2012-0876",
"references": [
"https://www.suse.com/security/cve/CVE-2012-0876.html",
"https://www.debian.org/security/2012/dsa-2525",
"https://access.redhat.com/errata/RHSA-2017:3239",
"https://access.redhat.com/errata/RHSA-2016:2957",
"https://access.redhat.com/errata/RHSA-2016:0062",
"https://access.redhat.com/errata/RHSA-2012:0731",
"https://alas.aws.amazon.com/cve/html/CVE-2012-0876.html",
"https://linux.oracle.com/cve/CVE-2012-0876.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-0876"
],
"details": "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.",
"id": "GSD-2012-0876",
"modified": "2023-12-13T01:20:13.818682Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0876",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "49504",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49504"
},
{
"name": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127"
},
{
"name": "https://www.tenable.com/security/tns-2016-20",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-20"
},
{
"name": "USN-1527-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1527-1"
},
{
"name": "http://bugs.python.org/issue13703#msg151870",
"refsource": "MISC",
"url": "http://bugs.python.org/issue13703#msg151870"
},
{
"name": "https://support.apple.com/HT205637",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205637"
},
{
"name": "51040",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51040"
},
{
"name": "RHSA-2012:0731",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html"
},
{
"name": "52379",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52379"
},
{
"name": "http://sourceforge.net/projects/expat/files/expat/2.1.0/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/"
},
{
"name": "RHSA-2016:0062",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
},
{
"name": "APPLE-SA-2013-10-22-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"name": "APPLE-SA-2015-12-08-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"name": "DSA-2525",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2525"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "MDVSA-2012:041",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "USN-1613-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1613-2"
},
{
"name": "[Expat-discuss] 20120304 Announcement: Expat 2.1.0 Beta can be tested",
"refsource": "MLIST",
"url": "http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html"
},
{
"name": "51024",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51024"
},
{
"name": "USN-1613-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1613-1"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.3",
"versionStartIncluding": "3.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.1.5",
"versionStartIncluding": "3.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.7.3",
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.6.8",
"versionStartIncluding": "2.6.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0876"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "49504",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/49504"
},
{
"name": "[Expat-discuss] 20120304 Announcement: Expat 2.1.0 Beta can be tested",
"refsource": "MLIST",
"tags": [
"Broken Link"
],
"url": "http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html"
},
{
"name": "RHSA-2012:0731",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html"
},
{
"name": "http://sourceforge.net/projects/expat/files/expat/2.1.0/",
"refsource": "CONFIRM",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/"
},
{
"name": "MDVSA-2012:041",
"refsource": "MANDRIVA",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041"
},
{
"name": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=3496608\u0026group_id=10127"
},
{
"name": "http://bugs.python.org/issue13703#msg151870",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugs.python.org/issue13703#msg151870"
},
{
"name": "USN-1613-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1613-2"
},
{
"name": "DSA-2525",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2012/dsa-2525"
},
{
"name": "USN-1527-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1527-1"
},
{
"name": "USN-1613-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1613-1"
},
{
"name": "51040",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/51040"
},
{
"name": "51024",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/51024"
},
{
"name": "52379",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/52379"
},
{
"name": "APPLE-SA-2013-10-22-3",
"refsource": "APPLE",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"name": "APPLE-SA-2015-12-08-3",
"refsource": "APPLE",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
},
{
"name": "https://support.apple.com/HT205637",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/HT205637"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "RHSA-2016:0062",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
},
{
"name": "https://www.tenable.com/security/tns-2016-20",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/tns-2016-20"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2022-08-05T14:52Z",
"publishedDate": "2012-07-03T19:55Z"
}
}
}
OPENSUSE-SU-2024:10077-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2009-2625/ | self |
| https://www.suse.com/security/cve/CVE-2009-3560/ | self |
| https://www.suse.com/security/cve/CVE-2009-3720/ | self |
| https://www.suse.com/security/cve/CVE-2012-0876/ | self |
| https://www.suse.com/security/cve/CVE-2012-1147/ | self |
| https://www.suse.com/security/cve/CVE-2012-1148/ | self |
| https://www.suse.com/security/cve/CVE-2012-6702/ | self |
| https://www.suse.com/security/cve/CVE-2015-1283/ | self |
| https://www.suse.com/security/cve/CVE-2016-0718/ | self |
| https://www.suse.com/security/cve/CVE-2016-4472/ | self |
| https://www.suse.com/security/cve/CVE-2016-5300/ | self |
| https://www.suse.com/security/cve/CVE-2009-2625 | external |
| https://bugzilla.suse.com/525562 | external |
| https://bugzilla.suse.com/530717 | external |
| https://bugzilla.suse.com/534025 | external |
| https://bugzilla.suse.com/534721 | external |
| https://bugzilla.suse.com/537969 | external |
| https://bugzilla.suse.com/540945 | external |
| https://bugzilla.suse.com/548655 | external |
| https://bugzilla.suse.com/550664 | external |
| https://bugzilla.suse.com/553220 | external |
| https://bugzilla.suse.com/558892 | external |
| https://bugzilla.suse.com/581162 | external |
| https://bugzilla.suse.com/581765 | external |
| https://bugzilla.suse.com/610080 | external |
| https://bugzilla.suse.com/611931 | external |
| https://bugzilla.suse.com/611932 | external |
| https://www.suse.com/security/cve/CVE-2009-3560 | external |
| https://bugzilla.suse.com/550666 | external |
| https://bugzilla.suse.com/558892 | external |
| https://bugzilla.suse.com/561561 | external |
| https://bugzilla.suse.com/581162 | external |
| https://bugzilla.suse.com/581765 | external |
| https://bugzilla.suse.com/611931 | external |
| https://bugzilla.suse.com/694595 | external |
| https://bugzilla.suse.com/725950 | external |
| https://www.suse.com/security/cve/CVE-2009-3720 | external |
| https://bugzilla.suse.com/534721 | external |
| https://bugzilla.suse.com/550664 | external |
| https://bugzilla.suse.com/550666 | external |
| https://bugzilla.suse.com/558892 | external |
| https://bugzilla.suse.com/561561 | external |
| https://bugzilla.suse.com/581162 | external |
| https://bugzilla.suse.com/581765 | external |
| https://bugzilla.suse.com/611931 | external |
| https://bugzilla.suse.com/725950 | external |
| https://www.suse.com/security/cve/CVE-2012-0876 | external |
| https://bugzilla.suse.com/750914 | external |
| https://bugzilla.suse.com/751464 | external |
| https://bugzilla.suse.com/751465 | external |
| https://bugzilla.suse.com/983215 | external |
| https://bugzilla.suse.com/983216 | external |
| https://www.suse.com/security/cve/CVE-2012-1147 | external |
| https://bugzilla.suse.com/750914 | external |
| https://bugzilla.suse.com/751464 | external |
| https://bugzilla.suse.com/751465 | external |
| https://www.suse.com/security/cve/CVE-2012-1148 | external |
| https://bugzilla.suse.com/750914 | external |
| https://bugzilla.suse.com/751464 | external |
| https://bugzilla.suse.com/751465 | external |
| https://www.suse.com/security/cve/CVE-2012-6702 | external |
| https://bugzilla.suse.com/983215 | external |
| https://bugzilla.suse.com/983216 | external |
| https://www.suse.com/security/cve/CVE-2015-1283 | external |
| https://bugzilla.suse.com/1034050 | external |
| https://bugzilla.suse.com/939077 | external |
| https://bugzilla.suse.com/979441 | external |
| https://bugzilla.suse.com/980391 | external |
| https://bugzilla.suse.com/983985 | external |
| https://www.suse.com/security/cve/CVE-2016-0718 | external |
| https://bugzilla.suse.com/979441 | external |
| https://bugzilla.suse.com/991809 | external |
| https://www.suse.com/security/cve/CVE-2016-4472 | external |
| https://bugzilla.suse.com/1034050 | external |
| https://bugzilla.suse.com/939077 | external |
| https://bugzilla.suse.com/980391 | external |
| https://bugzilla.suse.com/983985 | external |
| https://www.suse.com/security/cve/CVE-2016-5300 | external |
| https://bugzilla.suse.com/983216 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "expat-2.2.0-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the expat-2.2.0-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10077",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10077-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-2625 page",
"url": "https://www.suse.com/security/cve/CVE-2009-2625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3560 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3560/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3720 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0876 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1147 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1148 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-6702 page",
"url": "https://www.suse.com/security/cve/CVE-2012-6702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1283 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0718 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4472 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4472/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5300 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5300/"
}
],
"title": "expat-2.2.0-3.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10077-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "expat-2.2.0-3.1.aarch64",
"product": {
"name": "expat-2.2.0-3.1.aarch64",
"product_id": "expat-2.2.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libexpat-devel-2.2.0-3.1.aarch64",
"product": {
"name": "libexpat-devel-2.2.0-3.1.aarch64",
"product_id": "libexpat-devel-2.2.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libexpat-devel-32bit-2.2.0-3.1.aarch64",
"product": {
"name": "libexpat-devel-32bit-2.2.0-3.1.aarch64",
"product_id": "libexpat-devel-32bit-2.2.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libexpat1-2.2.0-3.1.aarch64",
"product": {
"name": "libexpat1-2.2.0-3.1.aarch64",
"product_id": "libexpat1-2.2.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libexpat1-32bit-2.2.0-3.1.aarch64",
"product": {
"name": "libexpat1-32bit-2.2.0-3.1.aarch64",
"product_id": "libexpat1-32bit-2.2.0-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-2.2.0-3.1.ppc64le",
"product": {
"name": "expat-2.2.0-3.1.ppc64le",
"product_id": "expat-2.2.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libexpat-devel-2.2.0-3.1.ppc64le",
"product": {
"name": "libexpat-devel-2.2.0-3.1.ppc64le",
"product_id": "libexpat-devel-2.2.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"product": {
"name": "libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"product_id": "libexpat-devel-32bit-2.2.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libexpat1-2.2.0-3.1.ppc64le",
"product": {
"name": "libexpat1-2.2.0-3.1.ppc64le",
"product_id": "libexpat1-2.2.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libexpat1-32bit-2.2.0-3.1.ppc64le",
"product": {
"name": "libexpat1-32bit-2.2.0-3.1.ppc64le",
"product_id": "libexpat1-32bit-2.2.0-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-2.2.0-3.1.s390x",
"product": {
"name": "expat-2.2.0-3.1.s390x",
"product_id": "expat-2.2.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libexpat-devel-2.2.0-3.1.s390x",
"product": {
"name": "libexpat-devel-2.2.0-3.1.s390x",
"product_id": "libexpat-devel-2.2.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libexpat-devel-32bit-2.2.0-3.1.s390x",
"product": {
"name": "libexpat-devel-32bit-2.2.0-3.1.s390x",
"product_id": "libexpat-devel-32bit-2.2.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libexpat1-2.2.0-3.1.s390x",
"product": {
"name": "libexpat1-2.2.0-3.1.s390x",
"product_id": "libexpat1-2.2.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libexpat1-32bit-2.2.0-3.1.s390x",
"product": {
"name": "libexpat1-32bit-2.2.0-3.1.s390x",
"product_id": "libexpat1-32bit-2.2.0-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-2.2.0-3.1.x86_64",
"product": {
"name": "expat-2.2.0-3.1.x86_64",
"product_id": "expat-2.2.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libexpat-devel-2.2.0-3.1.x86_64",
"product": {
"name": "libexpat-devel-2.2.0-3.1.x86_64",
"product_id": "libexpat-devel-2.2.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libexpat-devel-32bit-2.2.0-3.1.x86_64",
"product": {
"name": "libexpat-devel-32bit-2.2.0-3.1.x86_64",
"product_id": "libexpat-devel-32bit-2.2.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libexpat1-2.2.0-3.1.x86_64",
"product": {
"name": "libexpat1-2.2.0-3.1.x86_64",
"product_id": "libexpat1-2.2.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libexpat1-32bit-2.2.0-3.1.x86_64",
"product": {
"name": "libexpat1-32bit-2.2.0-3.1.x86_64",
"product_id": "libexpat1-32bit-2.2.0-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64"
},
"product_reference": "expat-2.2.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le"
},
"product_reference": "expat-2.2.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-2.2.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x"
},
"product_reference": "expat-2.2.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64"
},
"product_reference": "expat-2.2.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat-devel-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64"
},
"product_reference": "libexpat-devel-2.2.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat-devel-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le"
},
"product_reference": "libexpat-devel-2.2.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat-devel-2.2.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x"
},
"product_reference": "libexpat-devel-2.2.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat-devel-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64"
},
"product_reference": "libexpat-devel-2.2.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat-devel-32bit-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64"
},
"product_reference": "libexpat-devel-32bit-2.2.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat-devel-32bit-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le"
},
"product_reference": "libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat-devel-32bit-2.2.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x"
},
"product_reference": "libexpat-devel-32bit-2.2.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat-devel-32bit-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64"
},
"product_reference": "libexpat-devel-32bit-2.2.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat1-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64"
},
"product_reference": "libexpat1-2.2.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat1-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le"
},
"product_reference": "libexpat1-2.2.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat1-2.2.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x"
},
"product_reference": "libexpat1-2.2.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat1-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64"
},
"product_reference": "libexpat1-2.2.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat1-32bit-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64"
},
"product_reference": "libexpat1-32bit-2.2.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat1-32bit-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le"
},
"product_reference": "libexpat1-32bit-2.2.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat1-32bit-2.2.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x"
},
"product_reference": "libexpat1-32bit-2.2.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libexpat1-32bit-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
},
"product_reference": "libexpat1-32bit-2.2.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-2625"
}
],
"notes": [
{
"category": "general",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-2625",
"url": "https://www.suse.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "SUSE Bug 525562 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/525562"
},
{
"category": "external",
"summary": "SUSE Bug 530717 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/530717"
},
{
"category": "external",
"summary": "SUSE Bug 534025 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/534025"
},
{
"category": "external",
"summary": "SUSE Bug 534721 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/534721"
},
{
"category": "external",
"summary": "SUSE Bug 537969 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/537969"
},
{
"category": "external",
"summary": "SUSE Bug 540945 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/540945"
},
{
"category": "external",
"summary": "SUSE Bug 548655 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/548655"
},
{
"category": "external",
"summary": "SUSE Bug 550664 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/550664"
},
{
"category": "external",
"summary": "SUSE Bug 553220 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/553220"
},
{
"category": "external",
"summary": "SUSE Bug 558892 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/558892"
},
{
"category": "external",
"summary": "SUSE Bug 581162 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/581162"
},
{
"category": "external",
"summary": "SUSE Bug 581765 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/581765"
},
{
"category": "external",
"summary": "SUSE Bug 610080 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/610080"
},
{
"category": "external",
"summary": "SUSE Bug 611931 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/611931"
},
{
"category": "external",
"summary": "SUSE Bug 611932 for CVE-2009-2625",
"url": "https://bugzilla.suse.com/611932"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-2625"
},
{
"cve": "CVE-2009-3560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3560"
}
],
"notes": [
{
"category": "general",
"text": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3560",
"url": "https://www.suse.com/security/cve/CVE-2009-3560"
},
{
"category": "external",
"summary": "SUSE Bug 550666 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/550666"
},
{
"category": "external",
"summary": "SUSE Bug 558892 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/558892"
},
{
"category": "external",
"summary": "SUSE Bug 561561 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/561561"
},
{
"category": "external",
"summary": "SUSE Bug 581162 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/581162"
},
{
"category": "external",
"summary": "SUSE Bug 581765 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/581765"
},
{
"category": "external",
"summary": "SUSE Bug 611931 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/611931"
},
{
"category": "external",
"summary": "SUSE Bug 694595 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/694595"
},
{
"category": "external",
"summary": "SUSE Bug 725950 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/725950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-3560"
},
{
"cve": "CVE-2009-3720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3720"
}
],
"notes": [
{
"category": "general",
"text": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3720",
"url": "https://www.suse.com/security/cve/CVE-2009-3720"
},
{
"category": "external",
"summary": "SUSE Bug 534721 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/534721"
},
{
"category": "external",
"summary": "SUSE Bug 550664 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/550664"
},
{
"category": "external",
"summary": "SUSE Bug 550666 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/550666"
},
{
"category": "external",
"summary": "SUSE Bug 558892 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/558892"
},
{
"category": "external",
"summary": "SUSE Bug 561561 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/561561"
},
{
"category": "external",
"summary": "SUSE Bug 581162 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/581162"
},
{
"category": "external",
"summary": "SUSE Bug 581765 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/581765"
},
{
"category": "external",
"summary": "SUSE Bug 611931 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/611931"
},
{
"category": "external",
"summary": "SUSE Bug 725950 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/725950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-3720"
},
{
"cve": "CVE-2012-0876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0876"
}
],
"notes": [
{
"category": "general",
"text": "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0876",
"url": "https://www.suse.com/security/cve/CVE-2012-0876"
},
{
"category": "external",
"summary": "SUSE Bug 750914 for CVE-2012-0876",
"url": "https://bugzilla.suse.com/750914"
},
{
"category": "external",
"summary": "SUSE Bug 751464 for CVE-2012-0876",
"url": "https://bugzilla.suse.com/751464"
},
{
"category": "external",
"summary": "SUSE Bug 751465 for CVE-2012-0876",
"url": "https://bugzilla.suse.com/751465"
},
{
"category": "external",
"summary": "SUSE Bug 983215 for CVE-2012-0876",
"url": "https://bugzilla.suse.com/983215"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2012-0876",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0876"
},
{
"cve": "CVE-2012-1147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1147"
}
],
"notes": [
{
"category": "general",
"text": "readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1147",
"url": "https://www.suse.com/security/cve/CVE-2012-1147"
},
{
"category": "external",
"summary": "SUSE Bug 750914 for CVE-2012-1147",
"url": "https://bugzilla.suse.com/750914"
},
{
"category": "external",
"summary": "SUSE Bug 751464 for CVE-2012-1147",
"url": "https://bugzilla.suse.com/751464"
},
{
"category": "external",
"summary": "SUSE Bug 751465 for CVE-2012-1147",
"url": "https://bugzilla.suse.com/751465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1147"
},
{
"cve": "CVE-2012-1148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1148"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1148",
"url": "https://www.suse.com/security/cve/CVE-2012-1148"
},
{
"category": "external",
"summary": "SUSE Bug 750914 for CVE-2012-1148",
"url": "https://bugzilla.suse.com/750914"
},
{
"category": "external",
"summary": "SUSE Bug 751464 for CVE-2012-1148",
"url": "https://bugzilla.suse.com/751464"
},
{
"category": "external",
"summary": "SUSE Bug 751465 for CVE-2012-1148",
"url": "https://bugzilla.suse.com/751465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1148"
},
{
"cve": "CVE-2012-6702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-6702"
}
],
"notes": [
{
"category": "general",
"text": "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-6702",
"url": "https://www.suse.com/security/cve/CVE-2012-6702"
},
{
"category": "external",
"summary": "SUSE Bug 983215 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983215"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-6702"
},
{
"cve": "CVE-2015-1283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1283"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1283",
"url": "https://www.suse.com/security/cve/CVE-2015-1283"
},
{
"category": "external",
"summary": "SUSE Bug 1034050 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/1034050"
},
{
"category": "external",
"summary": "SUSE Bug 939077 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/939077"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 980391 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/980391"
},
{
"category": "external",
"summary": "SUSE Bug 983985 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/983985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-1283"
},
{
"cve": "CVE-2016-0718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0718"
}
],
"notes": [
{
"category": "general",
"text": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0718",
"url": "https://www.suse.com/security/cve/CVE-2016-0718"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 991809 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/991809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-0718"
},
{
"cve": "CVE-2016-4472",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4472"
}
],
"notes": [
{
"category": "general",
"text": "The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4472",
"url": "https://www.suse.com/security/cve/CVE-2016-4472"
},
{
"category": "external",
"summary": "SUSE Bug 1034050 for CVE-2016-4472",
"url": "https://bugzilla.suse.com/1034050"
},
{
"category": "external",
"summary": "SUSE Bug 939077 for CVE-2016-4472",
"url": "https://bugzilla.suse.com/939077"
},
{
"category": "external",
"summary": "SUSE Bug 980391 for CVE-2016-4472",
"url": "https://bugzilla.suse.com/980391"
},
{
"category": "external",
"summary": "SUSE Bug 983985 for CVE-2016-4472",
"url": "https://bugzilla.suse.com/983985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-4472"
},
{
"cve": "CVE-2016-5300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5300"
}
],
"notes": [
{
"category": "general",
"text": "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5300",
"url": "https://www.suse.com/security/cve/CVE-2016-5300"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2016-5300",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:expat-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x",
"openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-5300"
}
]
}
RHSA-2012:0731
Vulnerability from csaf_redhat - Published: 2012-06-13 13:56 - Updated: 2026-05-14 22:16A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
A memory leak flaw was found in Expat. If an XML file processed by an application linked against Expat triggered a memory re-allocation failure, Expat failed to free the previously allocated memory. This could cause the application to exit unexpectedly or crash when all available memory is exhausted.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2012:0731 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=786617 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=801648 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2012-0876 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=786617 | external |
| https://www.cve.org/CVERecord?id=CVE-2012-0876 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2012-0876 | external |
| https://access.redhat.com/security/cve/CVE-2012-1148 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=801648 | external |
| https://www.cve.org/CVERecord?id=CVE-2012-1148 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2012-1148 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated expat packages that fix two security issues are now available for\nRed Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Expat is a C library written by James Clark for parsing XML documents.\n\nA denial of service flaw was found in the implementation of hash arrays in\nExpat. An attacker could use this flaw to make an application using Expat\nconsume an excessive amount of CPU time by providing a specially-crafted\nXML file that triggers multiple hash function collisions. To mitigate\nthis issue, randomization has been added to the hash function to reduce the\nchance of an attacker successfully causing intentional collisions.\n(CVE-2012-0876)\n\nA memory leak flaw was found in Expat. If an XML file processed by an\napplication linked against Expat triggered a memory re-allocation failure,\nExpat failed to free the previously allocated memory. This could cause the\napplication to exit unexpectedly or crash when all available memory is\nexhausted. (CVE-2012-1148)\n\nAll Expat users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, applications using the Expat library must be restarted for the\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0731",
"url": "https://access.redhat.com/errata/RHSA-2012:0731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "786617",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617"
},
{
"category": "external",
"summary": "801648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0731.json"
}
],
"title": "Red Hat Security Advisory: expat security update",
"tracking": {
"current_release_date": "2026-05-14T22:16:09+00:00",
"generator": {
"date": "2026-05-14T22:16:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2012:0731",
"initial_release_date": "2012-06-13T13:56:00+00:00",
"revision_history": [
{
"date": "2012-06-13T13:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-06-13T14:00:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:16:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.i686",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686",
"product_id": "expat-devel-0:2.0.1-11.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.i686",
"product": {
"name": "expat-0:2.0.1-11.el6_2.i686",
"product_id": "expat-0:2.0.1-11.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"product_id": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.x86_64",
"product": {
"name": "expat-0:2.0.1-11.el6_2.x86_64",
"product_id": "expat-0:2.0.1-11.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.x86_64",
"product": {
"name": "expat-0:1.95.8-11.el5_8.x86_64",
"product_id": "expat-0:1.95.8-11.el5_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"product_id": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.src",
"product": {
"name": "expat-0:2.0.1-11.el6_2.src",
"product_id": "expat-0:2.0.1-11.el6_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.src",
"product": {
"name": "expat-0:1.95.8-11.el5_8.src",
"product_id": "expat-0:1.95.8-11.el5_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.s390x",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x",
"product_id": "expat-devel-0:2.0.1-11.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.s390x",
"product": {
"name": "expat-0:2.0.1-11.el6_2.s390x",
"product_id": "expat-0:2.0.1-11.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.s390x",
"product": {
"name": "expat-0:1.95.8-11.el5_8.s390x",
"product_id": "expat-0:1.95.8-11.el5_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.s390x",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390x",
"product_id": "expat-devel-0:1.95.8-11.el5_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.s390",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390",
"product_id": "expat-devel-0:2.0.1-11.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.s390",
"product": {
"name": "expat-0:2.0.1-11.el6_2.s390",
"product_id": "expat-0:2.0.1-11.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.s390",
"product": {
"name": "expat-0:1.95.8-11.el5_8.s390",
"product_id": "expat-0:1.95.8-11.el5_8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.s390",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390",
"product_id": "expat-devel-0:1.95.8-11.el5_8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"product_id": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.ppc64",
"product": {
"name": "expat-0:2.0.1-11.el6_2.ppc64",
"product_id": "expat-0:2.0.1-11.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.ppc64",
"product": {
"name": "expat-0:1.95.8-11.el5_8.ppc64",
"product_id": "expat-0:1.95.8-11.el5_8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"product_id": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.ppc",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc",
"product_id": "expat-devel-0:2.0.1-11.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.ppc",
"product": {
"name": "expat-0:2.0.1-11.el6_2.ppc",
"product_id": "expat-0:2.0.1-11.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.ppc",
"product": {
"name": "expat-0:1.95.8-11.el5_8.ppc",
"product_id": "expat-0:1.95.8-11.el5_8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.ppc",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc",
"product_id": "expat-devel-0:1.95.8-11.el5_8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.ia64",
"product": {
"name": "expat-0:1.95.8-11.el5_8.ia64",
"product_id": "expat-0:1.95.8-11.el5_8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.ia64",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.ia64",
"product_id": "expat-devel-0:1.95.8-11.el5_8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.i386",
"product": {
"name": "expat-0:1.95.8-11.el5_8.i386",
"product_id": "expat-0:1.95.8-11.el5_8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.i386",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.i386",
"product_id": "expat-devel-0:1.95.8-11.el5_8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src"
},
"product_reference": "expat-0:1.95.8-11.el5_8.src",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src"
},
"product_reference": "expat-0:1.95.8-11.el5_8.src",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src"
},
"product_reference": "expat-0:1.95.8-11.el5_8.src",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-6.2.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-0876",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2012-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "786617"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: hash table collisions CPU usage DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0876"
},
{
"category": "external",
"summary": "RHBZ#786617",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876"
}
],
"release_date": "2012-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-06-13T13:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0731"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "expat: hash table collisions CPU usage DoS"
},
{
"cve": "CVE-2012-1148",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2012-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "801648"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in Expat. If an XML file processed by an application linked against Expat triggered a memory re-allocation failure, Expat failed to free the previously allocated memory. This could cause the application to exit unexpectedly or crash when all available memory is exhausted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Memory leak in poolGrow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1148"
},
{
"category": "external",
"summary": "RHBZ#801648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1148"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148"
}
],
"release_date": "2012-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-06-13T13:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0731"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "expat: Memory leak in poolGrow"
}
]
}
RHSA-2012_0731
Vulnerability from csaf_redhat - Published: 2012-06-13 13:56 - Updated: 2024-11-22 05:16A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
A memory leak flaw was found in Expat. If an XML file processed by an application linked against Expat triggered a memory re-allocation failure, Expat failed to free the previously allocated memory. This could cause the application to exit unexpectedly or crash when all available memory is exhausted.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2012:0731 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=786617 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=801648 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2012-0876 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=786617 | external |
| https://www.cve.org/CVERecord?id=CVE-2012-0876 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2012-0876 | external |
| https://access.redhat.com/security/cve/CVE-2012-1148 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=801648 | external |
| https://www.cve.org/CVERecord?id=CVE-2012-1148 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2012-1148 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated expat packages that fix two security issues are now available for\nRed Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Expat is a C library written by James Clark for parsing XML documents.\n\nA denial of service flaw was found in the implementation of hash arrays in\nExpat. An attacker could use this flaw to make an application using Expat\nconsume an excessive amount of CPU time by providing a specially-crafted\nXML file that triggers multiple hash function collisions. To mitigate\nthis issue, randomization has been added to the hash function to reduce the\nchance of an attacker successfully causing intentional collisions.\n(CVE-2012-0876)\n\nA memory leak flaw was found in Expat. If an XML file processed by an\napplication linked against Expat triggered a memory re-allocation failure,\nExpat failed to free the previously allocated memory. This could cause the\napplication to exit unexpectedly or crash when all available memory is\nexhausted. (CVE-2012-1148)\n\nAll Expat users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, applications using the Expat library must be restarted for the\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0731",
"url": "https://access.redhat.com/errata/RHSA-2012:0731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "786617",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617"
},
{
"category": "external",
"summary": "801648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0731.json"
}
],
"title": "Red Hat Security Advisory: expat security update",
"tracking": {
"current_release_date": "2024-11-22T05:16:35+00:00",
"generator": {
"date": "2024-11-22T05:16:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2012:0731",
"initial_release_date": "2012-06-13T13:56:00+00:00",
"revision_history": [
{
"date": "2012-06-13T13:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-06-13T14:00:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T05:16:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.i686",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686",
"product_id": "expat-devel-0:2.0.1-11.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.i686",
"product": {
"name": "expat-0:2.0.1-11.el6_2.i686",
"product_id": "expat-0:2.0.1-11.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"product_id": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.x86_64",
"product": {
"name": "expat-0:2.0.1-11.el6_2.x86_64",
"product_id": "expat-0:2.0.1-11.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.x86_64",
"product": {
"name": "expat-0:1.95.8-11.el5_8.x86_64",
"product_id": "expat-0:1.95.8-11.el5_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"product_id": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.src",
"product": {
"name": "expat-0:2.0.1-11.el6_2.src",
"product_id": "expat-0:2.0.1-11.el6_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.src",
"product": {
"name": "expat-0:1.95.8-11.el5_8.src",
"product_id": "expat-0:1.95.8-11.el5_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.s390x",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x",
"product_id": "expat-devel-0:2.0.1-11.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.s390x",
"product": {
"name": "expat-0:2.0.1-11.el6_2.s390x",
"product_id": "expat-0:2.0.1-11.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.s390x",
"product": {
"name": "expat-0:1.95.8-11.el5_8.s390x",
"product_id": "expat-0:1.95.8-11.el5_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.s390x",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390x",
"product_id": "expat-devel-0:1.95.8-11.el5_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.s390",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390",
"product_id": "expat-devel-0:2.0.1-11.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.s390",
"product": {
"name": "expat-0:2.0.1-11.el6_2.s390",
"product_id": "expat-0:2.0.1-11.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.s390",
"product": {
"name": "expat-0:1.95.8-11.el5_8.s390",
"product_id": "expat-0:1.95.8-11.el5_8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.s390",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390",
"product_id": "expat-devel-0:1.95.8-11.el5_8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"product_id": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.ppc64",
"product": {
"name": "expat-0:2.0.1-11.el6_2.ppc64",
"product_id": "expat-0:2.0.1-11.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.ppc64",
"product": {
"name": "expat-0:1.95.8-11.el5_8.ppc64",
"product_id": "expat-0:1.95.8-11.el5_8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"product_id": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"product": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"product_id": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:2.0.1-11.el6_2.ppc",
"product": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc",
"product_id": "expat-devel-0:2.0.1-11.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-0:2.0.1-11.el6_2.ppc",
"product": {
"name": "expat-0:2.0.1-11.el6_2.ppc",
"product_id": "expat-0:2.0.1-11.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.ppc",
"product": {
"name": "expat-0:1.95.8-11.el5_8.ppc",
"product_id": "expat-0:1.95.8-11.el5_8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.ppc",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc",
"product_id": "expat-devel-0:1.95.8-11.el5_8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.ia64",
"product": {
"name": "expat-0:1.95.8-11.el5_8.ia64",
"product_id": "expat-0:1.95.8-11.el5_8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.ia64",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.ia64",
"product_id": "expat-devel-0:1.95.8-11.el5_8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "expat-0:1.95.8-11.el5_8.i386",
"product": {
"name": "expat-0:1.95.8-11.el5_8.i386",
"product_id": "expat-0:1.95.8-11.el5_8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"product": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"product_id": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "expat-devel-0:1.95.8-11.el5_8.i386",
"product": {
"name": "expat-devel-0:1.95.8-11.el5_8.i386",
"product_id": "expat-devel-0:1.95.8-11.el5_8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src"
},
"product_reference": "expat-0:1.95.8-11.el5_8.src",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src"
},
"product_reference": "expat-0:1.95.8-11.el5_8.src",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src"
},
"product_reference": "expat-0:1.95.8-11.el5_8.src",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64"
},
"product_reference": "expat-devel-0:1.95.8-11.el5_8.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Client-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Server-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src"
},
"product_reference": "expat-0:2.0.1-11.el6_2.src",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.i686",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x",
"relates_to_product_reference": "6Workstation-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
},
"product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-6.2.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-0876",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2012-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "786617"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: hash table collisions CPU usage DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0876"
},
{
"category": "external",
"summary": "RHBZ#786617",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876"
}
],
"release_date": "2012-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-06-13T13:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0731"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "expat: hash table collisions CPU usage DoS"
},
{
"cve": "CVE-2012-1148",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2012-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "801648"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in Expat. If an XML file processed by an application linked against Expat triggered a memory re-allocation failure, Expat failed to free the previously allocated memory. This could cause the application to exit unexpectedly or crash when all available memory is exhausted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: Memory leak in poolGrow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1148"
},
{
"category": "external",
"summary": "RHBZ#801648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1148"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148"
}
],
"release_date": "2012-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-06-13T13:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0731"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src",
"5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x",
"5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src",
"6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x",
"6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "expat: Memory leak in poolGrow"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.