Action not permitted
Modal body text goes here.
CVE-2012-1148
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49504" }, { "name": "USN-1527-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1527-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205637" }, { "name": "1034344", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034344" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167" }, { "name": "51040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51040" }, { "name": "RHSA-2012:0731", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html" }, { "name": "52379", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52379" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/" }, { "name": "RHSA-2016:0062", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html" }, { "name": "APPLE-SA-2015-12-08-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "name": "DSA-2525", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2525" }, { "name": "MDVSA-2012:041", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "USN-1613-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1613-2" }, { "name": "51024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51024" }, { "name": "USN-1613-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1613-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "49504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49504" }, { "name": "USN-1527-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1527-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205637" }, { "name": "1034344", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034344" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167" }, { "name": "51040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51040" }, { "name": "RHSA-2012:0731", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html" }, { "name": "52379", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52379" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/" }, { "name": "RHSA-2016:0062", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html" }, { "name": "APPLE-SA-2015-12-08-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "name": "DSA-2525", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2525" }, { "name": "MDVSA-2012:041", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "USN-1613-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1613-2" }, { "name": "51024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51024" }, { "name": "USN-1613-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1613-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-1148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49504" }, { "name": "USN-1527-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1527-1" }, { "name": "https://support.apple.com/HT205637", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205637" }, { "name": "1034344", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034344" }, { "name": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167", "refsource": "CONFIRM", "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167" }, { "name": "51040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51040" }, { "name": "RHSA-2012:0731", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html" }, { "name": "52379", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52379" }, { "name": "http://sourceforge.net/projects/expat/files/expat/2.1.0/", "refsource": "CONFIRM", "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/" }, { "name": "RHSA-2016:0062", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html" }, { "name": "APPLE-SA-2015-12-08-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "name": "DSA-2525", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2525" }, { "name": "MDVSA-2012:041", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041" }, { "name": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127", "refsource": "CONFIRM", "url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "USN-1613-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1613-2" }, { "name": "51024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51024" }, { "name": "USN-1613-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1613-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1148", "datePublished": "2012-07-03T19:00:00", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:45:27.498Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-1148\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-07-03T19:55:02.757\",\"lastModified\":\"2021-01-25T15:44:35.543\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples fugas de memoria en la funci\u00f3n poolGrow en expat/lib/xmlparse.c en expat anteriores a v2.1.0 podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de un n\u00famero largo de ficheros XML manipulados que provocan fallos en la relocalizaci\u00f3n cuando se expanden las entidades.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.0.1\",\"matchCriteriaId\":\"0B298040-6E60-4701-9F0A-E57CDD3CFA83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:1.95.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"055C8DC2-8840-4758-9F3F-21EEF87845DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:1.95.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64E471EF-41A9-491F-B032-568723816ADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:1.95.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9F94DC5-6A6C-4DB4-A6FA-CDF786AC8E0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:1.95.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19EC2420-0140-4233-A766-8D3D9B0933B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:1.95.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"572CC266-7C6B-46FE-963F-B457A387B24A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:1.95.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B354846-9F53-4D07-B34E-F8BB63836299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:1.95.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0B6B5BF-5A76-46B9-BD7B-679F28821CD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"843ADBBB-69DE-4128-A1B0-BCA3E85DC6BA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.11.1\",\"matchCriteriaId\":\"767D7ECF-24C5-4605-9368-5A41456A475E\"}]}]}],\"references\":[{\"url\":\"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0731.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0062.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2957.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/49504\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/51024\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/51040\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sourceforge.net/projects/expat/files/expat/2.1.0/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2525\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:041\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/52379\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1034344\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1527-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1613-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1613-2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.apple.com/HT205637\",\"source\":\"secalert@redhat.com\"}]}}" } }
var-201207-0370
Vulnerability from variot
Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities. The Expat library is prone to multiple denial-of-service vulnerabilities because it fails to properly handle crafted XML data. Exploiting these issues allows remote attackers to cause denial-of-service conditions in the context of an application using the vulnerable XML parsing library. Expat versions prior to 2.1.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2015-12-08-3 OS X El Capitan 10.11.2 and Security Update 2015-008
OS X El Capitan 10.11.2 and Security Update 2015-008 is now available and addresses the following:
apache_mod_php Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.29, the most serious of which may have led to remote code execution. These were addressed by updating PHP to version 5.5.30. CVE-ID CVE-2015-7803 CVE-2015-7804
AppSandbox Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may maintain access to Contacts after having access revoked Description: An issue existed in the sandbox's handling of hard links. This issue was addressed through improved hardening of the app sandbox. CVE-ID CVE-2015-7001 : Razvan Deaconescu and Mihai Bucicoiu of University POLITEHNICA of Bucharest; Luke Deshotels and William Enck of North Carolina State University; Lucas Vincenzo Davi and Ahmad-Reza Sadeghi of TU Darmstadt
Bluetooth Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in the Bluetooth HCI interface. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7108 : Ian Beer of Google Project Zero
CFNetwork HTTPProtocol Available for: OS X El Capitan v10.11 and v10.11.1 Impact: An attacker with a privileged network position may be able to bypass HSTS Description: An input validation issue existed within URL processing. This issue was addressed through improved URL validation. CVE-ID CVE-2015-7094 : Tsubasa Iinuma (@llamakko_cafe) of Gehirn Inc. and Muneaki Nishimura (nishimunea)
Compression Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: An uninitialized memory access issue existed in zlib. This issue was addressed through improved memory initialization and additional validation of zlib streams. CVE-ID CVE-2015-7054 : j00ru
Configuration Profiles Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local attacker may be able to install a configuration profile without admin privileges Description: An issue existed when installing configuration profiles. This issue was addressed through improved authorization checks. CVE-ID CVE-2015-7062 : David Mulder of Dell Software
CoreGraphics Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-7105 : John Villamil (@day6reak), Yahoo Pentest Team
CoreMedia Playback Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the processing of malformed media files. These issues were addressed through improved memory handling. CVE-ID CVE-2015-7074 : Apple CVE-2015-7075
Disk Images Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7110 : Ian Beer of Google Project Zero
EFI Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A path validation issue existed in the kernel loader. This was addressed through improved environment sanitization. CVE-ID CVE-2015-7063 : Apple
File Bookmark Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A path validation issue existed in app scoped bookmarks. This was addressed through improved environment sanitization. CVE-ID CVE-2015-7071 : Apple
Hypervisor Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A use after free issue existed in the handling of VM objects. This issue was addressed through improved memory management. CVE-ID CVE-2015-7078 : Ian Beer of Google Project Zero
iBooks Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Parsing a maliciously crafted iBooks file may lead to disclosure of user information Description: An XML external entity reference issue existed with iBook parsing. This issue was addressed through improved parsing. CVE-ID CVE-2015-7081 : Behrouz Sadeghipour (@Nahamsec) and Patrik Fehrenbach (@ITSecurityguard)
ImageIO Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue existed in ImageIO. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7053 : Apple
Intel Graphics Driver Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A null pointer dereference issue was addressed through improved input validation. CVE-ID CVE-2015-7076 : Juwei Lin of TrendMicro, beist and ABH of BoB, and JeongHoon Shin@A.D.D
Intel Graphics Driver Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in the Intel Graphics Driver. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7106 : Ian Beer of Google Project Zero, Juwei Lin of TrendMicro, beist and ABH of BoB, and JeongHoon Shin@A.D.D
Intel Graphics Driver Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with system privileges Description: An out of bounds memory access issue existed in the Intel Graphics Driver. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7077 : Ian Beer of Google Project Zero
IOAcceleratorFamily Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in IOAcceleratorFamily. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7109 : Juwei Lin of TrendMicro
IOHIDFamily Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues existed in IOHIDFamily API. These issues were addressed through improved memory handling. CVE-ID CVE-2015-7111 : beist and ABH of BoB CVE-2015-7112 : Ian Beer of Google Project Zero
IOKit SCSI Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference existed in the handling of a certain userclient type. This issue was addressed through improved validation. CVE-ID CVE-2015-7068 : Ian Beer of Google Project Zero
IOThunderboltFamily Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to cause a system denial of service Description: A null pointer dereference existed in IOThunderboltFamily's handling of certain userclient types. This issue was addressed through improved validation of IOThunderboltFamily contexts. CVE-ID CVE-2015-7067 : Juwei Lin of TrendMicro
Kernel Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local application may be able to cause a denial of service Description: Multiple denial of service issues were addressed through improved memory handling. CVE-ID CVE-2015-7040 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2015-7041 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2015-7042 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2015-7043 : Tarjei Mandt (@kernelpool)
Kernel Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues existed in the kernel. These issues were addressed through improved memory handling. CVE-ID CVE-2015-7083 : Ian Beer of Google Project Zero CVE-2015-7084 : Ian Beer of Google Project Zero
Kernel Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: An issue existed in the parsing of mach messages. This issue was addressed through improved validation of mach messages. CVE-ID CVE-2015-7047 : Ian Beer of Google Project Zero
kext tools Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A validation issue existed during the loading of kernel extensions. This issue was addressed through additional verification. CVE-ID CVE-2015-7052 : Apple
Keychain Access Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may be able to masquerade as the Keychain Server. Description: An issue existed in how Keychain Access interacted with Keychain Agent. This issue was resolved by removing legacy functionality. CVE-ID CVE-2015-7045 : Luyi Xing and XiaoFeng Wang of Indiana University Bloomington, Xiaolong Bai of Indiana University Bloomington and Tsinghua University, Tongxin Li of Peking University, Kai Chen of Indiana University Bloomington and Institute of Information Engineering, Xiaojing Liao of Georgia Institute of Technology, Shi- Min Hu of Tsinghua University, and Xinhui Han of Peking University
libarchive Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of archives. This issue was addressed through improved memory handling. CVE-ID CVE-2011-2895 : @practicalswift
libc Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Processing a maliciously crafted package may lead to arbitrary code execution Description: Multiple buffer overflows existed in the C standard library. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-7038 CVE-2015-7039 : Maksymilian Arciemowicz (CXSECURITY.COM)
libexpat Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Multiple vulnerabilities in expat Description: Multiple vulnerabilities existed in expat version prior to 2.1.0. CVE-ID CVE-2012-0876 : Vincent Danen CVE-2012-1147 : Kurt Seifried CVE-2012-1148 : Kurt Seifried
libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: A memory corruption issue existed in the parsing of XML files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3807 : Wei Lei and Liu Yang of Nanyang Technological University
OpenGL Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in OpenGL. These issues were addressed through improved memory handling. CVE-ID CVE-2015-7064 : Apple CVE-2015-7065 : Apple CVE-2015-7066 : Tongbo Luo and Bo Qu of Palo Alto Networks
OpenLDAP Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A remote unauthenticated client may be able to cause a denial of service Description: An input validation issue existed in OpenLDAP. This issue was addressed through improved input validation. CVE-ID CVE-2015-6908
OpenSSH Available for: OS X El Capitan v10.11 and v10.11.1 Impact: Multiple vulnerabilities in LibreSSL Description: Multiple vulnerabilities existed in LibreSSL versions prior to 2.1.8. These were addressed by updating LibreSSL to version 2.1.8. CVE-ID CVE-2015-5333 CVE-2015-5334
QuickLook Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: Opening a maliciously crafted iWork file may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of iWork files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7107
Sandbox Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application with root privileges may be able to bypass kernel address space layout randomization Description: An insufficient privilege separation issue existed in xnu. This issue was addressed by improved authorization checks. CVE-ID CVE-2015-7046 : Apple
Security Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A remote attacker may cause an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in handling SSL handshakes. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7073 : Benoit Foucher of ZeroC, Inc.
Security Available for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5 Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the ASN.1 decoder. These issues were addressed through improved input validation CVE-ID CVE-2015-7059 : David Keeler of Mozilla CVE-2015-7060 : Tyson Smith of Mozilla CVE-2015-7061 : Ryan Sleevi of Google
Security Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application may gain access to a user's Keychain items Description: An issue existed in the validation of access control lists for keychain items. This issue was addressed through improved access control list checks. CVE-ID CVE-2015-7058
System Integrity Protection Available for: OS X El Capitan v10.11 and v10.11.1 Impact: A malicious application with root privileges may be able to execute arbitrary code with system privileges Description: A privilege issue existed in handling union mounts. This issue was addressed by improved authorization checks. CVE-ID CVE-2015-7044 : MacDefender
Installation note:
Security Update 2015-008 is recommended for all users and improves the security of OS X. After installing this update, the QuickTime 7 web browser plug-in will no longer be enabled by default. Learn what to do if you still need this legacy plug-in. https://support.apple.com/en-us/HT205081
OS X El Capitan v10.11.2 includes the security content of Safari 9.0.2: https://support.apple.com/en-us/HT205639
OS X El Capitan 10.11.2 and Security Update 2015-008 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJWZzzVAAoJEBcWfLTuOo7tQsMQAIBHD6EQQmEBqEqNqszdNS4j PE0wrKpgJUe79i5bUVXF3e8bK41+QGQzouceIaKK/r0aizEmUFbgvKG0BFCYacjn +XiDt0V4Itnf2VVvcjodEjVM8Os1BVl0G4tsrXfqJNJ8UmzqQfSFZZ0l+/yQW0rQ jtGYuBIezeWJ/2aA2l5qC89KgiWjmN9YzwpBUx3+02maWIJaKKIvUZy4b7xbQ4fz 0AKMHHh8u/xoPjAIpgXEpYuXM9XILabXkex3m5fp5roBipyimto/OomSsv/CuM5g OjMLz1ZL/dPf7yGaxSD+cTfdKJStTsm89VRWuE9MfAgWdFqjH8CpM9CT4nxX1Q8s Ima2Vk7R+VbyOJksB2fygBtfqBmIjX+fwm52WxhW0B5HabfKMbPjoBKLGIcPsH36 Num/gxdQ+0eswLLUzzorq3Qm2ptxoY6t/ceRAm0HE497+1+YVAKETwTbQTaBZqlB BhDfxk85wYfi7uuKJUH5NPP6j7sXrkJvMAuPJOXcY0QLhyxb96oD6yWaYGWjOGEY Z9zphs8o57l6YW1DWjvVNbZOon05bjIrepzkq6F9Q3TzCGTRgYL5BEAlgaREIZVx rfmFZHP3xM60SIHRKPiiADXo4dg6TvDJ6h8n+L/6OTdylxUf6bxQdoO5cmBhny1T gvIdn3N1k8hWpmYDjxZd =Yi/n -----END PGP SIGNATURE----- . Content-Disposition: inline
============================================================================ Ubuntu Security Notice USN-1527-2 September 10, 2012
xmlrpc-c vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
Summary:
XML-RPC for C and C++ could be made to cause a denial of service by consuming excessive CPU and memory resources. This update provides the corresponding updates for XML-RPC for C and C++. Both issues described in the original advisory affected XML-RPC for C and C++ in Ubuntu 10.04 LTS, 11.04, 11.10 and 12.04 LTS.
Original advisory details:
It was discovered that Expat computed hash values without restricting the ability to trigger hash collisions predictably. This issue only affected Ubuntu 8.04 LTS, 10.04 LTS, 11.04 and 11.10. (CVE-2012-1148)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: libxmlrpc-core-c3 1.16.33-3.1ubuntu5.1
Ubuntu 11.10: libxmlrpc-core-c3-0 1.16.32-0ubuntu4.1
Ubuntu 11.04: libxmlrpc-core-c3-0 1.16.32-0ubuntu3.1
Ubuntu 10.04 LTS: libxmlrpc-core-c3 1.06.27-1ubuntu7.1
After a standard system upgrade you need to restart any applications linked against XML-RPC for C and C++ to effect the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201209-06
http://security.gentoo.org/
Severity: Normal Title: Expat: Multiple vulnerabilities Date: September 24, 2012 Bugs: #280615, #303727, #407519 ID: 201209-06
Synopsis
Multiple vulnerabilities have been found in Expat, possibly resulting in Denial of Service. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Expat users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/expat-2.1.0_beta3"
Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.
References
[ 1 ] CVE-2009-3560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3560 [ 2 ] CVE-2009-3720 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3720 [ 3 ] CVE-2012-0876 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0876 [ 4 ] CVE-2012-1147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1147 [ 5 ] CVE-2012-1148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1148
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201209-06.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: expat security update Advisory ID: RHSA-2012:0731-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0731.html Issue date: 2012-06-13 CVE Names: CVE-2012-0876 CVE-2012-1148 =====================================================================
- Summary:
Updated expat packages that fix two security issues are now available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
- Description:
Expat is a C library written by James Clark for parsing XML documents.
A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially-crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions. (CVE-2012-0876)
A memory leak flaw was found in Expat. If an XML file processed by an application linked against Expat triggered a memory re-allocation failure, Expat failed to free the previously allocated memory. This could cause the application to exit unexpectedly or crash when all available memory is exhausted. (CVE-2012-1148)
All Expat users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, applications using the Expat library must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258
- Bugs fixed (http://bugzilla.redhat.com/):
786617 - CVE-2012-0876 expat: hash table collisions CPU usage DoS 801648 - CVE-2012-1148 expat: Memory leak in poolGrow
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/expat-1.95.8-11.el5_8.src.rpm
i386: expat-1.95.8-11.el5_8.i386.rpm expat-debuginfo-1.95.8-11.el5_8.i386.rpm
x86_64: expat-1.95.8-11.el5_8.i386.rpm expat-1.95.8-11.el5_8.x86_64.rpm expat-debuginfo-1.95.8-11.el5_8.i386.rpm expat-debuginfo-1.95.8-11.el5_8.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/expat-1.95.8-11.el5_8.src.rpm
i386: expat-debuginfo-1.95.8-11.el5_8.i386.rpm expat-devel-1.95.8-11.el5_8.i386.rpm
x86_64: expat-debuginfo-1.95.8-11.el5_8.i386.rpm expat-debuginfo-1.95.8-11.el5_8.x86_64.rpm expat-devel-1.95.8-11.el5_8.i386.rpm expat-devel-1.95.8-11.el5_8.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/expat-1.95.8-11.el5_8.src.rpm
i386: expat-1.95.8-11.el5_8.i386.rpm expat-debuginfo-1.95.8-11.el5_8.i386.rpm expat-devel-1.95.8-11.el5_8.i386.rpm
ia64: expat-1.95.8-11.el5_8.i386.rpm expat-1.95.8-11.el5_8.ia64.rpm expat-debuginfo-1.95.8-11.el5_8.i386.rpm expat-debuginfo-1.95.8-11.el5_8.ia64.rpm expat-devel-1.95.8-11.el5_8.ia64.rpm
ppc: expat-1.95.8-11.el5_8.ppc.rpm expat-1.95.8-11.el5_8.ppc64.rpm expat-debuginfo-1.95.8-11.el5_8.ppc.rpm expat-debuginfo-1.95.8-11.el5_8.ppc64.rpm expat-devel-1.95.8-11.el5_8.ppc.rpm expat-devel-1.95.8-11.el5_8.ppc64.rpm
s390x: expat-1.95.8-11.el5_8.s390.rpm expat-1.95.8-11.el5_8.s390x.rpm expat-debuginfo-1.95.8-11.el5_8.s390.rpm expat-debuginfo-1.95.8-11.el5_8.s390x.rpm expat-devel-1.95.8-11.el5_8.s390.rpm expat-devel-1.95.8-11.el5_8.s390x.rpm
x86_64: expat-1.95.8-11.el5_8.i386.rpm expat-1.95.8-11.el5_8.x86_64.rpm expat-debuginfo-1.95.8-11.el5_8.i386.rpm expat-debuginfo-1.95.8-11.el5_8.x86_64.rpm expat-devel-1.95.8-11.el5_8.i386.rpm expat-devel-1.95.8-11.el5_8.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm
i386: expat-2.0.1-11.el6_2.i686.rpm expat-debuginfo-2.0.1-11.el6_2.i686.rpm
x86_64: expat-2.0.1-11.el6_2.i686.rpm expat-2.0.1-11.el6_2.x86_64.rpm expat-debuginfo-2.0.1-11.el6_2.i686.rpm expat-debuginfo-2.0.1-11.el6_2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm
i386: expat-debuginfo-2.0.1-11.el6_2.i686.rpm expat-devel-2.0.1-11.el6_2.i686.rpm
x86_64: expat-debuginfo-2.0.1-11.el6_2.i686.rpm expat-debuginfo-2.0.1-11.el6_2.x86_64.rpm expat-devel-2.0.1-11.el6_2.i686.rpm expat-devel-2.0.1-11.el6_2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm
x86_64: expat-2.0.1-11.el6_2.i686.rpm expat-2.0.1-11.el6_2.x86_64.rpm expat-debuginfo-2.0.1-11.el6_2.i686.rpm expat-debuginfo-2.0.1-11.el6_2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm
x86_64: expat-debuginfo-2.0.1-11.el6_2.i686.rpm expat-debuginfo-2.0.1-11.el6_2.x86_64.rpm expat-devel-2.0.1-11.el6_2.i686.rpm expat-devel-2.0.1-11.el6_2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm
i386: expat-2.0.1-11.el6_2.i686.rpm expat-debuginfo-2.0.1-11.el6_2.i686.rpm expat-devel-2.0.1-11.el6_2.i686.rpm
ppc64: expat-2.0.1-11.el6_2.ppc.rpm expat-2.0.1-11.el6_2.ppc64.rpm expat-debuginfo-2.0.1-11.el6_2.ppc.rpm expat-debuginfo-2.0.1-11.el6_2.ppc64.rpm expat-devel-2.0.1-11.el6_2.ppc.rpm expat-devel-2.0.1-11.el6_2.ppc64.rpm
s390x: expat-2.0.1-11.el6_2.s390.rpm expat-2.0.1-11.el6_2.s390x.rpm expat-debuginfo-2.0.1-11.el6_2.s390.rpm expat-debuginfo-2.0.1-11.el6_2.s390x.rpm expat-devel-2.0.1-11.el6_2.s390.rpm expat-devel-2.0.1-11.el6_2.s390x.rpm
x86_64: expat-2.0.1-11.el6_2.i686.rpm expat-2.0.1-11.el6_2.x86_64.rpm expat-debuginfo-2.0.1-11.el6_2.i686.rpm expat-debuginfo-2.0.1-11.el6_2.x86_64.rpm expat-devel-2.0.1-11.el6_2.i686.rpm expat-devel-2.0.1-11.el6_2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm
i386: expat-2.0.1-11.el6_2.i686.rpm expat-debuginfo-2.0.1-11.el6_2.i686.rpm expat-devel-2.0.1-11.el6_2.i686.rpm
x86_64: expat-2.0.1-11.el6_2.i686.rpm expat-2.0.1-11.el6_2.x86_64.rpm expat-debuginfo-2.0.1-11.el6_2.i686.rpm expat-debuginfo-2.0.1-11.el6_2.x86_64.rpm expat-devel-2.0.1-11.el6_2.i686.rpm expat-devel-2.0.1-11.el6_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2012-0876.html https://www.redhat.com/security/data/cve/CVE-2012-1148.html https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFP2KEPXlSAg2UNWIIRAhWPAJ0Q22boGq3FiPI7246uE8qjdEpq3gCfRNip 1zY6/nH/4z7IxjTyIkW0Jkk= =x3IW -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2017-03-28-2 Additional information for APPLE-SA-2017-03-22-1 iTunes for Windows 12.6
iTunes for Windows 12.6 addresses the following:
APNs Server Available for: Windows 7 and later Impact: An attacker in a privileged network position can track a user's activity Description: A client certificate was sent in plaintext
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201207-0370", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 1.4, "vendor": "apple", "version": "10.11.1" }, { "model": "libexpat", "scope": "eq", "trust": 1.0, "vendor": "libexpat", "version": "1.95.6" }, { "model": "libexpat", "scope": "eq", "trust": 1.0, "vendor": "libexpat", "version": "2.0.0" }, { "model": "libexpat", "scope": "lte", "trust": 1.0, "vendor": "libexpat", "version": "2.0.1" }, { "model": "libexpat", "scope": "eq", "trust": 1.0, "vendor": "libexpat", "version": "1.95.7" }, { "model": "libexpat", "scope": "eq", "trust": 1.0, "vendor": "libexpat", "version": "1.95.8" }, { "model": "libexpat", "scope": "eq", "trust": 1.0, "vendor": "libexpat", "version": "1.95.1" }, { "model": "libexpat", "scope": "eq", "trust": 1.0, "vendor": "libexpat", "version": "1.95.4" }, { "model": "libexpat", "scope": "eq", "trust": 1.0, "vendor": "libexpat", "version": "1.95.5" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.11.1" }, { "model": "libexpat", "scope": "eq", "trust": 1.0, "vendor": "libexpat", "version": "1.95.2" }, { "model": "expat", "scope": "lt", "trust": 0.8, "vendor": "expat", "version": "2.1.0" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "3.5" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.0" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.1" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.11" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.9" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "conferencing standard edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "netezza analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "freeflow print server 73.c5.11", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "voice portal sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.8.3" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1.1" }, { "model": "clark expat", "scope": "ne", "trust": 0.3, "vendor": "james", "version": "2.1" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "aura session manager", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.9.3" }, { "model": "aura system manager", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aura conferencing sp1 standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "freeflow print server 81.d0.73", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.11.2" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1.0.9" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "aura communication manager utility services sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.16.1.0.9.8" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aura experience portal", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "aura sip enablement services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "proactive contact", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "websphere application server full profile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kidd xml-rpc for c/c++", "scope": "ne", "trust": 0.3, "vendor": "eric", "version": "1.32" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "aura system manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4.0.15" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.3" }, { "model": "voice portal", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.1.3" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.3" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system platform sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura system platform", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "conferencing standard edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "websphere application server liberty profile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "websphere application server full profile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0.0.52" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "aura sip enablement services ssp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.0.3" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.0.9.8" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "solaris sru11.6", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "11.3" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "clark expat", "scope": "eq", "trust": 0.3, "vendor": "james", "version": "2.0.1" }, { "model": "netezza analytics", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.2.3.0" }, { "model": "meeting exchange", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "10" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "freeflow print server 91.d2.32", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.0-" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "11" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "aura communication manager utility services", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2.5.0.15" }, { "model": "aura presence services", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "aura sip enablement services sp4", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "aura presence services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "aura communication manager utility services", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aura presence services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "netezza analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.1" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "aura sip enablement services ssp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "netezza analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.2" }, { "model": "freeflow print server 82.d1.44", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura application enablement services", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "mac os security update", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x2015" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "freeflow print server 73.d2.33", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "kidd xml-rpc for c/c++", "scope": "eq", "trust": 0.3, "vendor": "eric", "version": "1.31" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "freeflow print server 93.e0.21c", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" } ], "sources": [ { "db": "BID", "id": "52379" }, { "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "db": "CNNVD", "id": "CNNVD-201204-164" }, { "db": "NVD", "id": "CVE-2012-1148" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.11.1", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1148" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "PACKETSTORM", "id": "134748" }, { "db": "PACKETSTORM", "id": "141808" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "141937" } ], "trust": 0.4 }, "cve": "CVE-2012-1148", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1148", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-54429", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1148", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201204-164", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54429", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54429" }, { "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "db": "CNNVD", "id": "CNNVD-201204-164" }, { "db": "NVD", "id": "CVE-2012-1148" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities. The Expat library is prone to multiple denial-of-service vulnerabilities because it fails to properly handle crafted XML data. \nExploiting these issues allows remote attackers to cause denial-of-service conditions in the context of an application using the vulnerable XML parsing library. \nExpat versions prior to 2.1.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2015-12-08-3 OS X El Capitan 10.11.2 and Security Update 2015-008\n\nOS X El Capitan 10.11.2 and Security Update 2015-008 is now available\nand addresses the following:\n\napache_mod_php\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: Multiple vulnerabilities in PHP\nDescription: Multiple vulnerabilities existed in PHP versions prior\nto 5.5.29, the most serious of which may have led to remote code\nexecution. These were addressed by updating PHP to version 5.5.30. \nCVE-ID\nCVE-2015-7803\nCVE-2015-7804\n\nAppSandbox\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A malicious application may maintain access to Contacts\nafter having access revoked\nDescription: An issue existed in the sandbox\u0027s handling of hard\nlinks. This issue was addressed through improved hardening of the app\nsandbox. \nCVE-ID\nCVE-2015-7001 : Razvan Deaconescu and Mihai Bucicoiu of University\nPOLITEHNICA of Bucharest; Luke Deshotels and William Enck of North\nCarolina State University; Lucas Vincenzo Davi and Ahmad-Reza Sadeghi\nof TU Darmstadt\n\nBluetooth\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue existed in the Bluetooth HCI\ninterface. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-7108 : Ian Beer of Google Project Zero\n\nCFNetwork HTTPProtocol\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: An attacker with a privileged network position may be able\nto bypass HSTS\nDescription: An input validation issue existed within URL\nprocessing. This issue was addressed through improved URL validation. \nCVE-ID\nCVE-2015-7094 : Tsubasa Iinuma (@llamakko_cafe) of Gehirn Inc. and\nMuneaki Nishimura (nishimunea)\n\nCompression\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: An uninitialized memory access issue existed in zlib. \nThis issue was addressed through improved memory initialization and\nadditional validation of zlib streams. \nCVE-ID\nCVE-2015-7054 : j00ru\n\nConfiguration Profiles\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local attacker may be able to install a configuration\nprofile without admin privileges\nDescription: An issue existed when installing configuration\nprofiles. This issue was addressed through improved authorization\nchecks. \nCVE-ID\nCVE-2015-7062 : David Mulder of Dell Software\n\nCoreGraphics\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nOS X El Capitan v10.11 and v10.11.1\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-7105 : John Villamil (@day6reak), Yahoo Pentest Team\n\nCoreMedia Playback\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nOS X El Capitan v10.11 and v10.11.1\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: Multiple memory corruption issues existed in the\nprocessing of malformed media files. These issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2015-7074 : Apple\nCVE-2015-7075\n\nDisk Images\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the parsing of\ndisk images. This issue was addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-7110 : Ian Beer of Google Project Zero\n\nEFI\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A path validation issue existed in the kernel loader. \nThis was addressed through improved environment sanitization. \nCVE-ID\nCVE-2015-7063 : Apple\n\nFile Bookmark\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A path validation issue existed in app scoped\nbookmarks. This was addressed through improved environment\nsanitization. \nCVE-ID\nCVE-2015-7071 : Apple\n\nHypervisor\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A use after free issue existed in the handling of VM\nobjects. This issue was addressed through improved memory management. \nCVE-ID\nCVE-2015-7078 : Ian Beer of Google Project Zero\n\niBooks\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: Parsing a maliciously crafted iBooks file may lead to\ndisclosure of user information\nDescription: An XML external entity reference issue existed with\niBook parsing. This issue was addressed through improved parsing. \nCVE-ID\nCVE-2015-7081 : Behrouz Sadeghipour (@Nahamsec) and Patrik Fehrenbach\n(@ITSecurityguard)\n\nImageIO\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nOS X El Capitan v10.11 and v10.11.1\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue existed in ImageIO. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-7053 : Apple\n\nIntel Graphics Driver\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A null pointer dereference issue was addressed through\nimproved input validation. \nCVE-ID\nCVE-2015-7076 : Juwei Lin of TrendMicro, beist and ABH of BoB, and\nJeongHoon Shin@A.D.D\n\nIntel Graphics Driver\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue existed in the Intel Graphics\nDriver. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-7106 : Ian Beer of Google Project Zero, Juwei Lin of\nTrendMicro, beist and ABH of BoB, and JeongHoon Shin@A.D.D\n\nIntel Graphics Driver\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: An out of bounds memory access issue existed in the\nIntel Graphics Driver. This issue was addressed through improved\nmemory handling. \nCVE-ID\nCVE-2015-7077 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: A memory corruption issue existed in\nIOAcceleratorFamily. This issue was addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-7109 : Juwei Lin of TrendMicro\n\nIOHIDFamily\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: Multiple memory corruption issues existed in\nIOHIDFamily API. These issues were addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-7111 : beist and ABH of BoB\nCVE-2015-7112 : Ian Beer of Google Project Zero\n\nIOKit SCSI\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A malicious application may be able to execute arbitrary\ncode with kernel privileges\nDescription: A null pointer dereference existed in the handling of a\ncertain userclient type. This issue was addressed through improved\nvalidation. \nCVE-ID\nCVE-2015-7068 : Ian Beer of Google Project Zero\n\nIOThunderboltFamily\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to cause a system denial of service\nDescription: A null pointer dereference existed in\nIOThunderboltFamily\u0027s handling of certain userclient types. This\nissue was addressed through improved validation of\nIOThunderboltFamily contexts. \nCVE-ID\nCVE-2015-7067 : Juwei Lin of TrendMicro\n\nKernel\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local application may be able to cause a denial of service\nDescription: Multiple denial of service issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2015-7040 : Lufeng Li of Qihoo 360 Vulcan Team\nCVE-2015-7041 : Lufeng Li of Qihoo 360 Vulcan Team\nCVE-2015-7042 : Lufeng Li of Qihoo 360 Vulcan Team\nCVE-2015-7043 : Tarjei Mandt (@kernelpool)\n\nKernel\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues existed in the\nkernel. These issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-7083 : Ian Beer of Google Project Zero\nCVE-2015-7084 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: An issue existed in the parsing of mach messages. This\nissue was addressed through improved validation of mach messages. \nCVE-ID\nCVE-2015-7047 : Ian Beer of Google Project Zero\n\nkext tools\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A validation issue existed during the loading of kernel\nextensions. This issue was addressed through additional verification. \nCVE-ID\nCVE-2015-7052 : Apple\n\nKeychain Access\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A malicious application may be able to masquerade as the\nKeychain Server. \nDescription: An issue existed in how Keychain Access interacted with\nKeychain Agent. This issue was resolved by removing legacy\nfunctionality. \nCVE-ID\nCVE-2015-7045 : Luyi Xing and XiaoFeng Wang of Indiana University\nBloomington, Xiaolong Bai of Indiana University Bloomington and\nTsinghua University, Tongxin Li of Peking University, Kai Chen of\nIndiana University Bloomington and Institute of Information\nEngineering, Xiaojing Liao of Georgia Institute of Technology, Shi-\nMin Hu of Tsinghua University, and Xinhui Han of Peking University\n\nlibarchive\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nOS X El Capitan v10.11 and v10.11.1\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: A memory corruption issue existed in the processing of\narchives. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2011-2895 : @practicalswift\n\nlibc\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: Processing a maliciously crafted package may lead to\narbitrary code execution\nDescription: Multiple buffer overflows existed in the C standard\nlibrary. These issues were addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2015-7038\nCVE-2015-7039 : Maksymilian Arciemowicz (CXSECURITY.COM)\n\nlibexpat\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: Multiple vulnerabilities in expat\nDescription: Multiple vulnerabilities existed in expat version prior\nto 2.1.0. \nCVE-ID\nCVE-2012-0876 : Vincent Danen\nCVE-2012-1147 : Kurt Seifried\nCVE-2012-1148 : Kurt Seifried\n\nlibxml2\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nOS X El Capitan v10.11 and v10.11.1\nImpact: Parsing a maliciously crafted XML document may lead to\ndisclosure of user information\nDescription: A memory corruption issue existed in the parsing of XML\nfiles. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-3807 : Wei Lei and Liu Yang of Nanyang Technological\nUniversity\n\nOpenGL\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nOS X El Capitan v10.11 and v10.11.1\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: Multiple memory corruption issues existed in OpenGL. \nThese issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-7064 : Apple\nCVE-2015-7065 : Apple\nCVE-2015-7066 : Tongbo Luo and Bo Qu of Palo Alto Networks\n\nOpenLDAP\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A remote unauthenticated client may be able to cause a\ndenial of service\nDescription: An input validation issue existed in OpenLDAP. This\nissue was addressed through improved input validation. \nCVE-ID\nCVE-2015-6908\n\nOpenSSH\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: Multiple vulnerabilities in LibreSSL\nDescription: Multiple vulnerabilities existed in LibreSSL versions\nprior to 2.1.8. These were addressed by updating LibreSSL to version\n2.1.8. \nCVE-ID\nCVE-2015-5333\nCVE-2015-5334\n\nQuickLook\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nOS X El Capitan v10.11 and v10.11.1\nImpact: Opening a maliciously crafted iWork file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the handling of\niWork files. This issue was addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-7107\n\nSandbox\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A malicious application with root privileges may be able to\nbypass kernel address space layout randomization\nDescription: An insufficient privilege separation issue existed in\nxnu. This issue was addressed by improved authorization checks. \nCVE-ID\nCVE-2015-7046 : Apple\n\nSecurity\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A remote attacker may cause an unexpected application\ntermination or arbitrary code execution\nDescription: A memory corruption issue existed in handling SSL\nhandshakes. This issue was addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-7073 : Benoit Foucher of ZeroC, Inc. \n\nSecurity\nAvailable for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5\nImpact: Processing a maliciously crafted certificate may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues existed in the ASN.1\ndecoder. These issues were addressed through improved input\nvalidation\nCVE-ID\nCVE-2015-7059 : David Keeler of Mozilla\nCVE-2015-7060 : Tyson Smith of Mozilla\nCVE-2015-7061 : Ryan Sleevi of Google\n\nSecurity\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nOS X El Capitan v10.11 and v10.11.1\nImpact: A malicious application may gain access to a user\u0027s Keychain\nitems\nDescription: An issue existed in the validation of access control\nlists for keychain items. This issue was addressed through improved\naccess control list checks. \nCVE-ID\nCVE-2015-7058\n\nSystem Integrity Protection\nAvailable for: OS X El Capitan v10.11 and v10.11.1\nImpact: A malicious application with root privileges may be able to\nexecute arbitrary code with system privileges\nDescription: A privilege issue existed in handling union mounts. \nThis issue was addressed by improved authorization checks. \nCVE-ID\nCVE-2015-7044 : MacDefender\n\nInstallation note:\n\nSecurity Update 2015-008 is recommended for all users and improves the\nsecurity of OS X. After installing this update, the QuickTime 7 web \nbrowser plug-in will no longer be enabled by default. Learn what to \ndo if you still need this legacy plug-in. \nhttps://support.apple.com/en-us/HT205081\n\nOS X El Capitan v10.11.2 includes the security content of\nSafari 9.0.2: https://support.apple.com/en-us/HT205639\n\nOS X El Capitan 10.11.2 and Security Update 2015-008 may be obtained\nfrom the Mac App Store or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\ngvIdn3N1k8hWpmYDjxZd\n=Yi/n\n-----END PGP SIGNATURE-----\n. Content-Disposition: inline\n\n\n============================================================================\nUbuntu Security Notice USN-1527-2\nSeptember 10, 2012\n\nxmlrpc-c vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n- Ubuntu 11.10\n- Ubuntu 11.04\n- Ubuntu 10.04 LTS\n\nSummary:\n\nXML-RPC for C and C++ could be made to cause a denial of service by consuming\nexcessive CPU and memory resources. This update provides the\ncorresponding updates for XML-RPC for C and C++. Both issues described in the\noriginal advisory affected XML-RPC for C and C++ in Ubuntu 10.04 LTS, 11.04,\n11.10 and 12.04 LTS. \n\nOriginal advisory details:\n\n It was discovered that Expat computed hash values without restricting the\n ability to trigger hash collisions predictably. This issue only affected\n Ubuntu 8.04 LTS, 10.04 LTS, 11.04 and 11.10. (CVE-2012-1148)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n libxmlrpc-core-c3 1.16.33-3.1ubuntu5.1\n\nUbuntu 11.10:\n libxmlrpc-core-c3-0 1.16.32-0ubuntu4.1\n\nUbuntu 11.04:\n libxmlrpc-core-c3-0 1.16.32-0ubuntu3.1\n\nUbuntu 10.04 LTS:\n libxmlrpc-core-c3 1.06.27-1ubuntu7.1\n\nAfter a standard system upgrade you need to restart any applications linked\nagainst XML-RPC for C and C++ to effect the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201209-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Expat: Multiple vulnerabilities\n Date: September 24, 2012\n Bugs: #280615, #303727, #407519\n ID: 201209-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Expat, possibly resulting\nin Denial of Service. Please review\nthe CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Expat users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-libs/expat-2.1.0_beta3\"\n\nPackages which depend on this library may need to be recompiled. Tools\nsuch as revdep-rebuild may assist in identifying some of these\npackages. \n\nReferences\n==========\n\n[ 1 ] CVE-2009-3560\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3560\n[ 2 ] CVE-2009-3720\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3720\n[ 3 ] CVE-2012-0876\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0876\n[ 4 ] CVE-2012-1147\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1147\n[ 5 ] CVE-2012-1148\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1148\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201209-06.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: expat security update\nAdvisory ID: RHSA-2012:0731-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2012-0731.html\nIssue date: 2012-06-13\nCVE Names: CVE-2012-0876 CVE-2012-1148 \n=====================================================================\n\n1. Summary:\n\nUpdated expat packages that fix two security issues are now available for\nRed Hat Enterprise Linux 5 and 6. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\n\n3. Description:\n\nExpat is a C library written by James Clark for parsing XML documents. \n\nA denial of service flaw was found in the implementation of hash arrays in\nExpat. An attacker could use this flaw to make an application using Expat\nconsume an excessive amount of CPU time by providing a specially-crafted\nXML file that triggers multiple hash function collisions. To mitigate\nthis issue, randomization has been added to the hash function to reduce the\nchance of an attacker successfully causing intentional collisions. \n(CVE-2012-0876)\n\nA memory leak flaw was found in Expat. If an XML file processed by an\napplication linked against Expat triggered a memory re-allocation failure,\nExpat failed to free the previously allocated memory. This could cause the\napplication to exit unexpectedly or crash when all available memory is\nexhausted. (CVE-2012-1148)\n\nAll Expat users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, applications using the Expat library must be restarted for the\nupdate to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n786617 - CVE-2012-0876 expat: hash table collisions CPU usage DoS\n801648 - CVE-2012-1148 expat: Memory leak in poolGrow\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/expat-1.95.8-11.el5_8.src.rpm\n\ni386:\nexpat-1.95.8-11.el5_8.i386.rpm\nexpat-debuginfo-1.95.8-11.el5_8.i386.rpm\n\nx86_64:\nexpat-1.95.8-11.el5_8.i386.rpm\nexpat-1.95.8-11.el5_8.x86_64.rpm\nexpat-debuginfo-1.95.8-11.el5_8.i386.rpm\nexpat-debuginfo-1.95.8-11.el5_8.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/expat-1.95.8-11.el5_8.src.rpm\n\ni386:\nexpat-debuginfo-1.95.8-11.el5_8.i386.rpm\nexpat-devel-1.95.8-11.el5_8.i386.rpm\n\nx86_64:\nexpat-debuginfo-1.95.8-11.el5_8.i386.rpm\nexpat-debuginfo-1.95.8-11.el5_8.x86_64.rpm\nexpat-devel-1.95.8-11.el5_8.i386.rpm\nexpat-devel-1.95.8-11.el5_8.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/expat-1.95.8-11.el5_8.src.rpm\n\ni386:\nexpat-1.95.8-11.el5_8.i386.rpm\nexpat-debuginfo-1.95.8-11.el5_8.i386.rpm\nexpat-devel-1.95.8-11.el5_8.i386.rpm\n\nia64:\nexpat-1.95.8-11.el5_8.i386.rpm\nexpat-1.95.8-11.el5_8.ia64.rpm\nexpat-debuginfo-1.95.8-11.el5_8.i386.rpm\nexpat-debuginfo-1.95.8-11.el5_8.ia64.rpm\nexpat-devel-1.95.8-11.el5_8.ia64.rpm\n\nppc:\nexpat-1.95.8-11.el5_8.ppc.rpm\nexpat-1.95.8-11.el5_8.ppc64.rpm\nexpat-debuginfo-1.95.8-11.el5_8.ppc.rpm\nexpat-debuginfo-1.95.8-11.el5_8.ppc64.rpm\nexpat-devel-1.95.8-11.el5_8.ppc.rpm\nexpat-devel-1.95.8-11.el5_8.ppc64.rpm\n\ns390x:\nexpat-1.95.8-11.el5_8.s390.rpm\nexpat-1.95.8-11.el5_8.s390x.rpm\nexpat-debuginfo-1.95.8-11.el5_8.s390.rpm\nexpat-debuginfo-1.95.8-11.el5_8.s390x.rpm\nexpat-devel-1.95.8-11.el5_8.s390.rpm\nexpat-devel-1.95.8-11.el5_8.s390x.rpm\n\nx86_64:\nexpat-1.95.8-11.el5_8.i386.rpm\nexpat-1.95.8-11.el5_8.x86_64.rpm\nexpat-debuginfo-1.95.8-11.el5_8.i386.rpm\nexpat-debuginfo-1.95.8-11.el5_8.x86_64.rpm\nexpat-devel-1.95.8-11.el5_8.i386.rpm\nexpat-devel-1.95.8-11.el5_8.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm\n\ni386:\nexpat-2.0.1-11.el6_2.i686.rpm\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\n\nx86_64:\nexpat-2.0.1-11.el6_2.i686.rpm\nexpat-2.0.1-11.el6_2.x86_64.rpm\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\nexpat-debuginfo-2.0.1-11.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm\n\ni386:\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\nexpat-devel-2.0.1-11.el6_2.i686.rpm\n\nx86_64:\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\nexpat-debuginfo-2.0.1-11.el6_2.x86_64.rpm\nexpat-devel-2.0.1-11.el6_2.i686.rpm\nexpat-devel-2.0.1-11.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm\n\nx86_64:\nexpat-2.0.1-11.el6_2.i686.rpm\nexpat-2.0.1-11.el6_2.x86_64.rpm\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\nexpat-debuginfo-2.0.1-11.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm\n\nx86_64:\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\nexpat-debuginfo-2.0.1-11.el6_2.x86_64.rpm\nexpat-devel-2.0.1-11.el6_2.i686.rpm\nexpat-devel-2.0.1-11.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm\n\ni386:\nexpat-2.0.1-11.el6_2.i686.rpm\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\nexpat-devel-2.0.1-11.el6_2.i686.rpm\n\nppc64:\nexpat-2.0.1-11.el6_2.ppc.rpm\nexpat-2.0.1-11.el6_2.ppc64.rpm\nexpat-debuginfo-2.0.1-11.el6_2.ppc.rpm\nexpat-debuginfo-2.0.1-11.el6_2.ppc64.rpm\nexpat-devel-2.0.1-11.el6_2.ppc.rpm\nexpat-devel-2.0.1-11.el6_2.ppc64.rpm\n\ns390x:\nexpat-2.0.1-11.el6_2.s390.rpm\nexpat-2.0.1-11.el6_2.s390x.rpm\nexpat-debuginfo-2.0.1-11.el6_2.s390.rpm\nexpat-debuginfo-2.0.1-11.el6_2.s390x.rpm\nexpat-devel-2.0.1-11.el6_2.s390.rpm\nexpat-devel-2.0.1-11.el6_2.s390x.rpm\n\nx86_64:\nexpat-2.0.1-11.el6_2.i686.rpm\nexpat-2.0.1-11.el6_2.x86_64.rpm\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\nexpat-debuginfo-2.0.1-11.el6_2.x86_64.rpm\nexpat-devel-2.0.1-11.el6_2.i686.rpm\nexpat-devel-2.0.1-11.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/expat-2.0.1-11.el6_2.src.rpm\n\ni386:\nexpat-2.0.1-11.el6_2.i686.rpm\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\nexpat-devel-2.0.1-11.el6_2.i686.rpm\n\nx86_64:\nexpat-2.0.1-11.el6_2.i686.rpm\nexpat-2.0.1-11.el6_2.x86_64.rpm\nexpat-debuginfo-2.0.1-11.el6_2.i686.rpm\nexpat-debuginfo-2.0.1-11.el6_2.x86_64.rpm\nexpat-devel-2.0.1-11.el6_2.i686.rpm\nexpat-devel-2.0.1-11.el6_2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2012-0876.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1148.html\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFP2KEPXlSAg2UNWIIRAhWPAJ0Q22boGq3FiPI7246uE8qjdEpq3gCfRNip\n1zY6/nH/4z7IxjTyIkW0Jkk=\n=x3IW\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-03-28-2 Additional information for\nAPPLE-SA-2017-03-22-1 iTunes for Windows 12.6\n\niTunes for Windows 12.6 addresses the following:\n\nAPNs Server\nAvailable for: Windows 7 and later\nImpact: An attacker in a privileged network position can track a\nuser\u0027s activity\nDescription: A client certificate was sent in plaintext", "sources": [ { "db": "NVD", "id": "CVE-2012-1148" }, { "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "db": "BID", "id": "52379" }, { "db": "VULHUB", "id": "VHN-54429" }, { "db": "PACKETSTORM", "id": "134748" }, { "db": "PACKETSTORM", "id": "116389" }, { "db": "PACKETSTORM", "id": "141808" }, { "db": "PACKETSTORM", "id": "116804" }, { "db": "PACKETSTORM", "id": "113606" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "141937" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1148", "trust": 3.5 }, { "db": "BID", "id": "52379", "trust": 2.0 }, { "db": "SECUNIA", "id": "51040", "trust": 1.7 }, { "db": "SECUNIA", "id": "49504", "trust": 1.7 }, { "db": "SECUNIA", "id": "51024", "trust": 1.7 }, { "db": "SECTRACK", "id": "1034344", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU97526033", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-002979", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201204-164", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "140182", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-54429", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134748", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116389", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141808", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116804", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113606", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141796", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141937", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54429" }, { "db": "BID", "id": "52379" }, { "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "db": "PACKETSTORM", "id": "134748" }, { "db": "PACKETSTORM", "id": "116389" }, { "db": "PACKETSTORM", "id": "141808" }, { "db": "PACKETSTORM", "id": "116804" }, { "db": "PACKETSTORM", "id": "113606" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "CNNVD", "id": "CNNVD-201204-164" }, { "db": "NVD", "id": "CVE-2012-1148" } ] }, "id": "VAR-201207-0370", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54429" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T19:59:57.543000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2015-12-08-3 OS X El Capitan 10.11.2 and Security Update 2015-008", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/dec/msg00005.html" }, { "title": "HT205637", "trust": 0.8, "url": "https://support.apple.com/en-us/ht205637" }, { "title": "HT205637", "trust": 0.8, "url": "http://support.apple.com/ja-jp/ht205637" }, { "title": "DSA-2525", "trust": 0.8, "url": "http://www.debian.org/security/2012/dsa-2525" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.libexpat.org/" }, { "title": "RHSA-2012:0731", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2012-0731.html" }, { "title": "MDVSA-2012:041", "trust": 0.8, "url": "http://www.mandriva.com/en/support/security/advisories/?name=mdvsa-2012:041" }, { "title": "Multiple Resource Management Error vulnerabilities in libexpat", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_resource_management_error_vulnerabilities" }, { "title": "memory leak in poolGrow - ID: 2958794", "trust": 0.8, "url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127" }, { "title": "expat 2.1.0", "trust": 0.8, "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/" }, { "title": "Diff of /expat/lib/xmlparse.c", "trust": 0.8, "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167" }, { "title": "USN-1527-1", "trust": 0.8, "url": "http://www.ubuntu.com/usn/usn-1527-1/" }, { "title": "USN-1613-2", "trust": 0.8, "url": "http://www.ubuntu.com/usn/usn-1613-2/" }, { "title": "VMSA-2012-0016", "trust": 0.8, "url": "http://www.vmware.com/security/advisories/vmsa-2012-0016.html" }, { "title": "expat-win32bin-2.1.0", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=43625" }, { "title": "expat-2.1.0", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=43626" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "db": "CNNVD", "id": "CNNVD-201204-164" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54429" }, { "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "db": "NVD", "id": "CVE-2012-1148" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2012-0731.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-1527-1" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2015/dec/msg00005.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/52379" }, { "trust": 1.7, "url": "https://support.apple.com/ht205637" }, { "trust": 1.7, "url": "http://www.debian.org/security/2012/dsa-2525" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:041" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2016-0062.html" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2016-2957.html" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034344" }, { "trust": 1.7, "url": "http://secunia.com/advisories/49504" }, { "trust": 1.7, "url": "http://secunia.com/advisories/51024" }, { "trust": 1.7, "url": "http://secunia.com/advisories/51040" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-1613-1" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-1613-2" }, { "trust": 1.6, "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167" }, { "trust": 1.6, "url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1148" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97526033/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1148" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1148" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1147" }, { "trust": 0.4, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.4, "url": "https://gpgtools.org" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0876" }, { "trust": 0.4, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3720" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3560" }, { "trust": 0.3, "url": "http://expat.sourceforge.net/" }, { "trust": 0.3, "url": "http://xmlrpc-c.sourceforge.net/change.html" }, { "trust": 0.3, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_resource_management_error_vulnerabilities" }, { "trust": 0.3, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_python" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100165124" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024076" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989336" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21992933" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988026" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988710" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21994401" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2012-0016.html" }, { "trust": 0.3, "url": "http://www.xerox.com/download/security/security-bulletin/12047-4e4eed8d42ca6/cert_xrx13-007_v1.0.pdf" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5300" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0718" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6153" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3415" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3270" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6607" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3416" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1283" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3717" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3414" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7443" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6702" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4472" }, { "trust": 0.3, "url": "https://www.apple.com/itunes/download/" }, { "trust": 0.1, "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026amp;r2=1.167" }, { "trust": 0.1, "url": "http://sourceforge.net/tracker/?func=detail\u0026amp;atid=110127\u0026amp;aid=2958794\u0026amp;group_id=10127" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3807" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7052" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7045" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7044" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7047" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7046" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7060" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7043" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7058" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7053" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6908" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7042" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2895" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7059" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7001" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7039" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7040" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7054" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7063" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7062" }, { "trust": 0.1, "url": "https://support.apple.com/en-us/ht205081" }, { "trust": 0.1, "url": "https://support.apple.com/en-us/ht205639" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7061" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7041" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7038" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1527-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/xmlrpc-c/1.16.33-3.1ubuntu5.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/xmlrpc-c/1.16.32-0ubuntu3.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/xmlrpc-c/1.16.32-0ubuntu4.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/xmlrpc-c/1.06.27-1ubuntu7.1" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3560" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0876" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1147" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1148" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3720" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201209-06.xml" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0876.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-1148.html" }, { "trust": 0.1, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/knowledge/articles/11258" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2480" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5029" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2479" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2383" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2463" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54429" }, { "db": "BID", "id": "52379" }, { "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "db": "PACKETSTORM", "id": "134748" }, { "db": "PACKETSTORM", "id": "116389" }, { "db": "PACKETSTORM", "id": "141808" }, { "db": "PACKETSTORM", "id": "116804" }, { "db": "PACKETSTORM", "id": "113606" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "CNNVD", "id": "CNNVD-201204-164" }, { "db": "NVD", "id": "CVE-2012-1148" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54429" }, { "db": "BID", "id": "52379" }, { "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "db": "PACKETSTORM", "id": "134748" }, { "db": "PACKETSTORM", "id": "116389" }, { "db": "PACKETSTORM", "id": "141808" }, { "db": "PACKETSTORM", "id": "116804" }, { "db": "PACKETSTORM", "id": "113606" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "CNNVD", "id": "CNNVD-201204-164" }, { "db": "NVD", "id": "CVE-2012-1148" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-03T00:00:00", "db": "VULHUB", "id": "VHN-54429" }, { "date": "2012-03-09T00:00:00", "db": "BID", "id": "52379" }, { "date": "2012-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "date": "2015-12-10T17:16:36", "db": "PACKETSTORM", "id": "134748" }, { "date": "2012-09-11T02:37:29", "db": "PACKETSTORM", "id": "116389" }, { "date": "2017-03-24T14:54:06", "db": "PACKETSTORM", "id": "141808" }, { "date": "2012-09-24T15:03:31", "db": "PACKETSTORM", "id": "116804" }, { "date": "2012-06-13T22:55:47", "db": "PACKETSTORM", "id": "113606" }, { "date": "2017-03-23T16:22:29", "db": "PACKETSTORM", "id": "141796" }, { "date": "2017-03-28T23:44:44", "db": "PACKETSTORM", "id": "141937" }, { "date": "2012-03-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-164" }, { "date": "2012-07-03T19:55:02.757000", "db": "NVD", "id": "CVE-2012-1148" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-05T00:00:00", "db": "VULHUB", "id": "VHN-54429" }, { "date": "2017-03-29T03:01:00", "db": "BID", "id": "52379" }, { "date": "2015-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002979" }, { "date": "2021-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-164" }, { "date": "2021-01-25T15:44:35.543000", "db": "NVD", "id": "CVE-2012-1148" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201204-164" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Expat of expat/lib/xmlparse.c Service disruption in ( Memory consumption ) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002979" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201204-164" } ], "trust": 0.6 } }
gsd-2012-1148
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2012-1148", "description": "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.", "id": "GSD-2012-1148", "references": [ "https://www.suse.com/security/cve/CVE-2012-1148.html", "https://www.debian.org/security/2012/dsa-2525", "https://access.redhat.com/errata/RHSA-2016:2957", "https://access.redhat.com/errata/RHSA-2012:0731", "https://alas.aws.amazon.com/cve/html/CVE-2012-1148.html", "https://linux.oracle.com/cve/CVE-2012-1148.html", "https://ubuntu.com/security/CVE-2012-1148" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-1148" ], "details": "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.", "id": "GSD-2012-1148", "modified": "2023-12-13T01:20:18.455385Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-1148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49504" }, { "name": "USN-1527-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1527-1" }, { "name": "https://support.apple.com/HT205637", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205637" }, { "name": "1034344", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034344" }, { "name": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167", "refsource": "CONFIRM", "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167" }, { "name": "51040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51040" }, { "name": "RHSA-2012:0731", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html" }, { "name": "52379", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52379" }, { "name": "http://sourceforge.net/projects/expat/files/expat/2.1.0/", "refsource": "CONFIRM", "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/" }, { "name": "RHSA-2016:0062", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html" }, { "name": "APPLE-SA-2015-12-08-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "name": "DSA-2525", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2525" }, { "name": "MDVSA-2012:041", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041" }, { "name": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127", "refsource": "CONFIRM", "url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "USN-1613-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1613-2" }, { "name": "51024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51024" }, { "name": "USN-1613-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1613-1" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:1.95.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.11.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-1148" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/projects/expat/files/expat/2.1.0/", "refsource": "CONFIRM", "tags": [], "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/" }, { "name": "49504", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49504" }, { "name": "MDVSA-2012:041", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041" }, { "name": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167" }, { "name": "RHSA-2012:0731", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html" }, { "name": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127", "refsource": "CONFIRM", "tags": [], "url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127" }, { "name": "USN-1613-2", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1613-2" }, { "name": "DSA-2525", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2012/dsa-2525" }, { "name": "USN-1527-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1527-1" }, { "name": "USN-1613-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1613-1" }, { "name": "51040", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/51040" }, { "name": "51024", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/51024" }, { "name": "52379", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/52379" }, { "name": "APPLE-SA-2015-12-08-3", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "name": "https://support.apple.com/HT205637", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/HT205637" }, { "name": "RHSA-2016:0062", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html" }, { "name": "1034344", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1034344" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2021-01-25T15:44Z", "publishedDate": "2012-07-03T19:55Z" } } }
rhsa-2012_0731
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated expat packages that fix two security issues are now available for\nRed Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Expat is a C library written by James Clark for parsing XML documents.\n\nA denial of service flaw was found in the implementation of hash arrays in\nExpat. An attacker could use this flaw to make an application using Expat\nconsume an excessive amount of CPU time by providing a specially-crafted\nXML file that triggers multiple hash function collisions. To mitigate\nthis issue, randomization has been added to the hash function to reduce the\nchance of an attacker successfully causing intentional collisions.\n(CVE-2012-0876)\n\nA memory leak flaw was found in Expat. If an XML file processed by an\napplication linked against Expat triggered a memory re-allocation failure,\nExpat failed to free the previously allocated memory. This could cause the\napplication to exit unexpectedly or crash when all available memory is\nexhausted. (CVE-2012-1148)\n\nAll Expat users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, applications using the Expat library must be restarted for the\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0731", "url": "https://access.redhat.com/errata/RHSA-2012:0731" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "786617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617" }, { "category": "external", "summary": "801648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0731.json" } ], "title": "Red Hat Security Advisory: expat security update", "tracking": { "current_release_date": "2024-11-22T05:16:35+00:00", "generator": { "date": "2024-11-22T05:16:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0731", "initial_release_date": "2012-06-13T13:56:00+00:00", "revision_history": [ { "date": "2012-06-13T13:56:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-06-13T14:00:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:16:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "RHEL Desktop Workstation (v. 5 client)", "product": { "name": "RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-11.el6_2.i686", "product": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.i686", "product_id": "expat-debuginfo-0:2.0.1-11.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=i686" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-11.el6_2.i686", "product": { "name": "expat-devel-0:2.0.1-11.el6_2.i686", "product_id": "expat-devel-0:2.0.1-11.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=i686" } } }, { "category": "product_version", "name": "expat-0:2.0.1-11.el6_2.i686", "product": { "name": "expat-0:2.0.1-11.el6_2.i686", "product_id": "expat-0:2.0.1-11.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "product": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "product_id": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-11.el6_2.x86_64", "product": { "name": "expat-devel-0:2.0.1-11.el6_2.x86_64", "product_id": "expat-devel-0:2.0.1-11.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "expat-0:2.0.1-11.el6_2.x86_64", "product": { "name": "expat-0:2.0.1-11.el6_2.x86_64", "product_id": "expat-0:2.0.1-11.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "expat-0:1.95.8-11.el5_8.x86_64", "product": { "name": "expat-0:1.95.8-11.el5_8.x86_64", "product_id": "expat-0:1.95.8-11.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "product": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "product_id": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-devel-0:1.95.8-11.el5_8.x86_64", "product": { "name": "expat-devel-0:1.95.8-11.el5_8.x86_64", "product_id": "expat-devel-0:1.95.8-11.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.0.1-11.el6_2.src", "product": { "name": "expat-0:2.0.1-11.el6_2.src", "product_id": "expat-0:2.0.1-11.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=src" } } }, { "category": "product_version", "name": "expat-0:1.95.8-11.el5_8.src", "product": { "name": "expat-0:1.95.8-11.el5_8.src", "product_id": "expat-0:1.95.8-11.el5_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x", "product": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x", "product_id": "expat-debuginfo-0:2.0.1-11.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=s390x" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-11.el6_2.s390x", "product": { "name": "expat-devel-0:2.0.1-11.el6_2.s390x", "product_id": "expat-devel-0:2.0.1-11.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=s390x" } } }, { "category": "product_version", "name": "expat-0:2.0.1-11.el6_2.s390x", "product": { "name": "expat-0:2.0.1-11.el6_2.s390x", "product_id": "expat-0:2.0.1-11.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=s390x" } } }, { "category": "product_version", "name": "expat-0:1.95.8-11.el5_8.s390x", "product": { "name": "expat-0:1.95.8-11.el5_8.s390x", "product_id": "expat-0:1.95.8-11.el5_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=s390x" } } }, { "category": "product_version", "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x", "product": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x", "product_id": "expat-debuginfo-0:1.95.8-11.el5_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=s390x" } } }, { "category": "product_version", "name": "expat-devel-0:1.95.8-11.el5_8.s390x", "product": { "name": "expat-devel-0:1.95.8-11.el5_8.s390x", "product_id": "expat-devel-0:1.95.8-11.el5_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390", "product": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390", "product_id": "expat-debuginfo-0:2.0.1-11.el6_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=s390" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-11.el6_2.s390", "product": { "name": "expat-devel-0:2.0.1-11.el6_2.s390", "product_id": "expat-devel-0:2.0.1-11.el6_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=s390" } } }, { "category": "product_version", "name": "expat-0:2.0.1-11.el6_2.s390", "product": { "name": "expat-0:2.0.1-11.el6_2.s390", "product_id": "expat-0:2.0.1-11.el6_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=s390" } } }, { "category": "product_version", "name": "expat-0:1.95.8-11.el5_8.s390", "product": { "name": "expat-0:1.95.8-11.el5_8.s390", "product_id": "expat-0:1.95.8-11.el5_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=s390" } } }, { "category": "product_version", "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390", "product": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390", "product_id": "expat-debuginfo-0:1.95.8-11.el5_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=s390" } } }, { "category": "product_version", "name": "expat-devel-0:1.95.8-11.el5_8.s390", "product": { "name": "expat-devel-0:1.95.8-11.el5_8.s390", "product_id": "expat-devel-0:1.95.8-11.el5_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "product": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "product_id": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=ppc64" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-11.el6_2.ppc64", "product": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc64", "product_id": "expat-devel-0:2.0.1-11.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=ppc64" } } }, { "category": "product_version", "name": "expat-0:2.0.1-11.el6_2.ppc64", "product": { "name": "expat-0:2.0.1-11.el6_2.ppc64", "product_id": "expat-0:2.0.1-11.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=ppc64" } } }, { "category": "product_version", "name": "expat-0:1.95.8-11.el5_8.ppc64", "product": { "name": "expat-0:1.95.8-11.el5_8.ppc64", "product_id": "expat-0:1.95.8-11.el5_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=ppc64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "product": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "product_id": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=ppc64" } } }, { "category": "product_version", "name": "expat-devel-0:1.95.8-11.el5_8.ppc64", "product": { "name": "expat-devel-0:1.95.8-11.el5_8.ppc64", "product_id": "expat-devel-0:1.95.8-11.el5_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc", "product": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc", "product_id": "expat-debuginfo-0:2.0.1-11.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-11.el6_2?arch=ppc" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-11.el6_2.ppc", "product": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc", "product_id": "expat-devel-0:2.0.1-11.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-11.el6_2?arch=ppc" } } }, { "category": "product_version", "name": "expat-0:2.0.1-11.el6_2.ppc", "product": { "name": "expat-0:2.0.1-11.el6_2.ppc", "product_id": "expat-0:2.0.1-11.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-11.el6_2?arch=ppc" } } }, { "category": "product_version", "name": "expat-0:1.95.8-11.el5_8.ppc", "product": { "name": "expat-0:1.95.8-11.el5_8.ppc", "product_id": "expat-0:1.95.8-11.el5_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=ppc" } } }, { "category": "product_version", "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc", "product": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc", "product_id": "expat-debuginfo-0:1.95.8-11.el5_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=ppc" } } }, { "category": "product_version", "name": "expat-devel-0:1.95.8-11.el5_8.ppc", "product": { "name": "expat-devel-0:1.95.8-11.el5_8.ppc", "product_id": "expat-devel-0:1.95.8-11.el5_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "expat-0:1.95.8-11.el5_8.ia64", "product": { "name": "expat-0:1.95.8-11.el5_8.ia64", "product_id": "expat-0:1.95.8-11.el5_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=ia64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64", "product": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64", "product_id": "expat-debuginfo-0:1.95.8-11.el5_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=ia64" } } }, { "category": "product_version", "name": "expat-devel-0:1.95.8-11.el5_8.ia64", "product": { "name": "expat-devel-0:1.95.8-11.el5_8.ia64", "product_id": "expat-devel-0:1.95.8-11.el5_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "expat-0:1.95.8-11.el5_8.i386", "product": { "name": "expat-0:1.95.8-11.el5_8.i386", "product_id": "expat-0:1.95.8-11.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@1.95.8-11.el5_8?arch=i386" } } }, { "category": "product_version", "name": "expat-debuginfo-0:1.95.8-11.el5_8.i386", "product": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.i386", "product_id": "expat-debuginfo-0:1.95.8-11.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@1.95.8-11.el5_8?arch=i386" } } }, { "category": "product_version", "name": "expat-devel-0:1.95.8-11.el5_8.i386", "product": { "name": "expat-devel-0:1.95.8-11.el5_8.i386", "product_id": "expat-devel-0:1.95.8-11.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@1.95.8-11.el5_8?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386" }, "product_reference": "expat-0:1.95.8-11.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64" }, "product_reference": "expat-0:1.95.8-11.el5_8.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc" }, "product_reference": "expat-0:1.95.8-11.el5_8.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64" }, "product_reference": "expat-0:1.95.8-11.el5_8.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390" }, "product_reference": "expat-0:1.95.8-11.el5_8.s390", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x" }, "product_reference": "expat-0:1.95.8-11.el5_8.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src" }, "product_reference": "expat-0:1.95.8-11.el5_8.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64" }, "product_reference": "expat-0:1.95.8-11.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.s390", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386" }, "product_reference": "expat-0:1.95.8-11.el5_8.i386", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64" }, "product_reference": "expat-0:1.95.8-11.el5_8.ia64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc" }, "product_reference": "expat-0:1.95.8-11.el5_8.ppc", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64" }, "product_reference": "expat-0:1.95.8-11.el5_8.ppc64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390" }, "product_reference": "expat-0:1.95.8-11.el5_8.s390", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x" }, "product_reference": "expat-0:1.95.8-11.el5_8.s390x", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.src as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src" }, "product_reference": "expat-0:1.95.8-11.el5_8.src", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64" }, "product_reference": "expat-0:1.95.8-11.el5_8.x86_64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.i386", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ia64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390x", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.i386", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.ia64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.s390", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.s390x", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.x86_64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386" }, "product_reference": "expat-0:1.95.8-11.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64" }, "product_reference": "expat-0:1.95.8-11.el5_8.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc" }, "product_reference": "expat-0:1.95.8-11.el5_8.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64" }, "product_reference": "expat-0:1.95.8-11.el5_8.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390" }, "product_reference": "expat-0:1.95.8-11.el5_8.s390", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x" }, "product_reference": "expat-0:1.95.8-11.el5_8.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src" }, "product_reference": "expat-0:1.95.8-11.el5_8.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64" }, "product_reference": "expat-0:1.95.8-11.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64" }, "product_reference": "expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.s390", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:1.95.8-11.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64" }, "product_reference": "expat-devel-0:1.95.8-11.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.src" }, "product_reference": "expat-0:2.0.1-11.el6_2.src", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src" }, "product_reference": "expat-0:2.0.1-11.el6_2.src", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src" }, "product_reference": "expat-0:2.0.1-11.el6_2.src", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src" }, "product_reference": "expat-0:2.0.1-11.el6_2.src", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.src" }, "product_reference": "expat-0:2.0.1-11.el6_2.src", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src" }, "product_reference": "expat-0:2.0.1-11.el6_2.src", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-11.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" }, "product_reference": "expat-devel-0:2.0.1-11.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-0876", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2012-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "786617" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: hash table collisions CPU usage DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0876" }, { "category": "external", "summary": "RHBZ#786617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0876", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876" } ], "release_date": "2012-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:56:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0731" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: hash table collisions CPU usage DoS" }, { "cve": "CVE-2012-1148", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2012-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "801648" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in Expat. If an XML file processed by an application linked against Expat triggered a memory re-allocation failure, Expat failed to free the previously allocated memory. This could cause the application to exit unexpectedly or crash when all available memory is exhausted.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Memory leak in poolGrow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1148" }, { "category": "external", "summary": "RHBZ#801648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1148", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148" } ], "release_date": "2012-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:56:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0731" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Client-Workstation-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Client-Workstation-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.src", "5Server-5.8.Z:expat-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-debuginfo-0:1.95.8-11.el5_8.x86_64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.i386", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ia64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.ppc64", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.s390x", "5Server-5.8.Z:expat-devel-0:1.95.8-11.el5_8.x86_64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Client-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Client-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.src", "6ComputeNode-optional-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6ComputeNode-optional-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Server-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Server-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.src", "6Workstation-6.2.z:expat-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-debuginfo-0:2.0.1-11.el6_2.x86_64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.i686", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.ppc64", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.s390x", "6Workstation-6.2.z:expat-devel-0:2.0.1-11.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Memory leak in poolGrow" } ] }
rhsa-2016_2957
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services httpd 2.4.23 is now available from the Red Hat Customer Portal for Solaris and Microsoft Windows systems.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat JBoss Core Services httpd 2.4.23 serves as a replacement for JBoss Core Services Apache HTTP Server 2.4.6.\n\nSecurity Fix(es):\n\n* This update fixes several flaws in OpenSSL. (CVE-2014-8176, CVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2177, CVE-2016-2178, CVE-2016-2842)\n\n* This update fixes several flaws in libxml2. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)\n\n* This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420, CVE-2016-7141)\n\n* This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)\n\n* This update fixes two flaws in mod_cluster. (CVE-2016-4459, CVE-2016-8612)\n\n* A buffer overflow flaw when concatenating virtual host names and URIs was fixed in mod_jk. (CVE-2016-6808)\n\n* A memory leak flaw was fixed in expat. (CVE-2012-1148)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-0286, CVE-2016-2108, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Stephen Henson (OpenSSL development team) as the original reporter of CVE-2015-0286; Huzaifa Sidhpurwala (Red Hat), Hanno B\u00f6ck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2105, CVE-2016-2106, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842; Juraj Somorovsky as the original reporter of CVE-2016-2107; Yuval Yarom (University of Adelaide and NICTA), Daniel Genkin (Technion and Tel Aviv University), and Nadia Heninger (University of Pennsylvania) as the original reporters of CVE-2016-0702; and Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705.\n\nSee the corresponding CVE pages linked to in the References section for more information about each of the flaws listed in this advisory.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2957", "url": "https://access.redhat.com/errata/RHSA-2016:2957" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=distributions\u0026version=2.4.23", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=distributions\u0026version=2.4.23" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/" }, { "category": "external", "summary": "801648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648" }, { "category": "external", "summary": "1121519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121519" }, { "category": "external", "summary": "1196737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196737" }, { "category": "external", "summary": "1202366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202366" }, { "category": "external", "summary": "1227574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227574" }, { "category": "external", "summary": "1228611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228611" }, { "category": "external", "summary": "1243888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888" }, { "category": "external", "summary": "1288320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "category": "external", "summary": "1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "1288326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288326" }, { "category": "external", "summary": "1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "1310599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310599" }, { "category": "external", "summary": "1311880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311880" }, { "category": "external", "summary": "1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "1319829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319829" }, { "category": "external", "summary": "1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "1332443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332443" }, { "category": "external", "summary": "1332820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332820" }, { "category": "external", "summary": "1338682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338682" }, { "category": "external", "summary": "1338686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686" }, { "category": "external", "summary": "1338691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338691" }, { "category": "external", "summary": "1338696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338696" }, { "category": "external", "summary": "1338700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700" }, { "category": "external", "summary": "1338701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338701" }, { "category": "external", "summary": "1338702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338702" }, { "category": "external", "summary": "1338703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338703" }, { "category": "external", "summary": "1338705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338705" }, { "category": "external", "summary": "1338706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338706" }, { "category": "external", "summary": "1338708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338708" }, { "category": "external", "summary": "1338711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338711" }, { "category": "external", "summary": "1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "1362183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183" }, { "category": "external", "summary": "1362190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190" }, { "category": "external", "summary": "1373229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "category": "external", "summary": "1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2957.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release", "tracking": { "current_release_date": "2024-11-22T10:35:35+00:00", "generator": { "date": "2024-11-22T10:35:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2957", "initial_release_date": "2016-12-15T22:11:19+00:00", "revision_history": [ { "date": "2016-12-15T22:11:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-12-15T22:11:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:35:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-0876", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2012-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "786617" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: hash table collisions CPU usage DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0876" }, { "category": "external", "summary": "RHBZ#786617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0876", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876" } ], "release_date": "2012-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: hash table collisions CPU usage DoS" }, { "cve": "CVE-2012-1148", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2012-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "801648" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in Expat. If an XML file processed by an application linked against Expat triggered a memory re-allocation failure, Expat failed to free the previously allocated memory. This could cause the application to exit unexpectedly or crash when all available memory is exhausted.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Memory leak in poolGrow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1148" }, { "category": "external", "summary": "RHBZ#801648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1148", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148" } ], "release_date": "2012-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Memory leak in poolGrow" }, { "cve": "CVE-2014-3523", "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1121519" } ], "notes": [ { "category": "description", "text": "Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: WinNT MPM denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Not affected. This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6 and 7, Red Hat JBoss Web Server 1 and 2, and Red Hat JBoss Enterprise Application Platform 5 and 6. This flaw only affects httpd running on Microsoft Windows. Red Hat JBoss Web Server 1 and 2, and Red Hat JBoss Enterprise Application Platform 5 and 6 can be run on Microsoft Windows. However, these products provide httpd 2.2, which is not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3523" }, { "category": "external", "summary": "RHBZ#1121519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121519" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3523", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3523" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3523", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3523" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: WinNT MPM denial of service" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2014-8176", "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228611" } ], "notes": [ { "category": "description", "text": "An invalid-free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could send a specially crafted message to the peer, which could cause the application to crash or potentially result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Invalid free in DTLS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does NOT affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8176" }, { "category": "external", "summary": "RHBZ#1228611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: Invalid free in DTLS" }, { "cve": "CVE-2015-0209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2015-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1196737" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way OpenSSL imported malformed Elliptic Curve private keys. A specially crafted key file could cause an application using OpenSSL to crash when imported.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: use-after-free on invalid EC private key import", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0209" }, { "category": "external", "summary": "RHBZ#1196737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196737" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209" }, { "category": "external", "summary": "https://access.redhat.com/articles/1384453", "url": "https://access.redhat.com/articles/1384453" }, { "category": "external", "summary": "https://openssl.org/news/secadv_20150319.txt", "url": "https://openssl.org/news/secadv_20150319.txt" } ], "release_date": "2015-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: use-after-free on invalid EC private key import" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Stephen Henson" ], "organization": "OpenSSL development team", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2015-0286", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1202366" } ], "notes": [ { "category": "description", "text": "An invalid pointer use flaw was found in OpenSSL\u0027s ASN1_TYPE_cmp() function. A remote attacker could crash a TLS/SSL client or server using OpenSSL via a specially crafted X.509 certificate when the attacker-supplied certificate was verified by the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: invalid pointer use in ASN1_TYPE_cmp()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0286" }, { "category": "external", "summary": "RHBZ#1202366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286" }, { "category": "external", "summary": "https://access.redhat.com/articles/1384453", "url": "https://access.redhat.com/articles/1384453" }, { "category": "external", "summary": "https://openssl.org/news/secadv_20150319.txt", "url": "https://openssl.org/news/secadv_20150319.txt" } ], "release_date": "2015-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: invalid pointer use in ASN1_TYPE_cmp()" }, { "cve": "CVE-2015-3185", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2015-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243888" } ], "notes": [ { "category": "description", "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3185" }, { "category": "external", "summary": "RHBZ#1243888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16", "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16" } ], "release_date": "2015-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4" }, { "cve": "CVE-2015-3194", "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288320" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacker could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Certificate verify crash with missing PSS parameter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3194" }, { "category": "external", "summary": "RHBZ#1288320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3194", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2016-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Certificate verify crash with missing PSS parameter" }, { "cve": "CVE-2015-3195", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2015-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288322" } ], "notes": [ { "category": "description", "text": "A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: X509_ATTRIBUTE memory leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3195" }, { "category": "external", "summary": "RHBZ#1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3195", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2015-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: X509_ATTRIBUTE memory leak" }, { "cve": "CVE-2015-3196", "discovery_date": "2015-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288326" } ], "notes": [ { "category": "description", "text": "A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Race condition handling PSK identify hint", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3196" }, { "category": "external", "summary": "RHBZ#1288326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3196", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2015-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Race condition handling PSK identify hint" }, { "cve": "CVE-2015-3216", "discovery_date": "2015-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1227574" } ], "notes": [ { "category": "description", "text": "A regression was found in the ssleay_rand_bytes() function in the versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7. This regression could cause a multi-threaded application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Crash in ssleay_rand_bytes due to locking regression", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3216" }, { "category": "external", "summary": "RHBZ#1227574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227574" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3216", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3216" } ], "release_date": "2015-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Crash in ssleay_rand_bytes due to locking regression" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Daniel Genkin" ], "organization": "Technion and Tel Aviv University", "summary": "Acknowledged by upstream." }, { "names": [ "Nadia Heninger" ], "organization": "University of Pennsylvania", "summary": "Acknowledged by upstream." }, { "names": [ "Yuval Yarom" ], "organization": "University of Adelaide and NICTA", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0702", "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310599" } ], "notes": [ { "category": "description", "text": "A side-channel attack was found that makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture. An attacker who has the ability to control code in a thread running on the same hyper-threaded core as the victim\u0027s thread that is performing decryption, could use this flaw to recover RSA private keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Side channel attack on modular exponentiation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0702" }, { "category": "external", "summary": "RHBZ#1310599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310599" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0702", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702" }, { "category": "external", "summary": "http://cachebleed.info/", "url": "http://cachebleed.info/" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160301.txt", "url": "https://www.openssl.org/news/secadv/20160301.txt" } ], "release_date": "2016-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Side channel attack on modular exponentiation" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Adam Langley" ], "organization": "Google/BoringSSL", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0705", "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310596" } ], "notes": [ { "category": "description", "text": "A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Double-free in DSA code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0705" }, { "category": "external", "summary": "RHBZ#1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0705", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" } ], "release_date": "2016-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Double-free in DSA code" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0797", "discovery_date": "2016-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1311880" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a NULL pointer dereference or a heap-based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0797" }, { "category": "external", "summary": "RHBZ#1311880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0797", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160301.txt", "url": "https://www.openssl.org/news/secadv/20160301.txt" } ], "release_date": "2016-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0799", "discovery_date": "2016-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1312219" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Fix memory issues in BIO_*printf functions", "title": "Vulnerability summary" }, { "category": "other", "text": "The original issue fixed by OpenSSL upstream contains two distinct fixes. The first one is a format string flaw in the internal fmtstr functions, which may result in a OOB read flaw when printing very large string. This issue was assigned CVE-2016-0799\n\nThe second issue relates to the internal doapr_outch function of OpenSSL. It can result in an OOB write, or cause memory leaks. This issue has been assigned CVE-2016-2842 by MITRE as is now tracked as https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2842", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0799" }, { "category": "external", "summary": "RHBZ#1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0799", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" } ], "release_date": "2016-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Fix memory issues in BIO_*printf functions" }, { "cve": "CVE-2016-1762", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338711" } ], "notes": [ { "category": "description", "text": "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer-overread in xmlNextChar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1762" }, { "category": "external", "summary": "RHBZ#1338711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1762", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1762" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer-overread in xmlNextChar" }, { "cve": "CVE-2016-1833", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338682" } ], "notes": [ { "category": "description", "text": "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overread in htmlCurrentChar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1833" }, { "category": "external", "summary": "RHBZ#1338682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1833", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1833" } ], "release_date": "2015-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overread in htmlCurrentChar" }, { "cve": "CVE-2016-1834", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338708" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-buffer-overflow in xmlStrncat", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1834" }, { "category": "external", "summary": "RHBZ#1338708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1834", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1834" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Heap-buffer-overflow in xmlStrncat" }, { "cve": "CVE-2016-1835", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338691" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap use-after-free in xmlSAX2AttributeNs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1835" }, { "category": "external", "summary": "RHBZ#1338691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1835", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1835" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap use-after-free in xmlSAX2AttributeNs" }, { "cve": "CVE-2016-1836", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338702" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap use-after-free in xmlDictComputeFastKey", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1836" }, { "category": "external", "summary": "RHBZ#1338702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1836", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1836" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap use-after-free in xmlDictComputeFastKey" }, { "cve": "CVE-2016-1837", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338696" } ], "notes": [ { "category": "description", "text": "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1837" }, { "category": "external", "summary": "RHBZ#1338696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1837", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1837" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral" }, { "cve": "CVE-2016-1838", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338705" } ], "notes": [ { "category": "description", "text": "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1838" }, { "category": "external", "summary": "RHBZ#1338705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1838", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1838" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal" }, { "cve": "CVE-2016-1839", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338703" } ], "notes": [ { "category": "description", "text": "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overread in xmlDictAddString", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1839" }, { "category": "external", "summary": "RHBZ#1338703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338703" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1839", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1839" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1839", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1839" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overread in xmlDictAddString" }, { "cve": "CVE-2016-1840", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338706" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1840" }, { "category": "external", "summary": "RHBZ#1338706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1840", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1840" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2105", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331441" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncodeUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2105" }, { "category": "external", "summary": "RHBZ#1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2105", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncodeUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2106", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331536" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncryptUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2106" }, { "category": "external", "summary": "RHBZ#1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2106", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncryptUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Juraj Somorovsky" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2107", "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331426" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Padding oracle in AES-NI CBC MAC check", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2107" }, { "category": "external", "summary": "RHBZ#1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2107", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Padding oracle in AES-NI CBC MAC check" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1330101" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ASN.1 BIO handling of large amounts of data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2109" }, { "category": "external", "summary": "RHBZ#1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2109", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: ASN.1 BIO handling of large amounts of data" }, { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341705" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Possible integer overflow vulnerabilities in codebase", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2177" }, { "category": "external", "summary": "RHBZ#1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2177", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Possible integer overflow vulnerabilities in codebase" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2016-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343400" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Non-constant time codepath followed for certain operations in DSA implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "RHBZ#1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2178", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "http://eprint.iacr.org/2016/594", "url": "http://eprint.iacr.org/2016/594" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Non-constant time codepath followed for certain operations in DSA implementation" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2842", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314757" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: doapr_outch function does not verify that certain memory allocation succeeds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2842" }, { "category": "external", "summary": "RHBZ#1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2842", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2842" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842" } ], "release_date": "2016-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: doapr_outch function does not verify that certain memory allocation succeeds" }, { "cve": "CVE-2016-3627", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1319829" } ], "notes": [ { "category": "description", "text": "Missing recursive loop detection checks were found in the xmlParserEntityCheck() and xmlStringGetNodeList() functions of libxml2, causing application using the library to crash by stack exhaustion while building the associated data. An attacker able to send XML data to be parsed in recovery mode could launch a Denial of Service on the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack exhaustion while parsing xml files in recovery mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3627" }, { "category": "external", "summary": "RHBZ#1319829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3627", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3627" } ], "release_date": "2016-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack exhaustion while parsing xml files in recovery mode" }, { "cve": "CVE-2016-3705", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1332443" } ], "notes": [ { "category": "description", "text": "Missing incrementation of recursion depth counter were found in the xmlParserEntityCheck() and xmlParseAttValueComplex() functions used for parsing XML data. An attacker could launch a Denial of Service attack by passing specially crafted XML data to an application, forcing it to crash due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack overflow before detecting invalid XML file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3705" }, { "category": "external", "summary": "RHBZ#1332443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332443" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3705", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3705" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack overflow before detecting invalid XML file" }, { "cve": "CVE-2016-4447", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338686" } ], "notes": [ { "category": "description", "text": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer underreads due to xmlParseName", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4447" }, { "category": "external", "summary": "RHBZ#1338686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4447", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4447" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer underreads due to xmlParseName" }, { "cve": "CVE-2016-4448", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338700" } ], "notes": [ { "category": "description", "text": "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Format string vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4448" }, { "category": "external", "summary": "RHBZ#1338700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4448", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4448" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Format string vulnerability" }, { "cve": "CVE-2016-4449", "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338701" } ], "notes": [ { "category": "description", "text": "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Inappropriate fetch of entities content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4449" }, { "category": "external", "summary": "RHBZ#1338701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338701" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4449", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4449" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Inappropriate fetch of entities content" }, { "acknowledgments": [ { "names": [ "Robert Bost" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-4459", "discovery_date": "2016-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341583" } ], "notes": [ { "category": "description", "text": "It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4459" }, { "category": "external", "summary": "RHBZ#1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4459", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459" } ], "release_date": "2016-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 3.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute" }, { "cve": "CVE-2016-4483", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1332820" } ], "notes": [ { "category": "description", "text": "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: out-of-bounds read", "title": "Vulnerability summary" }, { "category": "other", "text": "When a specially-crafted XML file is parsed via an application compiled against libxml2, this can cause the application to crash. (No code execution)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4483" }, { "category": "external", "summary": "RHBZ#1332820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332820" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4483", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4483" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: out-of-bounds read" }, { "cve": "CVE-2016-5419", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2016-07-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1362183" } ], "notes": [ { "category": "description", "text": "It was found that the libcurl library did not prevent TLS session resumption when the client certificate had changed. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: TLS session resumption client cert bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5419" }, { "category": "external", "summary": "RHBZ#1362183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5419", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5419" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160803A.html", "url": "https://curl.haxx.se/docs/adv_20160803A.html" } ], "release_date": "2016-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: TLS session resumption client cert bypass" }, { "cve": "CVE-2016-5420", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2016-07-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1362190" } ], "notes": [ { "category": "description", "text": "It was found that the libcurl library did not check the client certificate when choosing the TLS connection to reuse. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Re-using connection with wrong client cert", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5420" }, { "category": "external", "summary": "RHBZ#1362190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5420", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5420" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160803B.html", "url": "https://curl.haxx.se/docs/adv_20160803B.html" } ], "release_date": "2016-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Re-using connection with wrong client cert" }, { "cve": "CVE-2016-6808", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2016-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1382352" } ], "notes": [ { "category": "description", "text": "It was found that the length checks prior to writing to the target buffer for creating a virtual host mapping rule did not take account of the length of the virtual host name, creating the potential for a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_jk: Buffer overflow when concatenating virtual host name and URI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6808" }, { "category": "external", "summary": "RHBZ#1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6808", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808" }, { "category": "external", "summary": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42", "url": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42" } ], "release_date": "2016-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mod_jk: Buffer overflow when concatenating virtual host name and URI" }, { "cve": "CVE-2016-7141", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2016-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1373229" } ], "notes": [ { "category": "description", "text": "It was found that the libcurl library using the NSS (Network Security Services) library as TLS/SSL backend incorrectly re-used client certificates for subsequent TLS connections in certain cases. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Incorrect reuse of client certificates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7141" }, { "category": "external", "summary": "RHBZ#1373229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7141", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7141" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160907.html", "url": "https://curl.haxx.se/docs/adv_20160907.html" } ], "release_date": "2016-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Incorrect reuse of client certificates" }, { "cve": "CVE-2016-8612", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1387605" } ], "notes": [ { "category": "description", "text": "An error was found in protocol parsing logic of mod_cluster load balancer Apache HTTP Server modules. An attacker could use this flaw to cause a Segmentation Fault in the serving httpd process.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Protocol parsing logic error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8612" }, { "category": "external", "summary": "RHBZ#1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8612", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612" } ], "release_date": "2016-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Protocol parsing logic error" } ] }
ghsa-hm5h-j86h-82pc
Vulnerability from github
Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.
{ "affected": [], "aliases": [ "CVE-2012-1148" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-07-03T19:55:00Z", "severity": "MODERATE" }, "details": "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.", "id": "GHSA-hm5h-j86h-82pc", "modified": "2022-05-13T01:12:02Z", "published": "2022-05-13T01:12:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148" }, { "type": "WEB", "url": "https://support.apple.com/HT205637" }, { "type": "WEB", "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166\u0026r2=1.167" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/49504" }, { "type": "WEB", "url": "http://secunia.com/advisories/51024" }, { "type": "WEB", "url": "http://secunia.com/advisories/51040" }, { "type": "WEB", "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0" }, { "type": "WEB", "url": "http://sourceforge.net/tracker/?func=detail\u0026atid=110127\u0026aid=2958794\u0026group_id=10127" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2525" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/52379" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1034344" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1527-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1613-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1613-2" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.