Action not permitted
Modal body text goes here.
cve-2005-3389
Vulnerability from cvelistv5
Published
2005-11-01 02:00
Modified
2024-08-07 23:10
Severity ?
EPSS score ?
Summary
The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:10:08.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15249", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15249" }, { "name": "21252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21252" }, { "name": "22691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22691" }, { "name": "134", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/134" }, { "name": "MDKSA-2005:213", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:213" }, { "name": "RHSA-2005:831", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-831.html" }, { "name": "TLSA-2006-38", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm" }, { "name": "18198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18198" }, { "name": "SSRT061238", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "name": "HPSBMA02159", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "name": "18054", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18054" }, { "name": "ADV-2005-2254", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2254" }, { "name": "20051031 Advisory 19/2005: PHP register_globals Activation Vulnerability in parse_str()", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/415291" }, { "name": "1015131", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015131" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.hardened-php.net/advisory_192005.78.html" }, { "name": "17559", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17559" }, { "name": "FLSA:166943", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html" }, { "name": "17371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17371" }, { "name": "ADV-2006-4320", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4320" }, { "name": "RHSA-2006:0549", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0549.html" }, { "name": "17490", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17490" }, { "name": "SUSE-SA:2005:069", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/419504/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11481", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11481" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.php.net/release_4_4_1.php" }, { "name": "17510", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17510" }, { "name": "17531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17531" }, { "name": "OpenPKG-SA-2005.027", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.org/security/OpenPKG-SA-2005.027-php.html" }, { "name": "18669", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18669" }, { "name": "17557", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17557" }, { "name": "GLSA-200511-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml" }, { "name": "USN-232-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://www.ubuntu.com/usn/usn-232-1/" }, { "name": "RHSA-2005:838", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-838.html" }, { "name": "SUSE-SR:2005:027", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_27_sr.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15249", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15249" }, { "name": "21252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21252" }, { "name": "22691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22691" }, { "name": "134", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/134" }, { "name": "MDKSA-2005:213", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:213" }, { "name": "RHSA-2005:831", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-831.html" }, { "name": "TLSA-2006-38", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm" }, { "name": "18198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18198" }, { "name": "SSRT061238", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "name": "HPSBMA02159", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "name": "18054", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18054" }, { "name": "ADV-2005-2254", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2254" }, { "name": "20051031 Advisory 19/2005: PHP register_globals Activation Vulnerability in parse_str()", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/415291" }, { "name": "1015131", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015131" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.hardened-php.net/advisory_192005.78.html" }, { "name": "17559", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17559" }, { "name": "FLSA:166943", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html" }, { "name": "17371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17371" }, { "name": "ADV-2006-4320", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4320" }, { "name": "RHSA-2006:0549", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0549.html" }, { "name": "17490", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17490" }, { "name": "SUSE-SA:2005:069", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.securityfocus.com/archive/1/419504/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11481", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11481" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.php.net/release_4_4_1.php" }, { "name": "17510", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17510" }, { "name": "17531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17531" }, { "name": "OpenPKG-SA-2005.027", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.org/security/OpenPKG-SA-2005.027-php.html" }, { "name": "18669", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18669" }, { "name": "17557", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17557" }, { "name": "GLSA-200511-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml" }, { "name": "USN-232-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://www.ubuntu.com/usn/usn-232-1/" }, { "name": "RHSA-2005:838", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-838.html" }, { "name": "SUSE-SR:2005:027", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_27_sr.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15249", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15249" }, { "name": "21252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21252" }, { "name": "22691", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22691" }, { "name": "134", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/134" }, { "name": "MDKSA-2005:213", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:213" }, { "name": "RHSA-2005:831", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-831.html" }, { "name": "TLSA-2006-38", "refsource": "TURBO", "url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm" }, { "name": "18198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18198" }, { "name": "SSRT061238", "refsource": "HP", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "name": "HPSBMA02159", "refsource": "HP", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "name": "18054", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18054" }, { "name": "ADV-2005-2254", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2254" }, { "name": "20051031 Advisory 19/2005: PHP register_globals Activation Vulnerability in parse_str()", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/415291" }, { "name": "1015131", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015131" }, { "name": "http://www.hardened-php.net/advisory_192005.78.html", "refsource": "MISC", "url": "http://www.hardened-php.net/advisory_192005.78.html" }, { "name": "17559", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17559" }, { "name": "FLSA:166943", "refsource": "FEDORA", "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html" }, { "name": "17371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17371" }, { "name": "ADV-2006-4320", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4320" }, { "name": "RHSA-2006:0549", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2006-0549.html" }, { "name": "17490", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17490" }, { "name": "SUSE-SA:2005:069", "refsource": "SUSE", "url": "http://www.securityfocus.com/archive/1/419504/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11481", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11481" }, { "name": "http://www.php.net/release_4_4_1.php", "refsource": "CONFIRM", "url": "http://www.php.net/release_4_4_1.php" }, { "name": "17510", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17510" }, { "name": "17531", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17531" }, { "name": "OpenPKG-SA-2005.027", "refsource": "OPENPKG", "url": "http://www.openpkg.org/security/OpenPKG-SA-2005.027-php.html" }, { "name": "18669", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18669" }, { "name": "17557", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17557" }, { "name": "GLSA-200511-08", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml" }, { "name": "USN-232-1", "refsource": "UBUNTU", "url": "https://www.ubuntu.com/usn/usn-232-1/" }, { "name": "RHSA-2005:838", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-838.html" }, { "name": "SUSE-SR:2005:027", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_27_sr.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3389", "datePublished": "2005-11-01T02:00:00", "dateReserved": "2005-11-01T00:00:00", "dateUpdated": "2024-08-07T23:10:08.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-3389\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-11-01T12:47:00.000\",\"lastModified\":\"2018-10-30T16:25:35.387\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF57C14-86B6-419A-BAFF-93D01CB1E081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78BAA18C-E5A0-4210-B64B-709BBFF31EEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"419867C6-37BE-43B4-BFE0-6325FEE3807D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"37896E87-95C2-4039-8362-BC03B1C56706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A159B4-B847-47DE-B7F8-89384E6C551B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B59616-A309-40B4-94B1-50A7BC00E35C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8667FBC6-04B6-40E5-93B3-6C22BEED4B26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F39A1B1-416E-4436-8007-733B66904A14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC2E5F96-66D2-4F99-A74D-6A2305EE218E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D724D09-0D45-4701-93C9-348301217C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC6A6F47-5C7C-4F82-B23B-9C959C69B27F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1A4DA6-6181-43A8-B0D8-5A016C3E75FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E36203C-1392-49BB-AE7E-49626963D673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6713614A-B14E-4A85-BF89-ED780068FC68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD95F8EB-B428-4B3C-9254-A5DECE03A989\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"069EB7EE-06B9-454F-9007-8DE5DCA33C53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*\",\"matchCriteriaId\":\"BBA861A2-F0CD-4DBB-B43A-4970EB114DA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18BF5BE6-09EA-45AD-93BF-2BEF1742534E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC1460DF-1687-4314-BF1A-01290B20302D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"470380B0-3982-48FC-871B-C8B43C81900D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63190D9B-7958-4B93-87C6-E7D5A572F6DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AAF4586-74FF-47C6-864B-656FDF3F33D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5245F990-B4A7-4ED8-909D-B8137CE79FAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5652D5B0-68E4-4239-B9B7-599AFCF4C53E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B71BB7-5239-4860-9100-8CABC3992D8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BD447A-4EED-482C-8F61-48FAD4FCF8BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3F9DF9D-15E5-4387-ABE3-A7583331A928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11579E5C-D7CF-46EE-B015-5F4185C174E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C69CDE21-2FD4-4529-8F02-8709CF5E3D7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"221B9AC4-C63C-4386-B3BD-E4BC102C6124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B7BA75-2A32-4A8E-ADF8-BCB4FC48CB5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7007E77F-60EF-44D8-9676-15B59DF1325F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E727CECE-E452-489A-A42F-5A069D6AF80E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"149A1FB8-593E-412B-8E1C-3E560301D500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC144FA-8F84-44C0-B263-B639FEAD20FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"295907B4-C3DE-4021-BE3B-A8826D4379E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B881352D-954E-4FC0-9E42-93D02A3F3089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17437AED-816A-4CCF-96DE-8C3D0CC8DB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74E7AE59-1CB0-4300-BBE0-109F909789EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9222821E-370F-4616-B787-CC22C2F4E7CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9809449F-9A76-4318-B233-B4C2950A6EA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AA962D4-A4EC-4DC3-B8A9-D10941B92781\"}]}]}],\"references\":[{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0549.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/17371\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17490\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17510\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17531\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17557\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17559\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18054\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18198\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18669\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21252\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22691\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/134\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1015131\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.hardened-php.net/advisory_192005.78.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:213\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_27_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openpkg.org/security/OpenPKG-SA-2005.027-php.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.php.net/release_4_4_1.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-831.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-838.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/415291\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/419504/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/15249\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.turbolinux.com/security/2006/TLSA-2006-38.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2254\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/4320\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11481\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.ubuntu.com/usn/usn-232-1/\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2005_882
Vulnerability from csaf_redhat
Published
2005-12-19 17:29
Modified
2024-11-05 16:35
Summary
Red Hat Security Advisory: openssl, php, mod_ssl, mod_imap security update for Stronghold
Notes
Topic
Updated versions of cross-platform Stronghold that fix security issues in
mod_ssl, mod_imap, OpenSSL, and PHP are now available.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
Stronghold 4 contains a number of open source technologies, including
mod_ssl and the Apache HTTP Server.
Several security issues have been found that affect cross-platform
Stronghold 4:
A flaw in mod_imap when using the Referer directive with image maps. With
certain site configurations, a remote attacker could perform a cross-site
scripting attack if a victim can be forced to visit a malicious URL using
certain web browsers. (CVE-2005-3352)
A flaw in mod_ssl triggered if a virtual host was configured using
"SSLVerifyClient optional" and a directive "SSLVerifyClient required" is
set for a specific location. For servers configured in this fashion, an
attacker may be able to access resources that should otherwise be
protected. (CVE-2005-2700)
Flaws in shmop_write, pack, and unpack PHP functions. These functions are
not normally passed user-supplied data, so would require a malicious PHP
script to be exploited. (CVE-2004-1018)
Various flaws, including possible information disclosure, double free, and
negative reference index array underflow in the deserialization code of
PHP. PHP applications may use the unserialize function of untrusted user
data, which could allow a remote attacker to gain access to memory or
potentially execute arbitrary code. (CVE-2004-1019)
A flaw in the way PHP registers global variables during a file upload
request. A remote attacker could submit a carefully crafted
multipart/form-data POST request that would overwrite the $GLOBALS array,
altering expected script behavior, and possibly leading to the execution of
arbitrary PHP commands. Note that this vulnerability only affects
installations which have register_globals enabled in the PHP configuration
file, which is not a default or recommended option. (CVE-2005-3390)
A flaw in the PHP parse_str() function. If a PHP script passes only one
argument to the parse_str() function, and the script can be forced to abort
execution during operation (for example due to the memory_limit setting),
the register_globals may be enabled even if it is disabled in the PHP
configuration file. This vulnerability only affects installations that have
PHP scripts using the parse_str function in this way. (CVE-2005-3389)
A Cross-Site Scripting flaw in the phpinfo() function. If a victim can be
tricked into following a malicious URL to a site with a page displaying the
phpinfo() output, it may be possible to inject javascript or HTML content
into the displayed page or steal data such as cookies. This vulnerability
only affects installations that allow users to view the output of the
phpinfo() function. As the phpinfo() function outputs a large amount of
information about the current state of PHP, it should only be used during
debugging or if protected by authentication. (CVE-2005-3388)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. This work-around is enabled in
most servers that use OpenSSL to provide support for SSL and TLS. Yutaka
Oiwa discovered that this work-around could allow an attacker, acting as a
"man in the middle", to force an SSL connection to use SSL 2.0 rather than
a stronger protocol such as SSL 3.0 or TLS 1.0. (CAN-2005-2969)
Colin Percival reported a cache timing attack that could allow a malicious
local user to gain portions of cryptographic keys. The OpenSSL library has
been patched to add a new fixed-window mod_exp implementation as default
for RSA, DSA, and DH private-key operations. This patch is designed to
mitigate cache timing and potentially related attacks. (CVE-2005-0109)
Stronghold users are advised to upgrade to these updated packages, which
resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated versions of cross-platform Stronghold that fix security issues in\nmod_ssl, mod_imap, OpenSSL, and PHP are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Stronghold 4 contains a number of open source technologies, including\nmod_ssl and the Apache HTTP Server.\n\nSeveral security issues have been found that affect cross-platform\nStronghold 4: \n\nA flaw in mod_imap when using the Referer directive with image maps. With\ncertain site configurations, a remote attacker could perform a cross-site\nscripting attack if a victim can be forced to visit a malicious URL using\ncertain web browsers. (CVE-2005-3352) \n\nA flaw in mod_ssl triggered if a virtual host was configured using\n\"SSLVerifyClient optional\" and a directive \"SSLVerifyClient required\" is\nset for a specific location. For servers configured in this fashion, an\nattacker may be able to access resources that should otherwise be\nprotected. (CVE-2005-2700) \n\nFlaws in shmop_write, pack, and unpack PHP functions. These functions are\nnot normally passed user-supplied data, so would require a malicious PHP\nscript to be exploited. (CVE-2004-1018) \n\nVarious flaws, including possible information disclosure, double free, and\nnegative reference index array underflow in the deserialization code of\nPHP. PHP applications may use the unserialize function of untrusted user\ndata, which could allow a remote attacker to gain access to memory or\npotentially execute arbitrary code. (CVE-2004-1019) \n\nA flaw in the way PHP registers global variables during a file upload\nrequest. A remote attacker could submit a carefully crafted\nmultipart/form-data POST request that would overwrite the $GLOBALS array,\naltering expected script behavior, and possibly leading to the execution of\narbitrary PHP commands. Note that this vulnerability only affects\ninstallations which have register_globals enabled in the PHP configuration\nfile, which is not a default or recommended option. (CVE-2005-3390)\n\nA flaw in the PHP parse_str() function. If a PHP script passes only one\nargument to the parse_str() function, and the script can be forced to abort\nexecution during operation (for example due to the memory_limit setting),\nthe register_globals may be enabled even if it is disabled in the PHP\nconfiguration file. This vulnerability only affects installations that have\nPHP scripts using the parse_str function in this way. (CVE-2005-3389)\n\nA Cross-Site Scripting flaw in the phpinfo() function. If a victim can be\ntricked into following a malicious URL to a site with a page displaying the\nphpinfo() output, it may be possible to inject javascript or HTML content\ninto the displayed page or steal data such as cookies. This vulnerability\nonly affects installations that allow users to view the output of the\nphpinfo() function. As the phpinfo() function outputs a large amount of\ninformation about the current state of PHP, it should only be used during\ndebugging or if protected by authentication. (CVE-2005-3388) \n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. This work-around is enabled in\nmost servers that use OpenSSL to provide support for SSL and TLS. Yutaka\nOiwa discovered that this work-around could allow an attacker, acting as a\n\"man in the middle\", to force an SSL connection to use SSL 2.0 rather than\na stronger protocol such as SSL 3.0 or TLS 1.0. (CAN-2005-2969)\n\nColin Percival reported a cache timing attack that could allow a malicious\nlocal user to gain portions of cryptographic keys. The OpenSSL library has\nbeen patched to add a new fixed-window mod_exp implementation as default\nfor RSA, DSA, and DH private-key operations. This patch is designed to\nmitigate cache timing and potentially related attacks. (CVE-2005-0109)\n\nStronghold users are advised to upgrade to these updated packages, which\nresolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:882", "url": "https://access.redhat.com/errata/RHSA-2005:882" }, { "category": "external", "summary": "http://stronghold.redhat.com/support/upgrade-sh4", "url": "http://stronghold.redhat.com/support/upgrade-sh4" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_882.json" } ], "title": "Red Hat Security Advisory: openssl, php, mod_ssl, mod_imap security update for Stronghold", "tracking": { "current_release_date": "2024-11-05T16:35:21+00:00", "generator": { "date": "2024-11-05T16:35:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2005:882", "initial_release_date": "2005-12-19T17:29:00+00:00", "revision_history": [ { "date": "2005-12-19T17:29:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-11-20T15:43:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:35:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Stronghold 4", "product": { "name": "Red Hat Stronghold 4", "product_id": "Red Hat Stronghold 4", "product_identification_helper": { "cpe": "cpe:/a:redhat:stronghold:4" } } } ], "category": "product_family", "name": "Stronghold Cross Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-1018", "discovery_date": "2004-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617352" } ], "notes": [ { "category": "description", "text": "Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an \"integer overflow/underflow\" in the pack function, or (3) an \"integer overflow/underflow\" in the unpack function. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1018" }, { "category": "external", "summary": "RHBZ#1617352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617352" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1018", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1018" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1018", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1018" } ], "release_date": "2004-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1019", "discovery_date": "2004-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617353" } ], "notes": [ { "category": "description", "text": "The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger \"information disclosure, double-free and negative reference index array underflow\" results.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1019" }, { "category": "external", "summary": "RHBZ#1617353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1019", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1019" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1019", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1019" } ], "release_date": "2004-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0109", "discovery_date": "2005-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617463" } ], "notes": [ { "category": "description", "text": "Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0109" }, { "category": "external", "summary": "RHBZ#1617463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617463" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0109", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0109" } ], "release_date": "2005-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2700", "discovery_date": "2005-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617741" } ], "notes": [ { "category": "description", "text": "ssl_engine_kernel.c in mod_ssl before 2.8.24, when using \"SSLVerifyClient optional\" in the global virtual host configuration, does not properly enforce \"SSLVerifyClient require\" in a per-location context, which allows remote attackers to bypass intended access restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2700" }, { "category": "external", "summary": "RHBZ#1617741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2700", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2700" } ], "release_date": "2005-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2005-3352", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2005-12-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430524" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd cross-site scripting flaw in mod_imap", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3352" }, { "category": "external", "summary": "RHBZ#430524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3352", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3352" } ], "release_date": "2005-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd cross-site scripting flaw in mod_imap" }, { "cve": "CVE-2005-3388", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617821" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a \"stacked array assignment.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3388" }, { "category": "external", "summary": "RHBZ#1617821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3388", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3389", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617822" } ], "notes": [ { "category": "description", "text": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3389" }, { "category": "external", "summary": "RHBZ#1617822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3390", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617823" } ], "notes": [ { "category": "description", "text": "The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a \"GLOBALS\" fileupload field.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3390" }, { "category": "external", "summary": "RHBZ#1617823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3390", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2005_831
Vulnerability from csaf_redhat
Published
2005-11-10 19:09
Modified
2024-11-05 16:35
Summary
Red Hat Security Advisory: php security update
Notes
Topic
Updated PHP packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.
A flaw was found in the way PHP registers global variables during a file
upload request. A remote attacker could submit a carefully crafted
multipart/form-data POST request that would overwrite the $GLOBALS array,
altering expected script behavior, and possibly leading to the execution of
arbitrary PHP commands. Please note that this vulnerability only affects
installations which have register_globals enabled in the PHP configuration
file, which is not a default or recommended option. The Common
Vulnerabilities and Exposures project assigned the name CVE-2005-3390 to
this issue.
A flaw was found in the PHP parse_str() function. If a PHP script passes
only one argument to the parse_str() function, and the script can be forced
to abort execution during operation (for example due to the memory_limit
setting), the register_globals may be enabled even if it is disabled in the
PHP configuration file. This vulnerability only affects installations that
have PHP scripts using the parse_str function in this way. (CVE-2005-3389)
A Cross-Site Scripting flaw was found in the phpinfo() function. If a
victim can be tricked into following a malicious URL to a site with a page
displaying the phpinfo() output, it may be possible to inject javascript
or HTML content into the displayed page or steal data such as cookies.
This vulnerability only affects installations which allow users to view the
output of the phpinfo() function. As the phpinfo() function outputs a
large amount of information about the current state of PHP, it should only
be used during debugging or if protected by authentication. (CVE-2005-3388)
A denial of service flaw was found in the way PHP processes EXIF image
data. It is possible for an attacker to cause PHP to crash by supplying
carefully crafted EXIF image data. (CVE-2005-3353)
Users of PHP should upgrade to these updated packages, which contain
backported patches that resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated PHP packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Web server.\n\nA flaw was found in the way PHP registers global variables during a file\nupload request. A remote attacker could submit a carefully crafted\nmultipart/form-data POST request that would overwrite the $GLOBALS array,\naltering expected script behavior, and possibly leading to the execution of\narbitrary PHP commands. Please note that this vulnerability only affects\ninstallations which have register_globals enabled in the PHP configuration\nfile, which is not a default or recommended option. The Common\nVulnerabilities and Exposures project assigned the name CVE-2005-3390 to\nthis issue.\n\nA flaw was found in the PHP parse_str() function. If a PHP script passes\nonly one argument to the parse_str() function, and the script can be forced\nto abort execution during operation (for example due to the memory_limit\nsetting), the register_globals may be enabled even if it is disabled in the\nPHP configuration file. This vulnerability only affects installations that\nhave PHP scripts using the parse_str function in this way. (CVE-2005-3389)\n\nA Cross-Site Scripting flaw was found in the phpinfo() function. If a\nvictim can be tricked into following a malicious URL to a site with a page\ndisplaying the phpinfo() output, it may be possible to inject javascript\nor HTML content into the displayed page or steal data such as cookies. \nThis vulnerability only affects installations which allow users to view the\noutput of the phpinfo() function. As the phpinfo() function outputs a\nlarge amount of information about the current state of PHP, it should only\nbe used during debugging or if protected by authentication. (CVE-2005-3388)\n\nA denial of service flaw was found in the way PHP processes EXIF image\ndata. It is possible for an attacker to cause PHP to crash by supplying\ncarefully crafted EXIF image data. (CVE-2005-3353)\n\nUsers of PHP should upgrade to these updated packages, which contain\nbackported patches that resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:831", "url": "https://access.redhat.com/errata/RHSA-2005:831" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "172207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172207" }, { "category": "external", "summary": "172209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172209" }, { "category": "external", "summary": "172212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172212" }, { "category": "external", "summary": "172589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172589" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_831.json" } ], "title": "Red Hat Security Advisory: php security update", "tracking": { "current_release_date": "2024-11-05T16:35:11+00:00", "generator": { "date": "2024-11-05T16:35:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2005:831", "initial_release_date": "2005-11-10T19:09:00+00:00", "revision_history": [ { "date": "2005-11-10T19:09:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-11-10T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:35:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "php-0:4.3.9-3.9.ia64", "product": { "name": "php-0:4.3.9-3.9.ia64", "product_id": "php-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-xmlrpc-0:4.3.9-3.9.ia64", "product": { "name": "php-xmlrpc-0:4.3.9-3.9.ia64", "product_id": "php-xmlrpc-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-xmlrpc@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.9-3.9.ia64", "product": { "name": "php-odbc-0:4.3.9-3.9.ia64", "product_id": "php-odbc-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.9-3.9.ia64", "product": { "name": "php-mysql-0:4.3.9-3.9.ia64", "product_id": "php-mysql-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-mbstring-0:4.3.9-3.9.ia64", "product": { "name": "php-mbstring-0:4.3.9-3.9.ia64", "product_id": "php-mbstring-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mbstring@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.9-3.9.ia64", "product": { "name": "php-pgsql-0:4.3.9-3.9.ia64", "product_id": "php-pgsql-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.9-3.9.ia64", "product": { "name": "php-ldap-0:4.3.9-3.9.ia64", "product_id": "php-ldap-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-snmp-0:4.3.9-3.9.ia64", "product": { "name": "php-snmp-0:4.3.9-3.9.ia64", "product_id": "php-snmp-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-snmp@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-imap-0:4.3.9-3.9.ia64", "product": { "name": "php-imap-0:4.3.9-3.9.ia64", "product_id": "php-imap-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-ncurses-0:4.3.9-3.9.ia64", "product": { "name": "php-ncurses-0:4.3.9-3.9.ia64", "product_id": "php-ncurses-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ncurses@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-pear-0:4.3.9-3.9.ia64", "product": { "name": "php-pear-0:4.3.9-3.9.ia64", "product_id": "php-pear-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-domxml-0:4.3.9-3.9.ia64", "product": { "name": "php-domxml-0:4.3.9-3.9.ia64", "product_id": "php-domxml-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-domxml@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-gd-0:4.3.9-3.9.ia64", "product": { "name": "php-gd-0:4.3.9-3.9.ia64", "product_id": "php-gd-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-gd@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-devel-0:4.3.9-3.9.ia64", "product": { "name": "php-devel-0:4.3.9-3.9.ia64", "product_id": "php-devel-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.9-3.9.ia64", "product": { "name": "php-debuginfo-0:4.3.9-3.9.ia64", "product_id": "php-debuginfo-0:4.3.9-3.9.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.9-3.9?arch=ia64" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-26.ent.ia64", "product": { "name": "php-imap-0:4.3.2-26.ent.ia64", "product_id": "php-imap-0:4.3.2-26.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-26.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-26.ent.ia64", "product": { "name": "php-devel-0:4.3.2-26.ent.ia64", "product_id": "php-devel-0:4.3.2-26.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-26.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-26.ent.ia64", "product": { "name": "php-ldap-0:4.3.2-26.ent.ia64", "product_id": "php-ldap-0:4.3.2-26.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-26.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-26.ent.ia64", "product": { "name": "php-pgsql-0:4.3.2-26.ent.ia64", "product_id": "php-pgsql-0:4.3.2-26.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-26.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-26.ent.ia64", "product": { "name": "php-debuginfo-0:4.3.2-26.ent.ia64", "product_id": "php-debuginfo-0:4.3.2-26.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-26.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.2-26.ent.ia64", "product": { "name": "php-odbc-0:4.3.2-26.ent.ia64", "product_id": "php-odbc-0:4.3.2-26.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-26.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-26.ent.ia64", "product": { "name": "php-mysql-0:4.3.2-26.ent.ia64", "product_id": "php-mysql-0:4.3.2-26.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-26.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-0:4.3.2-26.ent.ia64", "product": { "name": "php-0:4.3.2-26.ent.ia64", "product_id": "php-0:4.3.2-26.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-26.ent?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "php-0:4.3.9-3.9.src", "product": { "name": "php-0:4.3.9-3.9.src", "product_id": "php-0:4.3.9-3.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.9-3.9?arch=src" } } }, { "category": "product_version", "name": "php-0:4.3.2-26.ent.src", "product": { "name": "php-0:4.3.2-26.ent.src", "product_id": "php-0:4.3.2-26.ent.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-26.ent?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "php-0:4.3.9-3.9.x86_64", "product": { "name": "php-0:4.3.9-3.9.x86_64", "product_id": "php-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-xmlrpc-0:4.3.9-3.9.x86_64", "product": { "name": "php-xmlrpc-0:4.3.9-3.9.x86_64", "product_id": "php-xmlrpc-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-xmlrpc@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.9-3.9.x86_64", "product": { "name": "php-odbc-0:4.3.9-3.9.x86_64", "product_id": "php-odbc-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.9-3.9.x86_64", "product": { "name": "php-mysql-0:4.3.9-3.9.x86_64", "product_id": "php-mysql-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-mbstring-0:4.3.9-3.9.x86_64", "product": { "name": "php-mbstring-0:4.3.9-3.9.x86_64", "product_id": "php-mbstring-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mbstring@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.9-3.9.x86_64", "product": { "name": "php-pgsql-0:4.3.9-3.9.x86_64", "product_id": "php-pgsql-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.9-3.9.x86_64", "product": { "name": "php-ldap-0:4.3.9-3.9.x86_64", "product_id": "php-ldap-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-snmp-0:4.3.9-3.9.x86_64", "product": { "name": "php-snmp-0:4.3.9-3.9.x86_64", "product_id": "php-snmp-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-snmp@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-imap-0:4.3.9-3.9.x86_64", "product": { "name": "php-imap-0:4.3.9-3.9.x86_64", "product_id": "php-imap-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-ncurses-0:4.3.9-3.9.x86_64", "product": { "name": "php-ncurses-0:4.3.9-3.9.x86_64", "product_id": "php-ncurses-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ncurses@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-pear-0:4.3.9-3.9.x86_64", "product": { "name": "php-pear-0:4.3.9-3.9.x86_64", "product_id": "php-pear-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-domxml-0:4.3.9-3.9.x86_64", "product": { "name": "php-domxml-0:4.3.9-3.9.x86_64", "product_id": "php-domxml-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-domxml@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-gd-0:4.3.9-3.9.x86_64", "product": { "name": "php-gd-0:4.3.9-3.9.x86_64", "product_id": "php-gd-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-gd@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-devel-0:4.3.9-3.9.x86_64", "product": { "name": "php-devel-0:4.3.9-3.9.x86_64", "product_id": "php-devel-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.9-3.9.x86_64", "product": { "name": "php-debuginfo-0:4.3.9-3.9.x86_64", "product_id": "php-debuginfo-0:4.3.9-3.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.9-3.9?arch=x86_64" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-26.ent.x86_64", "product": { "name": "php-imap-0:4.3.2-26.ent.x86_64", "product_id": "php-imap-0:4.3.2-26.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-26.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-26.ent.x86_64", "product": { "name": "php-devel-0:4.3.2-26.ent.x86_64", "product_id": "php-devel-0:4.3.2-26.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-26.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-26.ent.x86_64", "product": { "name": "php-ldap-0:4.3.2-26.ent.x86_64", "product_id": "php-ldap-0:4.3.2-26.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-26.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-26.ent.x86_64", "product": { "name": "php-pgsql-0:4.3.2-26.ent.x86_64", "product_id": "php-pgsql-0:4.3.2-26.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-26.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-26.ent.x86_64", "product": { "name": "php-debuginfo-0:4.3.2-26.ent.x86_64", "product_id": "php-debuginfo-0:4.3.2-26.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-26.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.2-26.ent.x86_64", "product": { "name": "php-odbc-0:4.3.2-26.ent.x86_64", "product_id": "php-odbc-0:4.3.2-26.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-26.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-26.ent.x86_64", "product": { "name": "php-mysql-0:4.3.2-26.ent.x86_64", "product_id": "php-mysql-0:4.3.2-26.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-26.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-0:4.3.2-26.ent.x86_64", "product": { "name": "php-0:4.3.2-26.ent.x86_64", "product_id": "php-0:4.3.2-26.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-26.ent?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "php-0:4.3.9-3.9.i386", "product": { "name": "php-0:4.3.9-3.9.i386", "product_id": "php-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-xmlrpc-0:4.3.9-3.9.i386", "product": { "name": "php-xmlrpc-0:4.3.9-3.9.i386", "product_id": "php-xmlrpc-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-xmlrpc@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.9-3.9.i386", "product": { "name": "php-odbc-0:4.3.9-3.9.i386", "product_id": "php-odbc-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.9-3.9.i386", "product": { "name": "php-mysql-0:4.3.9-3.9.i386", "product_id": "php-mysql-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-mbstring-0:4.3.9-3.9.i386", "product": { "name": "php-mbstring-0:4.3.9-3.9.i386", "product_id": "php-mbstring-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mbstring@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.9-3.9.i386", "product": { "name": "php-pgsql-0:4.3.9-3.9.i386", "product_id": "php-pgsql-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.9-3.9.i386", "product": { "name": "php-ldap-0:4.3.9-3.9.i386", "product_id": "php-ldap-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-snmp-0:4.3.9-3.9.i386", "product": { "name": "php-snmp-0:4.3.9-3.9.i386", "product_id": "php-snmp-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-snmp@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-imap-0:4.3.9-3.9.i386", "product": { "name": "php-imap-0:4.3.9-3.9.i386", "product_id": "php-imap-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-ncurses-0:4.3.9-3.9.i386", "product": { "name": "php-ncurses-0:4.3.9-3.9.i386", "product_id": "php-ncurses-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ncurses@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-pear-0:4.3.9-3.9.i386", "product": { "name": "php-pear-0:4.3.9-3.9.i386", "product_id": "php-pear-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-domxml-0:4.3.9-3.9.i386", "product": { "name": "php-domxml-0:4.3.9-3.9.i386", "product_id": "php-domxml-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-domxml@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-gd-0:4.3.9-3.9.i386", "product": { "name": "php-gd-0:4.3.9-3.9.i386", "product_id": "php-gd-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-gd@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-devel-0:4.3.9-3.9.i386", "product": { "name": "php-devel-0:4.3.9-3.9.i386", "product_id": "php-devel-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.9-3.9.i386", "product": { "name": "php-debuginfo-0:4.3.9-3.9.i386", "product_id": "php-debuginfo-0:4.3.9-3.9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.9-3.9?arch=i386" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-26.ent.i386", "product": { "name": "php-imap-0:4.3.2-26.ent.i386", "product_id": "php-imap-0:4.3.2-26.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-26.ent?arch=i386" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-26.ent.i386", "product": { "name": "php-devel-0:4.3.2-26.ent.i386", "product_id": "php-devel-0:4.3.2-26.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-26.ent?arch=i386" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-26.ent.i386", "product": { "name": "php-ldap-0:4.3.2-26.ent.i386", "product_id": "php-ldap-0:4.3.2-26.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-26.ent?arch=i386" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-26.ent.i386", "product": { "name": "php-pgsql-0:4.3.2-26.ent.i386", "product_id": "php-pgsql-0:4.3.2-26.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-26.ent?arch=i386" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-26.ent.i386", "product": { "name": "php-debuginfo-0:4.3.2-26.ent.i386", "product_id": "php-debuginfo-0:4.3.2-26.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-26.ent?arch=i386" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.2-26.ent.i386", "product": { "name": "php-odbc-0:4.3.2-26.ent.i386", "product_id": "php-odbc-0:4.3.2-26.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-26.ent?arch=i386" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-26.ent.i386", "product": { "name": "php-mysql-0:4.3.2-26.ent.i386", "product_id": "php-mysql-0:4.3.2-26.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-26.ent?arch=i386" } } }, { "category": "product_version", "name": "php-0:4.3.2-26.ent.i386", "product": { "name": "php-0:4.3.2-26.ent.i386", "product_id": "php-0:4.3.2-26.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-26.ent?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "php-0:4.3.9-3.9.ppc", "product": { "name": "php-0:4.3.9-3.9.ppc", "product_id": "php-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-xmlrpc-0:4.3.9-3.9.ppc", "product": { "name": "php-xmlrpc-0:4.3.9-3.9.ppc", "product_id": "php-xmlrpc-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-xmlrpc@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.9-3.9.ppc", "product": { "name": "php-odbc-0:4.3.9-3.9.ppc", "product_id": "php-odbc-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.9-3.9.ppc", "product": { "name": "php-mysql-0:4.3.9-3.9.ppc", "product_id": "php-mysql-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-mbstring-0:4.3.9-3.9.ppc", "product": { "name": "php-mbstring-0:4.3.9-3.9.ppc", "product_id": "php-mbstring-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mbstring@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.9-3.9.ppc", "product": { "name": "php-pgsql-0:4.3.9-3.9.ppc", "product_id": "php-pgsql-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.9-3.9.ppc", "product": { "name": "php-ldap-0:4.3.9-3.9.ppc", "product_id": "php-ldap-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-snmp-0:4.3.9-3.9.ppc", "product": { "name": "php-snmp-0:4.3.9-3.9.ppc", "product_id": "php-snmp-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-snmp@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-imap-0:4.3.9-3.9.ppc", "product": { "name": "php-imap-0:4.3.9-3.9.ppc", "product_id": "php-imap-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-ncurses-0:4.3.9-3.9.ppc", "product": { "name": "php-ncurses-0:4.3.9-3.9.ppc", "product_id": "php-ncurses-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ncurses@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-pear-0:4.3.9-3.9.ppc", "product": { "name": "php-pear-0:4.3.9-3.9.ppc", "product_id": "php-pear-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-domxml-0:4.3.9-3.9.ppc", "product": { "name": "php-domxml-0:4.3.9-3.9.ppc", "product_id": "php-domxml-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-domxml@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-gd-0:4.3.9-3.9.ppc", "product": { "name": "php-gd-0:4.3.9-3.9.ppc", "product_id": "php-gd-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-gd@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-devel-0:4.3.9-3.9.ppc", "product": { "name": "php-devel-0:4.3.9-3.9.ppc", "product_id": "php-devel-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.9-3.9.ppc", "product": { "name": "php-debuginfo-0:4.3.9-3.9.ppc", "product_id": "php-debuginfo-0:4.3.9-3.9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.9-3.9?arch=ppc" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-26.ent.ppc", "product": { "name": "php-imap-0:4.3.2-26.ent.ppc", "product_id": "php-imap-0:4.3.2-26.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-26.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-26.ent.ppc", "product": { "name": "php-devel-0:4.3.2-26.ent.ppc", "product_id": "php-devel-0:4.3.2-26.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-26.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-26.ent.ppc", "product": { "name": "php-ldap-0:4.3.2-26.ent.ppc", "product_id": "php-ldap-0:4.3.2-26.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-26.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-26.ent.ppc", "product": { "name": "php-pgsql-0:4.3.2-26.ent.ppc", "product_id": "php-pgsql-0:4.3.2-26.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-26.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-26.ent.ppc", "product": { "name": "php-debuginfo-0:4.3.2-26.ent.ppc", "product_id": "php-debuginfo-0:4.3.2-26.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-26.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.2-26.ent.ppc", "product": { "name": "php-odbc-0:4.3.2-26.ent.ppc", "product_id": "php-odbc-0:4.3.2-26.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-26.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-26.ent.ppc", "product": { "name": "php-mysql-0:4.3.2-26.ent.ppc", "product_id": "php-mysql-0:4.3.2-26.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-26.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-0:4.3.2-26.ent.ppc", "product": { "name": "php-0:4.3.2-26.ent.ppc", "product_id": "php-0:4.3.2-26.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-26.ent?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "php-0:4.3.9-3.9.s390x", "product": { "name": "php-0:4.3.9-3.9.s390x", "product_id": "php-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-xmlrpc-0:4.3.9-3.9.s390x", "product": { "name": "php-xmlrpc-0:4.3.9-3.9.s390x", "product_id": "php-xmlrpc-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-xmlrpc@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.9-3.9.s390x", "product": { "name": "php-odbc-0:4.3.9-3.9.s390x", "product_id": "php-odbc-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.9-3.9.s390x", "product": { "name": "php-mysql-0:4.3.9-3.9.s390x", "product_id": "php-mysql-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-mbstring-0:4.3.9-3.9.s390x", "product": { "name": "php-mbstring-0:4.3.9-3.9.s390x", "product_id": "php-mbstring-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mbstring@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.9-3.9.s390x", "product": { "name": "php-pgsql-0:4.3.9-3.9.s390x", "product_id": "php-pgsql-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.9-3.9.s390x", "product": { "name": "php-ldap-0:4.3.9-3.9.s390x", "product_id": "php-ldap-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-snmp-0:4.3.9-3.9.s390x", "product": { "name": "php-snmp-0:4.3.9-3.9.s390x", "product_id": "php-snmp-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-snmp@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-imap-0:4.3.9-3.9.s390x", "product": { "name": "php-imap-0:4.3.9-3.9.s390x", "product_id": "php-imap-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-ncurses-0:4.3.9-3.9.s390x", "product": { "name": "php-ncurses-0:4.3.9-3.9.s390x", "product_id": "php-ncurses-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ncurses@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-pear-0:4.3.9-3.9.s390x", "product": { "name": "php-pear-0:4.3.9-3.9.s390x", "product_id": "php-pear-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-domxml-0:4.3.9-3.9.s390x", "product": { "name": "php-domxml-0:4.3.9-3.9.s390x", "product_id": "php-domxml-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-domxml@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-gd-0:4.3.9-3.9.s390x", "product": { "name": "php-gd-0:4.3.9-3.9.s390x", "product_id": "php-gd-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-gd@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-devel-0:4.3.9-3.9.s390x", "product": { "name": "php-devel-0:4.3.9-3.9.s390x", "product_id": "php-devel-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.9-3.9.s390x", "product": { "name": "php-debuginfo-0:4.3.9-3.9.s390x", "product_id": "php-debuginfo-0:4.3.9-3.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.9-3.9?arch=s390x" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-26.ent.s390x", "product": { "name": "php-imap-0:4.3.2-26.ent.s390x", "product_id": "php-imap-0:4.3.2-26.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-26.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-26.ent.s390x", "product": { "name": "php-devel-0:4.3.2-26.ent.s390x", "product_id": "php-devel-0:4.3.2-26.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-26.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-26.ent.s390x", "product": { "name": "php-ldap-0:4.3.2-26.ent.s390x", "product_id": "php-ldap-0:4.3.2-26.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-26.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-26.ent.s390x", "product": { "name": "php-pgsql-0:4.3.2-26.ent.s390x", "product_id": "php-pgsql-0:4.3.2-26.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-26.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-26.ent.s390x", "product": { "name": "php-debuginfo-0:4.3.2-26.ent.s390x", "product_id": "php-debuginfo-0:4.3.2-26.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-26.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.2-26.ent.s390x", "product": { "name": "php-odbc-0:4.3.2-26.ent.s390x", "product_id": "php-odbc-0:4.3.2-26.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-26.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-26.ent.s390x", "product": { "name": "php-mysql-0:4.3.2-26.ent.s390x", "product_id": "php-mysql-0:4.3.2-26.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-26.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-0:4.3.2-26.ent.s390x", "product": { "name": "php-0:4.3.2-26.ent.s390x", "product_id": "php-0:4.3.2-26.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-26.ent?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "php-0:4.3.9-3.9.s390", "product": { "name": "php-0:4.3.9-3.9.s390", "product_id": "php-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-xmlrpc-0:4.3.9-3.9.s390", "product": { "name": "php-xmlrpc-0:4.3.9-3.9.s390", "product_id": "php-xmlrpc-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-xmlrpc@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.9-3.9.s390", "product": { "name": "php-odbc-0:4.3.9-3.9.s390", "product_id": "php-odbc-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.9-3.9.s390", "product": { "name": "php-mysql-0:4.3.9-3.9.s390", "product_id": "php-mysql-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-mbstring-0:4.3.9-3.9.s390", "product": { "name": "php-mbstring-0:4.3.9-3.9.s390", "product_id": "php-mbstring-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mbstring@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.9-3.9.s390", "product": { "name": "php-pgsql-0:4.3.9-3.9.s390", "product_id": "php-pgsql-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.9-3.9.s390", "product": { "name": "php-ldap-0:4.3.9-3.9.s390", "product_id": "php-ldap-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-snmp-0:4.3.9-3.9.s390", "product": { "name": "php-snmp-0:4.3.9-3.9.s390", "product_id": "php-snmp-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-snmp@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-imap-0:4.3.9-3.9.s390", "product": { "name": "php-imap-0:4.3.9-3.9.s390", "product_id": "php-imap-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-ncurses-0:4.3.9-3.9.s390", "product": { "name": "php-ncurses-0:4.3.9-3.9.s390", "product_id": "php-ncurses-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ncurses@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-pear-0:4.3.9-3.9.s390", "product": { "name": "php-pear-0:4.3.9-3.9.s390", "product_id": "php-pear-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-domxml-0:4.3.9-3.9.s390", "product": { "name": "php-domxml-0:4.3.9-3.9.s390", "product_id": "php-domxml-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-domxml@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-gd-0:4.3.9-3.9.s390", "product": { "name": "php-gd-0:4.3.9-3.9.s390", "product_id": "php-gd-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-gd@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-devel-0:4.3.9-3.9.s390", "product": { "name": "php-devel-0:4.3.9-3.9.s390", "product_id": "php-devel-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.9-3.9.s390", "product": { "name": "php-debuginfo-0:4.3.9-3.9.s390", "product_id": "php-debuginfo-0:4.3.9-3.9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.9-3.9?arch=s390" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-26.ent.s390", "product": { "name": "php-imap-0:4.3.2-26.ent.s390", "product_id": "php-imap-0:4.3.2-26.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-26.ent?arch=s390" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-26.ent.s390", "product": { "name": "php-devel-0:4.3.2-26.ent.s390", "product_id": "php-devel-0:4.3.2-26.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-26.ent?arch=s390" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-26.ent.s390", "product": { "name": "php-ldap-0:4.3.2-26.ent.s390", "product_id": "php-ldap-0:4.3.2-26.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-26.ent?arch=s390" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-26.ent.s390", "product": { "name": "php-pgsql-0:4.3.2-26.ent.s390", "product_id": "php-pgsql-0:4.3.2-26.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-26.ent?arch=s390" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-26.ent.s390", "product": { "name": "php-debuginfo-0:4.3.2-26.ent.s390", "product_id": "php-debuginfo-0:4.3.2-26.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-26.ent?arch=s390" } } }, { "category": "product_version", "name": "php-odbc-0:4.3.2-26.ent.s390", "product": { "name": "php-odbc-0:4.3.2-26.ent.s390", "product_id": "php-odbc-0:4.3.2-26.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-26.ent?arch=s390" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-26.ent.s390", "product": { "name": "php-mysql-0:4.3.2-26.ent.s390", "product_id": "php-mysql-0:4.3.2-26.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-26.ent?arch=s390" } } }, { "category": "product_version", "name": "php-0:4.3.2-26.ent.s390", "product": { "name": "php-0:4.3.2-26.ent.s390", "product_id": "php-0:4.3.2-26.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-26.ent?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-26.ent.i386" }, "product_reference": "php-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-26.ent.ia64" }, "product_reference": "php-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-26.ent.ppc" }, "product_reference": "php-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-26.ent.s390" }, "product_reference": "php-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-26.ent.s390x" }, "product_reference": "php-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-26.ent.src" }, "product_reference": "php-0:4.3.2-26.ent.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-26.ent.i386" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-26.ent.ia64" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-26.ent.ppc" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-26.ent.s390" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-26.ent.s390x" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-26.ent.i386" }, "product_reference": "php-devel-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-26.ent.ia64" }, "product_reference": "php-devel-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-26.ent.ppc" }, "product_reference": "php-devel-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-26.ent.s390" }, "product_reference": "php-devel-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-26.ent.s390x" }, "product_reference": "php-devel-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-devel-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-26.ent.i386" }, "product_reference": "php-imap-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-26.ent.ia64" }, "product_reference": "php-imap-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-26.ent.ppc" }, "product_reference": "php-imap-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-26.ent.s390" }, "product_reference": "php-imap-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-26.ent.s390x" }, "product_reference": "php-imap-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-imap-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-26.ent.i386" }, "product_reference": "php-ldap-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-26.ent.ia64" }, "product_reference": "php-ldap-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-26.ent.ppc" }, "product_reference": "php-ldap-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-26.ent.s390" }, "product_reference": "php-ldap-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-26.ent.s390x" }, "product_reference": "php-ldap-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-ldap-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-26.ent.i386" }, "product_reference": "php-mysql-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-26.ent.ia64" }, "product_reference": "php-mysql-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-26.ent.ppc" }, "product_reference": "php-mysql-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-26.ent.s390" }, "product_reference": "php-mysql-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-26.ent.s390x" }, "product_reference": "php-mysql-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-mysql-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-26.ent.i386" }, "product_reference": "php-odbc-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-26.ent.ia64" }, "product_reference": "php-odbc-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-26.ent.ppc" }, "product_reference": "php-odbc-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-26.ent.s390" }, "product_reference": "php-odbc-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-26.ent.s390x" }, "product_reference": "php-odbc-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-odbc-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-26.ent.i386" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-26.ent.ia64" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-26.ent.ppc" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-26.ent.s390" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-26.ent.s390x" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-26.ent.i386" }, "product_reference": "php-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-26.ent.ia64" }, "product_reference": "php-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-26.ent.ppc" }, "product_reference": "php-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-26.ent.s390" }, "product_reference": "php-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-26.ent.s390x" }, "product_reference": "php-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-26.ent.src" }, "product_reference": "php-0:4.3.2-26.ent.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-26.ent.i386" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-26.ent.ia64" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-26.ent.ppc" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390x" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-26.ent.i386" }, "product_reference": "php-devel-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-26.ent.ia64" }, "product_reference": "php-devel-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-26.ent.ppc" }, "product_reference": "php-devel-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-26.ent.s390" }, "product_reference": "php-devel-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-26.ent.s390x" }, "product_reference": "php-devel-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-devel-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-26.ent.i386" }, "product_reference": "php-imap-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-26.ent.ia64" }, "product_reference": "php-imap-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-26.ent.ppc" }, "product_reference": "php-imap-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-26.ent.s390" }, "product_reference": "php-imap-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-26.ent.s390x" }, "product_reference": "php-imap-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-imap-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-26.ent.i386" }, "product_reference": "php-ldap-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-26.ent.ia64" }, "product_reference": "php-ldap-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-26.ent.ppc" }, "product_reference": "php-ldap-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-26.ent.s390" }, "product_reference": "php-ldap-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-26.ent.s390x" }, "product_reference": "php-ldap-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-ldap-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-26.ent.i386" }, "product_reference": "php-mysql-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-26.ent.ia64" }, "product_reference": "php-mysql-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-26.ent.ppc" }, "product_reference": "php-mysql-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-26.ent.s390" }, "product_reference": "php-mysql-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-26.ent.s390x" }, "product_reference": "php-mysql-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-mysql-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-26.ent.i386" }, "product_reference": "php-odbc-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-26.ent.ia64" }, "product_reference": "php-odbc-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-26.ent.ppc" }, "product_reference": "php-odbc-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-26.ent.s390" }, "product_reference": "php-odbc-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-26.ent.s390x" }, "product_reference": "php-odbc-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-odbc-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-26.ent.i386" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-26.ent.ia64" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-26.ent.ppc" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-26.ent.s390" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-26.ent.s390x" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-26.ent.i386" }, "product_reference": "php-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-26.ent.ia64" }, "product_reference": "php-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-26.ent.ppc" }, "product_reference": "php-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-26.ent.s390" }, "product_reference": "php-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-26.ent.s390x" }, "product_reference": "php-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-26.ent.src" }, "product_reference": "php-0:4.3.2-26.ent.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-26.ent.i386" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-26.ent.ia64" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-26.ent.ppc" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-26.ent.s390" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-26.ent.s390x" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-26.ent.i386" }, "product_reference": "php-devel-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-26.ent.ia64" }, "product_reference": "php-devel-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-26.ent.ppc" }, "product_reference": "php-devel-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-26.ent.s390" }, "product_reference": "php-devel-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-26.ent.s390x" }, "product_reference": "php-devel-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-devel-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-26.ent.i386" }, "product_reference": "php-imap-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-26.ent.ia64" }, "product_reference": "php-imap-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-26.ent.ppc" }, "product_reference": "php-imap-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-26.ent.s390" }, "product_reference": "php-imap-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-26.ent.s390x" }, "product_reference": "php-imap-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-imap-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-26.ent.i386" }, "product_reference": "php-ldap-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-26.ent.ia64" }, "product_reference": "php-ldap-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-26.ent.ppc" }, "product_reference": "php-ldap-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-26.ent.s390" }, "product_reference": "php-ldap-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-26.ent.s390x" }, "product_reference": "php-ldap-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-ldap-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-26.ent.i386" }, "product_reference": "php-mysql-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-26.ent.ia64" }, "product_reference": "php-mysql-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-26.ent.ppc" }, "product_reference": "php-mysql-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-26.ent.s390" }, "product_reference": "php-mysql-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-26.ent.s390x" }, "product_reference": "php-mysql-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-mysql-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-26.ent.i386" }, "product_reference": "php-odbc-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-26.ent.ia64" }, "product_reference": "php-odbc-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-26.ent.ppc" }, "product_reference": "php-odbc-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-26.ent.s390" }, "product_reference": "php-odbc-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-26.ent.s390x" }, "product_reference": "php-odbc-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-odbc-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-26.ent.i386" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-26.ent.ia64" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-26.ent.ppc" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-26.ent.s390" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-26.ent.s390x" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-26.ent.i386" }, "product_reference": "php-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-26.ent.ia64" }, "product_reference": "php-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-26.ent.ppc" }, "product_reference": "php-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-26.ent.s390" }, "product_reference": "php-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-26.ent.s390x" }, "product_reference": "php-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-26.ent.src" }, "product_reference": "php-0:4.3.2-26.ent.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-26.ent.i386" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-26.ent.ia64" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-26.ent.ppc" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-26.ent.s390" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-26.ent.s390x" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-debuginfo-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-26.ent.i386" }, "product_reference": "php-devel-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-26.ent.ia64" }, "product_reference": "php-devel-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-26.ent.ppc" }, "product_reference": "php-devel-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-26.ent.s390" }, "product_reference": "php-devel-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-26.ent.s390x" }, "product_reference": "php-devel-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-devel-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-26.ent.i386" }, "product_reference": "php-imap-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-26.ent.ia64" }, "product_reference": "php-imap-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-26.ent.ppc" }, "product_reference": "php-imap-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-26.ent.s390" }, "product_reference": "php-imap-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-26.ent.s390x" }, "product_reference": "php-imap-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-imap-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-26.ent.i386" }, "product_reference": "php-ldap-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-26.ent.ia64" }, "product_reference": "php-ldap-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-26.ent.ppc" }, "product_reference": "php-ldap-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-26.ent.s390" }, "product_reference": "php-ldap-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-26.ent.s390x" }, "product_reference": "php-ldap-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-ldap-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-26.ent.i386" }, "product_reference": "php-mysql-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-26.ent.ia64" }, "product_reference": "php-mysql-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-26.ent.ppc" }, "product_reference": "php-mysql-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-26.ent.s390" }, "product_reference": "php-mysql-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-26.ent.s390x" }, "product_reference": "php-mysql-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-mysql-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-26.ent.i386" }, "product_reference": "php-odbc-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-26.ent.ia64" }, "product_reference": "php-odbc-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-26.ent.ppc" }, "product_reference": "php-odbc-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-26.ent.s390" }, "product_reference": "php-odbc-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-26.ent.s390x" }, "product_reference": "php-odbc-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-odbc-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-26.ent.i386" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-26.ent.ia64" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-26.ent.ppc" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-26.ent.s390" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-26.ent.s390x" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-26.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-26.ent.x86_64" }, "product_reference": "php-pgsql-0:4.3.2-26.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-0:4.3.9-3.9.i386" }, "product_reference": "php-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-0:4.3.9-3.9.ia64" }, "product_reference": "php-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-0:4.3.9-3.9.ppc" }, "product_reference": "php-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-0:4.3.9-3.9.s390" }, "product_reference": "php-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-0:4.3.9-3.9.s390x" }, "product_reference": "php-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-0:4.3.9-3.9.src" }, "product_reference": "php-0:4.3.9-3.9.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-0:4.3.9-3.9.x86_64" }, "product_reference": "php-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-debuginfo-0:4.3.9-3.9.i386" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-debuginfo-0:4.3.9-3.9.ia64" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-debuginfo-0:4.3.9-3.9.ppc" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-debuginfo-0:4.3.9-3.9.s390" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-debuginfo-0:4.3.9-3.9.s390x" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-debuginfo-0:4.3.9-3.9.x86_64" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-devel-0:4.3.9-3.9.i386" }, "product_reference": "php-devel-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-devel-0:4.3.9-3.9.ia64" }, "product_reference": "php-devel-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-devel-0:4.3.9-3.9.ppc" }, "product_reference": "php-devel-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-devel-0:4.3.9-3.9.s390" }, "product_reference": "php-devel-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-devel-0:4.3.9-3.9.s390x" }, "product_reference": "php-devel-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-devel-0:4.3.9-3.9.x86_64" }, "product_reference": "php-devel-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-domxml-0:4.3.9-3.9.i386" }, "product_reference": "php-domxml-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-domxml-0:4.3.9-3.9.ia64" }, "product_reference": "php-domxml-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-domxml-0:4.3.9-3.9.ppc" }, "product_reference": "php-domxml-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-domxml-0:4.3.9-3.9.s390" }, "product_reference": "php-domxml-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-domxml-0:4.3.9-3.9.s390x" }, "product_reference": "php-domxml-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-domxml-0:4.3.9-3.9.x86_64" }, "product_reference": "php-domxml-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-gd-0:4.3.9-3.9.i386" }, "product_reference": "php-gd-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-gd-0:4.3.9-3.9.ia64" }, "product_reference": "php-gd-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-gd-0:4.3.9-3.9.ppc" }, "product_reference": "php-gd-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-gd-0:4.3.9-3.9.s390" }, "product_reference": "php-gd-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-gd-0:4.3.9-3.9.s390x" }, "product_reference": "php-gd-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-gd-0:4.3.9-3.9.x86_64" }, "product_reference": "php-gd-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-imap-0:4.3.9-3.9.i386" }, "product_reference": "php-imap-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-imap-0:4.3.9-3.9.ia64" }, "product_reference": "php-imap-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-imap-0:4.3.9-3.9.ppc" }, "product_reference": "php-imap-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-imap-0:4.3.9-3.9.s390" }, "product_reference": "php-imap-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-imap-0:4.3.9-3.9.s390x" }, "product_reference": "php-imap-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-imap-0:4.3.9-3.9.x86_64" }, "product_reference": "php-imap-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ldap-0:4.3.9-3.9.i386" }, "product_reference": "php-ldap-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ldap-0:4.3.9-3.9.ia64" }, "product_reference": "php-ldap-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ldap-0:4.3.9-3.9.ppc" }, "product_reference": "php-ldap-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ldap-0:4.3.9-3.9.s390" }, "product_reference": "php-ldap-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ldap-0:4.3.9-3.9.s390x" }, "product_reference": "php-ldap-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ldap-0:4.3.9-3.9.x86_64" }, "product_reference": "php-ldap-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mbstring-0:4.3.9-3.9.i386" }, "product_reference": "php-mbstring-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mbstring-0:4.3.9-3.9.ia64" }, "product_reference": "php-mbstring-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mbstring-0:4.3.9-3.9.ppc" }, "product_reference": "php-mbstring-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mbstring-0:4.3.9-3.9.s390" }, "product_reference": "php-mbstring-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mbstring-0:4.3.9-3.9.s390x" }, "product_reference": "php-mbstring-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mbstring-0:4.3.9-3.9.x86_64" }, "product_reference": "php-mbstring-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mysql-0:4.3.9-3.9.i386" }, "product_reference": "php-mysql-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mysql-0:4.3.9-3.9.ia64" }, "product_reference": "php-mysql-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mysql-0:4.3.9-3.9.ppc" }, "product_reference": "php-mysql-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mysql-0:4.3.9-3.9.s390" }, "product_reference": "php-mysql-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mysql-0:4.3.9-3.9.s390x" }, "product_reference": "php-mysql-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-mysql-0:4.3.9-3.9.x86_64" }, "product_reference": "php-mysql-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ncurses-0:4.3.9-3.9.i386" }, "product_reference": "php-ncurses-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ncurses-0:4.3.9-3.9.ia64" }, "product_reference": "php-ncurses-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ncurses-0:4.3.9-3.9.ppc" }, "product_reference": "php-ncurses-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ncurses-0:4.3.9-3.9.s390" }, "product_reference": "php-ncurses-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ncurses-0:4.3.9-3.9.s390x" }, "product_reference": "php-ncurses-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-ncurses-0:4.3.9-3.9.x86_64" }, "product_reference": "php-ncurses-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-odbc-0:4.3.9-3.9.i386" }, "product_reference": "php-odbc-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-odbc-0:4.3.9-3.9.ia64" }, "product_reference": "php-odbc-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-odbc-0:4.3.9-3.9.ppc" }, "product_reference": "php-odbc-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-odbc-0:4.3.9-3.9.s390" }, "product_reference": "php-odbc-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-odbc-0:4.3.9-3.9.s390x" }, "product_reference": "php-odbc-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-odbc-0:4.3.9-3.9.x86_64" }, "product_reference": "php-odbc-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pear-0:4.3.9-3.9.i386" }, "product_reference": "php-pear-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pear-0:4.3.9-3.9.ia64" }, "product_reference": "php-pear-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pear-0:4.3.9-3.9.ppc" }, "product_reference": "php-pear-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pear-0:4.3.9-3.9.s390" }, "product_reference": "php-pear-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pear-0:4.3.9-3.9.s390x" }, "product_reference": "php-pear-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pear-0:4.3.9-3.9.x86_64" }, "product_reference": "php-pear-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pgsql-0:4.3.9-3.9.i386" }, "product_reference": "php-pgsql-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pgsql-0:4.3.9-3.9.ia64" }, "product_reference": "php-pgsql-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pgsql-0:4.3.9-3.9.ppc" }, "product_reference": "php-pgsql-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pgsql-0:4.3.9-3.9.s390" }, "product_reference": "php-pgsql-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pgsql-0:4.3.9-3.9.s390x" }, "product_reference": "php-pgsql-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-pgsql-0:4.3.9-3.9.x86_64" }, "product_reference": "php-pgsql-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-snmp-0:4.3.9-3.9.i386" }, "product_reference": "php-snmp-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-snmp-0:4.3.9-3.9.ia64" }, "product_reference": "php-snmp-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-snmp-0:4.3.9-3.9.ppc" }, "product_reference": "php-snmp-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-snmp-0:4.3.9-3.9.s390" }, "product_reference": "php-snmp-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-snmp-0:4.3.9-3.9.s390x" }, "product_reference": "php-snmp-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-snmp-0:4.3.9-3.9.x86_64" }, "product_reference": "php-snmp-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-xmlrpc-0:4.3.9-3.9.i386" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-xmlrpc-0:4.3.9-3.9.ia64" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-xmlrpc-0:4.3.9-3.9.ppc" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-xmlrpc-0:4.3.9-3.9.s390" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-xmlrpc-0:4.3.9-3.9.s390x" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:php-xmlrpc-0:4.3.9-3.9.x86_64" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-0:4.3.9-3.9.i386" }, "product_reference": "php-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-0:4.3.9-3.9.ia64" }, "product_reference": "php-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-0:4.3.9-3.9.ppc" }, "product_reference": "php-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-0:4.3.9-3.9.s390" }, "product_reference": "php-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-0:4.3.9-3.9.s390x" }, "product_reference": "php-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-0:4.3.9-3.9.src" }, "product_reference": "php-0:4.3.9-3.9.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-0:4.3.9-3.9.x86_64" }, "product_reference": "php-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-debuginfo-0:4.3.9-3.9.i386" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-debuginfo-0:4.3.9-3.9.ia64" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-debuginfo-0:4.3.9-3.9.ppc" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-debuginfo-0:4.3.9-3.9.s390" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-debuginfo-0:4.3.9-3.9.s390x" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-debuginfo-0:4.3.9-3.9.x86_64" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-devel-0:4.3.9-3.9.i386" }, "product_reference": "php-devel-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-devel-0:4.3.9-3.9.ia64" }, "product_reference": "php-devel-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-devel-0:4.3.9-3.9.ppc" }, "product_reference": "php-devel-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-devel-0:4.3.9-3.9.s390" }, "product_reference": "php-devel-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-devel-0:4.3.9-3.9.s390x" }, "product_reference": "php-devel-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-devel-0:4.3.9-3.9.x86_64" }, "product_reference": "php-devel-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-domxml-0:4.3.9-3.9.i386" }, "product_reference": "php-domxml-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-domxml-0:4.3.9-3.9.ia64" }, "product_reference": "php-domxml-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-domxml-0:4.3.9-3.9.ppc" }, "product_reference": "php-domxml-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-domxml-0:4.3.9-3.9.s390" }, "product_reference": "php-domxml-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-domxml-0:4.3.9-3.9.s390x" }, "product_reference": "php-domxml-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-domxml-0:4.3.9-3.9.x86_64" }, "product_reference": "php-domxml-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-gd-0:4.3.9-3.9.i386" }, "product_reference": "php-gd-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-gd-0:4.3.9-3.9.ia64" }, "product_reference": "php-gd-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-gd-0:4.3.9-3.9.ppc" }, "product_reference": "php-gd-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-gd-0:4.3.9-3.9.s390" }, "product_reference": "php-gd-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-gd-0:4.3.9-3.9.s390x" }, "product_reference": "php-gd-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-gd-0:4.3.9-3.9.x86_64" }, "product_reference": "php-gd-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-imap-0:4.3.9-3.9.i386" }, "product_reference": "php-imap-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-imap-0:4.3.9-3.9.ia64" }, "product_reference": "php-imap-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-imap-0:4.3.9-3.9.ppc" }, "product_reference": "php-imap-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-imap-0:4.3.9-3.9.s390" }, "product_reference": "php-imap-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-imap-0:4.3.9-3.9.s390x" }, "product_reference": "php-imap-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-imap-0:4.3.9-3.9.x86_64" }, "product_reference": "php-imap-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ldap-0:4.3.9-3.9.i386" }, "product_reference": "php-ldap-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ldap-0:4.3.9-3.9.ia64" }, "product_reference": "php-ldap-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ldap-0:4.3.9-3.9.ppc" }, "product_reference": "php-ldap-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ldap-0:4.3.9-3.9.s390" }, "product_reference": "php-ldap-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ldap-0:4.3.9-3.9.s390x" }, "product_reference": "php-ldap-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ldap-0:4.3.9-3.9.x86_64" }, "product_reference": "php-ldap-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mbstring-0:4.3.9-3.9.i386" }, "product_reference": "php-mbstring-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mbstring-0:4.3.9-3.9.ia64" }, "product_reference": "php-mbstring-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mbstring-0:4.3.9-3.9.ppc" }, "product_reference": "php-mbstring-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mbstring-0:4.3.9-3.9.s390" }, "product_reference": "php-mbstring-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mbstring-0:4.3.9-3.9.s390x" }, "product_reference": "php-mbstring-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mbstring-0:4.3.9-3.9.x86_64" }, "product_reference": "php-mbstring-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mysql-0:4.3.9-3.9.i386" }, "product_reference": "php-mysql-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mysql-0:4.3.9-3.9.ia64" }, "product_reference": "php-mysql-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mysql-0:4.3.9-3.9.ppc" }, "product_reference": "php-mysql-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mysql-0:4.3.9-3.9.s390" }, "product_reference": "php-mysql-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mysql-0:4.3.9-3.9.s390x" }, "product_reference": "php-mysql-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-mysql-0:4.3.9-3.9.x86_64" }, "product_reference": "php-mysql-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ncurses-0:4.3.9-3.9.i386" }, "product_reference": "php-ncurses-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ncurses-0:4.3.9-3.9.ia64" }, "product_reference": "php-ncurses-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ncurses-0:4.3.9-3.9.ppc" }, "product_reference": "php-ncurses-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ncurses-0:4.3.9-3.9.s390" }, "product_reference": "php-ncurses-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ncurses-0:4.3.9-3.9.s390x" }, "product_reference": "php-ncurses-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-ncurses-0:4.3.9-3.9.x86_64" }, "product_reference": "php-ncurses-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-odbc-0:4.3.9-3.9.i386" }, "product_reference": "php-odbc-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-odbc-0:4.3.9-3.9.ia64" }, "product_reference": "php-odbc-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-odbc-0:4.3.9-3.9.ppc" }, "product_reference": "php-odbc-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-odbc-0:4.3.9-3.9.s390" }, "product_reference": "php-odbc-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-odbc-0:4.3.9-3.9.s390x" }, "product_reference": "php-odbc-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-odbc-0:4.3.9-3.9.x86_64" }, "product_reference": "php-odbc-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pear-0:4.3.9-3.9.i386" }, "product_reference": "php-pear-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pear-0:4.3.9-3.9.ia64" }, "product_reference": "php-pear-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pear-0:4.3.9-3.9.ppc" }, "product_reference": "php-pear-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pear-0:4.3.9-3.9.s390" }, "product_reference": "php-pear-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pear-0:4.3.9-3.9.s390x" }, "product_reference": "php-pear-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pear-0:4.3.9-3.9.x86_64" }, "product_reference": "php-pear-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pgsql-0:4.3.9-3.9.i386" }, "product_reference": "php-pgsql-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pgsql-0:4.3.9-3.9.ia64" }, "product_reference": "php-pgsql-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pgsql-0:4.3.9-3.9.ppc" }, "product_reference": "php-pgsql-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pgsql-0:4.3.9-3.9.s390" }, "product_reference": "php-pgsql-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pgsql-0:4.3.9-3.9.s390x" }, "product_reference": "php-pgsql-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-pgsql-0:4.3.9-3.9.x86_64" }, "product_reference": "php-pgsql-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-snmp-0:4.3.9-3.9.i386" }, "product_reference": "php-snmp-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-snmp-0:4.3.9-3.9.ia64" }, "product_reference": "php-snmp-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-snmp-0:4.3.9-3.9.ppc" }, "product_reference": "php-snmp-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-snmp-0:4.3.9-3.9.s390" }, "product_reference": "php-snmp-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-snmp-0:4.3.9-3.9.s390x" }, "product_reference": "php-snmp-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-snmp-0:4.3.9-3.9.x86_64" }, "product_reference": "php-snmp-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-xmlrpc-0:4.3.9-3.9.i386" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-xmlrpc-0:4.3.9-3.9.ia64" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-xmlrpc-0:4.3.9-3.9.ppc" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390x" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:php-xmlrpc-0:4.3.9-3.9.x86_64" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-0:4.3.9-3.9.i386" }, "product_reference": "php-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-0:4.3.9-3.9.ia64" }, "product_reference": "php-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-0:4.3.9-3.9.ppc" }, "product_reference": "php-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-0:4.3.9-3.9.s390" }, "product_reference": "php-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-0:4.3.9-3.9.s390x" }, "product_reference": "php-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-0:4.3.9-3.9.src" }, "product_reference": "php-0:4.3.9-3.9.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-0:4.3.9-3.9.x86_64" }, "product_reference": "php-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-debuginfo-0:4.3.9-3.9.i386" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-debuginfo-0:4.3.9-3.9.ia64" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-debuginfo-0:4.3.9-3.9.ppc" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-debuginfo-0:4.3.9-3.9.s390" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-debuginfo-0:4.3.9-3.9.s390x" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-debuginfo-0:4.3.9-3.9.x86_64" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-devel-0:4.3.9-3.9.i386" }, "product_reference": "php-devel-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-devel-0:4.3.9-3.9.ia64" }, "product_reference": "php-devel-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-devel-0:4.3.9-3.9.ppc" }, "product_reference": "php-devel-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-devel-0:4.3.9-3.9.s390" }, "product_reference": "php-devel-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-devel-0:4.3.9-3.9.s390x" }, "product_reference": "php-devel-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-devel-0:4.3.9-3.9.x86_64" }, "product_reference": "php-devel-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-domxml-0:4.3.9-3.9.i386" }, "product_reference": "php-domxml-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-domxml-0:4.3.9-3.9.ia64" }, "product_reference": "php-domxml-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-domxml-0:4.3.9-3.9.ppc" }, "product_reference": "php-domxml-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-domxml-0:4.3.9-3.9.s390" }, "product_reference": "php-domxml-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-domxml-0:4.3.9-3.9.s390x" }, "product_reference": "php-domxml-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-domxml-0:4.3.9-3.9.x86_64" }, "product_reference": "php-domxml-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-gd-0:4.3.9-3.9.i386" }, "product_reference": "php-gd-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-gd-0:4.3.9-3.9.ia64" }, "product_reference": "php-gd-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-gd-0:4.3.9-3.9.ppc" }, "product_reference": "php-gd-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-gd-0:4.3.9-3.9.s390" }, "product_reference": "php-gd-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-gd-0:4.3.9-3.9.s390x" }, "product_reference": "php-gd-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-gd-0:4.3.9-3.9.x86_64" }, "product_reference": "php-gd-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-imap-0:4.3.9-3.9.i386" }, "product_reference": "php-imap-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-imap-0:4.3.9-3.9.ia64" }, "product_reference": "php-imap-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-imap-0:4.3.9-3.9.ppc" }, "product_reference": "php-imap-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-imap-0:4.3.9-3.9.s390" }, "product_reference": "php-imap-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-imap-0:4.3.9-3.9.s390x" }, "product_reference": "php-imap-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-imap-0:4.3.9-3.9.x86_64" }, "product_reference": "php-imap-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ldap-0:4.3.9-3.9.i386" }, "product_reference": "php-ldap-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ldap-0:4.3.9-3.9.ia64" }, "product_reference": "php-ldap-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ldap-0:4.3.9-3.9.ppc" }, "product_reference": "php-ldap-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ldap-0:4.3.9-3.9.s390" }, "product_reference": "php-ldap-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ldap-0:4.3.9-3.9.s390x" }, "product_reference": "php-ldap-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ldap-0:4.3.9-3.9.x86_64" }, "product_reference": "php-ldap-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mbstring-0:4.3.9-3.9.i386" }, "product_reference": "php-mbstring-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mbstring-0:4.3.9-3.9.ia64" }, "product_reference": "php-mbstring-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mbstring-0:4.3.9-3.9.ppc" }, "product_reference": "php-mbstring-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mbstring-0:4.3.9-3.9.s390" }, "product_reference": "php-mbstring-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mbstring-0:4.3.9-3.9.s390x" }, "product_reference": "php-mbstring-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mbstring-0:4.3.9-3.9.x86_64" }, "product_reference": "php-mbstring-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mysql-0:4.3.9-3.9.i386" }, "product_reference": "php-mysql-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mysql-0:4.3.9-3.9.ia64" }, "product_reference": "php-mysql-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mysql-0:4.3.9-3.9.ppc" }, "product_reference": "php-mysql-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mysql-0:4.3.9-3.9.s390" }, "product_reference": "php-mysql-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mysql-0:4.3.9-3.9.s390x" }, "product_reference": "php-mysql-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-mysql-0:4.3.9-3.9.x86_64" }, "product_reference": "php-mysql-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ncurses-0:4.3.9-3.9.i386" }, "product_reference": "php-ncurses-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ncurses-0:4.3.9-3.9.ia64" }, "product_reference": "php-ncurses-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ncurses-0:4.3.9-3.9.ppc" }, "product_reference": "php-ncurses-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ncurses-0:4.3.9-3.9.s390" }, "product_reference": "php-ncurses-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ncurses-0:4.3.9-3.9.s390x" }, "product_reference": "php-ncurses-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-ncurses-0:4.3.9-3.9.x86_64" }, "product_reference": "php-ncurses-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-odbc-0:4.3.9-3.9.i386" }, "product_reference": "php-odbc-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-odbc-0:4.3.9-3.9.ia64" }, "product_reference": "php-odbc-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-odbc-0:4.3.9-3.9.ppc" }, "product_reference": "php-odbc-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-odbc-0:4.3.9-3.9.s390" }, "product_reference": "php-odbc-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-odbc-0:4.3.9-3.9.s390x" }, "product_reference": "php-odbc-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-odbc-0:4.3.9-3.9.x86_64" }, "product_reference": "php-odbc-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pear-0:4.3.9-3.9.i386" }, "product_reference": "php-pear-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pear-0:4.3.9-3.9.ia64" }, "product_reference": "php-pear-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pear-0:4.3.9-3.9.ppc" }, "product_reference": "php-pear-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pear-0:4.3.9-3.9.s390" }, "product_reference": "php-pear-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pear-0:4.3.9-3.9.s390x" }, "product_reference": "php-pear-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pear-0:4.3.9-3.9.x86_64" }, "product_reference": "php-pear-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pgsql-0:4.3.9-3.9.i386" }, "product_reference": "php-pgsql-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pgsql-0:4.3.9-3.9.ia64" }, "product_reference": "php-pgsql-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pgsql-0:4.3.9-3.9.ppc" }, "product_reference": "php-pgsql-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pgsql-0:4.3.9-3.9.s390" }, "product_reference": "php-pgsql-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pgsql-0:4.3.9-3.9.s390x" }, "product_reference": "php-pgsql-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-pgsql-0:4.3.9-3.9.x86_64" }, "product_reference": "php-pgsql-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-snmp-0:4.3.9-3.9.i386" }, "product_reference": "php-snmp-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-snmp-0:4.3.9-3.9.ia64" }, "product_reference": "php-snmp-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-snmp-0:4.3.9-3.9.ppc" }, "product_reference": "php-snmp-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-snmp-0:4.3.9-3.9.s390" }, "product_reference": "php-snmp-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-snmp-0:4.3.9-3.9.s390x" }, "product_reference": "php-snmp-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-snmp-0:4.3.9-3.9.x86_64" }, "product_reference": "php-snmp-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-xmlrpc-0:4.3.9-3.9.i386" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-xmlrpc-0:4.3.9-3.9.ia64" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-xmlrpc-0:4.3.9-3.9.ppc" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-xmlrpc-0:4.3.9-3.9.s390" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-xmlrpc-0:4.3.9-3.9.s390x" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:php-xmlrpc-0:4.3.9-3.9.x86_64" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-0:4.3.9-3.9.i386" }, "product_reference": "php-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-0:4.3.9-3.9.ia64" }, "product_reference": "php-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-0:4.3.9-3.9.ppc" }, "product_reference": "php-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-0:4.3.9-3.9.s390" }, "product_reference": "php-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-0:4.3.9-3.9.s390x" }, "product_reference": "php-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-0:4.3.9-3.9.src" }, "product_reference": "php-0:4.3.9-3.9.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-0:4.3.9-3.9.x86_64" }, "product_reference": "php-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-debuginfo-0:4.3.9-3.9.i386" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-debuginfo-0:4.3.9-3.9.ia64" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-debuginfo-0:4.3.9-3.9.ppc" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-debuginfo-0:4.3.9-3.9.s390" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-debuginfo-0:4.3.9-3.9.s390x" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-debuginfo-0:4.3.9-3.9.x86_64" }, "product_reference": "php-debuginfo-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-devel-0:4.3.9-3.9.i386" }, "product_reference": "php-devel-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-devel-0:4.3.9-3.9.ia64" }, "product_reference": "php-devel-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-devel-0:4.3.9-3.9.ppc" }, "product_reference": "php-devel-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-devel-0:4.3.9-3.9.s390" }, "product_reference": "php-devel-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-devel-0:4.3.9-3.9.s390x" }, "product_reference": "php-devel-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-devel-0:4.3.9-3.9.x86_64" }, "product_reference": "php-devel-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-domxml-0:4.3.9-3.9.i386" }, "product_reference": "php-domxml-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-domxml-0:4.3.9-3.9.ia64" }, "product_reference": "php-domxml-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-domxml-0:4.3.9-3.9.ppc" }, "product_reference": "php-domxml-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-domxml-0:4.3.9-3.9.s390" }, "product_reference": "php-domxml-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-domxml-0:4.3.9-3.9.s390x" }, "product_reference": "php-domxml-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-domxml-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-domxml-0:4.3.9-3.9.x86_64" }, "product_reference": "php-domxml-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-gd-0:4.3.9-3.9.i386" }, "product_reference": "php-gd-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-gd-0:4.3.9-3.9.ia64" }, "product_reference": "php-gd-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-gd-0:4.3.9-3.9.ppc" }, "product_reference": "php-gd-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-gd-0:4.3.9-3.9.s390" }, "product_reference": "php-gd-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-gd-0:4.3.9-3.9.s390x" }, "product_reference": "php-gd-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-gd-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-gd-0:4.3.9-3.9.x86_64" }, "product_reference": "php-gd-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-imap-0:4.3.9-3.9.i386" }, "product_reference": "php-imap-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-imap-0:4.3.9-3.9.ia64" }, "product_reference": "php-imap-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-imap-0:4.3.9-3.9.ppc" }, "product_reference": "php-imap-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-imap-0:4.3.9-3.9.s390" }, "product_reference": "php-imap-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-imap-0:4.3.9-3.9.s390x" }, "product_reference": "php-imap-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-imap-0:4.3.9-3.9.x86_64" }, "product_reference": "php-imap-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ldap-0:4.3.9-3.9.i386" }, "product_reference": "php-ldap-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ldap-0:4.3.9-3.9.ia64" }, "product_reference": "php-ldap-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ldap-0:4.3.9-3.9.ppc" }, "product_reference": "php-ldap-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ldap-0:4.3.9-3.9.s390" }, "product_reference": "php-ldap-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ldap-0:4.3.9-3.9.s390x" }, "product_reference": "php-ldap-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ldap-0:4.3.9-3.9.x86_64" }, "product_reference": "php-ldap-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mbstring-0:4.3.9-3.9.i386" }, "product_reference": "php-mbstring-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mbstring-0:4.3.9-3.9.ia64" }, "product_reference": "php-mbstring-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mbstring-0:4.3.9-3.9.ppc" }, "product_reference": "php-mbstring-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mbstring-0:4.3.9-3.9.s390" }, "product_reference": "php-mbstring-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mbstring-0:4.3.9-3.9.s390x" }, "product_reference": "php-mbstring-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mbstring-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mbstring-0:4.3.9-3.9.x86_64" }, "product_reference": "php-mbstring-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mysql-0:4.3.9-3.9.i386" }, "product_reference": "php-mysql-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mysql-0:4.3.9-3.9.ia64" }, "product_reference": "php-mysql-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mysql-0:4.3.9-3.9.ppc" }, "product_reference": "php-mysql-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mysql-0:4.3.9-3.9.s390" }, "product_reference": "php-mysql-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mysql-0:4.3.9-3.9.s390x" }, "product_reference": "php-mysql-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-mysql-0:4.3.9-3.9.x86_64" }, "product_reference": "php-mysql-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ncurses-0:4.3.9-3.9.i386" }, "product_reference": "php-ncurses-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ncurses-0:4.3.9-3.9.ia64" }, "product_reference": "php-ncurses-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ncurses-0:4.3.9-3.9.ppc" }, "product_reference": "php-ncurses-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ncurses-0:4.3.9-3.9.s390" }, "product_reference": "php-ncurses-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ncurses-0:4.3.9-3.9.s390x" }, "product_reference": "php-ncurses-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ncurses-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-ncurses-0:4.3.9-3.9.x86_64" }, "product_reference": "php-ncurses-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-odbc-0:4.3.9-3.9.i386" }, "product_reference": "php-odbc-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-odbc-0:4.3.9-3.9.ia64" }, "product_reference": "php-odbc-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-odbc-0:4.3.9-3.9.ppc" }, "product_reference": "php-odbc-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-odbc-0:4.3.9-3.9.s390" }, "product_reference": "php-odbc-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-odbc-0:4.3.9-3.9.s390x" }, "product_reference": "php-odbc-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-odbc-0:4.3.9-3.9.x86_64" }, "product_reference": "php-odbc-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pear-0:4.3.9-3.9.i386" }, "product_reference": "php-pear-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pear-0:4.3.9-3.9.ia64" }, "product_reference": "php-pear-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pear-0:4.3.9-3.9.ppc" }, "product_reference": "php-pear-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pear-0:4.3.9-3.9.s390" }, "product_reference": "php-pear-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pear-0:4.3.9-3.9.s390x" }, "product_reference": "php-pear-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pear-0:4.3.9-3.9.x86_64" }, "product_reference": "php-pear-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pgsql-0:4.3.9-3.9.i386" }, "product_reference": "php-pgsql-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pgsql-0:4.3.9-3.9.ia64" }, "product_reference": "php-pgsql-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pgsql-0:4.3.9-3.9.ppc" }, "product_reference": "php-pgsql-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pgsql-0:4.3.9-3.9.s390" }, "product_reference": "php-pgsql-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pgsql-0:4.3.9-3.9.s390x" }, "product_reference": "php-pgsql-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-pgsql-0:4.3.9-3.9.x86_64" }, "product_reference": "php-pgsql-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-snmp-0:4.3.9-3.9.i386" }, "product_reference": "php-snmp-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-snmp-0:4.3.9-3.9.ia64" }, "product_reference": "php-snmp-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-snmp-0:4.3.9-3.9.ppc" }, "product_reference": "php-snmp-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-snmp-0:4.3.9-3.9.s390" }, "product_reference": "php-snmp-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-snmp-0:4.3.9-3.9.s390x" }, "product_reference": "php-snmp-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-snmp-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-snmp-0:4.3.9-3.9.x86_64" }, "product_reference": "php-snmp-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-xmlrpc-0:4.3.9-3.9.i386" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-xmlrpc-0:4.3.9-3.9.ia64" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-xmlrpc-0:4.3.9-3.9.ppc" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-xmlrpc-0:4.3.9-3.9.s390" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-xmlrpc-0:4.3.9-3.9.s390x" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-xmlrpc-0:4.3.9-3.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:php-xmlrpc-0:4.3.9-3.9.x86_64" }, "product_reference": "php-xmlrpc-0:4.3.9-3.9.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-3353", "discovery_date": "2005-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617816" } ], "notes": [ { "category": "description", "text": "The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:php-0:4.3.2-26.ent.i386", "3AS:php-0:4.3.2-26.ent.ia64", "3AS:php-0:4.3.2-26.ent.ppc", "3AS:php-0:4.3.2-26.ent.s390", "3AS:php-0:4.3.2-26.ent.s390x", "3AS:php-0:4.3.2-26.ent.src", "3AS:php-0:4.3.2-26.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-26.ent.i386", "3AS:php-debuginfo-0:4.3.2-26.ent.ia64", "3AS:php-debuginfo-0:4.3.2-26.ent.ppc", "3AS:php-debuginfo-0:4.3.2-26.ent.s390", "3AS:php-debuginfo-0:4.3.2-26.ent.s390x", "3AS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3AS:php-devel-0:4.3.2-26.ent.i386", "3AS:php-devel-0:4.3.2-26.ent.ia64", "3AS:php-devel-0:4.3.2-26.ent.ppc", "3AS:php-devel-0:4.3.2-26.ent.s390", "3AS:php-devel-0:4.3.2-26.ent.s390x", "3AS:php-devel-0:4.3.2-26.ent.x86_64", "3AS:php-imap-0:4.3.2-26.ent.i386", "3AS:php-imap-0:4.3.2-26.ent.ia64", "3AS:php-imap-0:4.3.2-26.ent.ppc", "3AS:php-imap-0:4.3.2-26.ent.s390", "3AS:php-imap-0:4.3.2-26.ent.s390x", "3AS:php-imap-0:4.3.2-26.ent.x86_64", "3AS:php-ldap-0:4.3.2-26.ent.i386", "3AS:php-ldap-0:4.3.2-26.ent.ia64", "3AS:php-ldap-0:4.3.2-26.ent.ppc", "3AS:php-ldap-0:4.3.2-26.ent.s390", "3AS:php-ldap-0:4.3.2-26.ent.s390x", "3AS:php-ldap-0:4.3.2-26.ent.x86_64", "3AS:php-mysql-0:4.3.2-26.ent.i386", "3AS:php-mysql-0:4.3.2-26.ent.ia64", "3AS:php-mysql-0:4.3.2-26.ent.ppc", "3AS:php-mysql-0:4.3.2-26.ent.s390", "3AS:php-mysql-0:4.3.2-26.ent.s390x", "3AS:php-mysql-0:4.3.2-26.ent.x86_64", "3AS:php-odbc-0:4.3.2-26.ent.i386", "3AS:php-odbc-0:4.3.2-26.ent.ia64", "3AS:php-odbc-0:4.3.2-26.ent.ppc", "3AS:php-odbc-0:4.3.2-26.ent.s390", "3AS:php-odbc-0:4.3.2-26.ent.s390x", "3AS:php-odbc-0:4.3.2-26.ent.x86_64", "3AS:php-pgsql-0:4.3.2-26.ent.i386", "3AS:php-pgsql-0:4.3.2-26.ent.ia64", "3AS:php-pgsql-0:4.3.2-26.ent.ppc", "3AS:php-pgsql-0:4.3.2-26.ent.s390", "3AS:php-pgsql-0:4.3.2-26.ent.s390x", "3AS:php-pgsql-0:4.3.2-26.ent.x86_64", "3Desktop:php-0:4.3.2-26.ent.i386", "3Desktop:php-0:4.3.2-26.ent.ia64", "3Desktop:php-0:4.3.2-26.ent.ppc", "3Desktop:php-0:4.3.2-26.ent.s390", "3Desktop:php-0:4.3.2-26.ent.s390x", "3Desktop:php-0:4.3.2-26.ent.src", "3Desktop:php-0:4.3.2-26.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-26.ent.x86_64", "3Desktop:php-devel-0:4.3.2-26.ent.i386", "3Desktop:php-devel-0:4.3.2-26.ent.ia64", "3Desktop:php-devel-0:4.3.2-26.ent.ppc", "3Desktop:php-devel-0:4.3.2-26.ent.s390", "3Desktop:php-devel-0:4.3.2-26.ent.s390x", "3Desktop:php-devel-0:4.3.2-26.ent.x86_64", "3Desktop:php-imap-0:4.3.2-26.ent.i386", "3Desktop:php-imap-0:4.3.2-26.ent.ia64", "3Desktop:php-imap-0:4.3.2-26.ent.ppc", "3Desktop:php-imap-0:4.3.2-26.ent.s390", "3Desktop:php-imap-0:4.3.2-26.ent.s390x", "3Desktop:php-imap-0:4.3.2-26.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-26.ent.i386", "3Desktop:php-ldap-0:4.3.2-26.ent.ia64", "3Desktop:php-ldap-0:4.3.2-26.ent.ppc", "3Desktop:php-ldap-0:4.3.2-26.ent.s390", "3Desktop:php-ldap-0:4.3.2-26.ent.s390x", "3Desktop:php-ldap-0:4.3.2-26.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-26.ent.i386", "3Desktop:php-mysql-0:4.3.2-26.ent.ia64", "3Desktop:php-mysql-0:4.3.2-26.ent.ppc", "3Desktop:php-mysql-0:4.3.2-26.ent.s390", "3Desktop:php-mysql-0:4.3.2-26.ent.s390x", "3Desktop:php-mysql-0:4.3.2-26.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-26.ent.i386", "3Desktop:php-odbc-0:4.3.2-26.ent.ia64", "3Desktop:php-odbc-0:4.3.2-26.ent.ppc", "3Desktop:php-odbc-0:4.3.2-26.ent.s390", "3Desktop:php-odbc-0:4.3.2-26.ent.s390x", "3Desktop:php-odbc-0:4.3.2-26.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-26.ent.i386", "3Desktop:php-pgsql-0:4.3.2-26.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-26.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-26.ent.x86_64", "3ES:php-0:4.3.2-26.ent.i386", "3ES:php-0:4.3.2-26.ent.ia64", "3ES:php-0:4.3.2-26.ent.ppc", "3ES:php-0:4.3.2-26.ent.s390", "3ES:php-0:4.3.2-26.ent.s390x", "3ES:php-0:4.3.2-26.ent.src", "3ES:php-0:4.3.2-26.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-26.ent.i386", "3ES:php-debuginfo-0:4.3.2-26.ent.ia64", "3ES:php-debuginfo-0:4.3.2-26.ent.ppc", "3ES:php-debuginfo-0:4.3.2-26.ent.s390", "3ES:php-debuginfo-0:4.3.2-26.ent.s390x", "3ES:php-debuginfo-0:4.3.2-26.ent.x86_64", "3ES:php-devel-0:4.3.2-26.ent.i386", "3ES:php-devel-0:4.3.2-26.ent.ia64", "3ES:php-devel-0:4.3.2-26.ent.ppc", "3ES:php-devel-0:4.3.2-26.ent.s390", "3ES:php-devel-0:4.3.2-26.ent.s390x", "3ES:php-devel-0:4.3.2-26.ent.x86_64", "3ES:php-imap-0:4.3.2-26.ent.i386", "3ES:php-imap-0:4.3.2-26.ent.ia64", "3ES:php-imap-0:4.3.2-26.ent.ppc", "3ES:php-imap-0:4.3.2-26.ent.s390", "3ES:php-imap-0:4.3.2-26.ent.s390x", "3ES:php-imap-0:4.3.2-26.ent.x86_64", "3ES:php-ldap-0:4.3.2-26.ent.i386", "3ES:php-ldap-0:4.3.2-26.ent.ia64", "3ES:php-ldap-0:4.3.2-26.ent.ppc", "3ES:php-ldap-0:4.3.2-26.ent.s390", "3ES:php-ldap-0:4.3.2-26.ent.s390x", "3ES:php-ldap-0:4.3.2-26.ent.x86_64", "3ES:php-mysql-0:4.3.2-26.ent.i386", "3ES:php-mysql-0:4.3.2-26.ent.ia64", "3ES:php-mysql-0:4.3.2-26.ent.ppc", "3ES:php-mysql-0:4.3.2-26.ent.s390", "3ES:php-mysql-0:4.3.2-26.ent.s390x", "3ES:php-mysql-0:4.3.2-26.ent.x86_64", "3ES:php-odbc-0:4.3.2-26.ent.i386", "3ES:php-odbc-0:4.3.2-26.ent.ia64", "3ES:php-odbc-0:4.3.2-26.ent.ppc", "3ES:php-odbc-0:4.3.2-26.ent.s390", "3ES:php-odbc-0:4.3.2-26.ent.s390x", "3ES:php-odbc-0:4.3.2-26.ent.x86_64", "3ES:php-pgsql-0:4.3.2-26.ent.i386", "3ES:php-pgsql-0:4.3.2-26.ent.ia64", "3ES:php-pgsql-0:4.3.2-26.ent.ppc", "3ES:php-pgsql-0:4.3.2-26.ent.s390", "3ES:php-pgsql-0:4.3.2-26.ent.s390x", "3ES:php-pgsql-0:4.3.2-26.ent.x86_64", "3WS:php-0:4.3.2-26.ent.i386", "3WS:php-0:4.3.2-26.ent.ia64", "3WS:php-0:4.3.2-26.ent.ppc", "3WS:php-0:4.3.2-26.ent.s390", "3WS:php-0:4.3.2-26.ent.s390x", "3WS:php-0:4.3.2-26.ent.src", "3WS:php-0:4.3.2-26.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-26.ent.i386", "3WS:php-debuginfo-0:4.3.2-26.ent.ia64", "3WS:php-debuginfo-0:4.3.2-26.ent.ppc", "3WS:php-debuginfo-0:4.3.2-26.ent.s390", "3WS:php-debuginfo-0:4.3.2-26.ent.s390x", "3WS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3WS:php-devel-0:4.3.2-26.ent.i386", "3WS:php-devel-0:4.3.2-26.ent.ia64", "3WS:php-devel-0:4.3.2-26.ent.ppc", "3WS:php-devel-0:4.3.2-26.ent.s390", "3WS:php-devel-0:4.3.2-26.ent.s390x", "3WS:php-devel-0:4.3.2-26.ent.x86_64", "3WS:php-imap-0:4.3.2-26.ent.i386", "3WS:php-imap-0:4.3.2-26.ent.ia64", "3WS:php-imap-0:4.3.2-26.ent.ppc", "3WS:php-imap-0:4.3.2-26.ent.s390", "3WS:php-imap-0:4.3.2-26.ent.s390x", "3WS:php-imap-0:4.3.2-26.ent.x86_64", "3WS:php-ldap-0:4.3.2-26.ent.i386", "3WS:php-ldap-0:4.3.2-26.ent.ia64", "3WS:php-ldap-0:4.3.2-26.ent.ppc", "3WS:php-ldap-0:4.3.2-26.ent.s390", "3WS:php-ldap-0:4.3.2-26.ent.s390x", "3WS:php-ldap-0:4.3.2-26.ent.x86_64", "3WS:php-mysql-0:4.3.2-26.ent.i386", "3WS:php-mysql-0:4.3.2-26.ent.ia64", "3WS:php-mysql-0:4.3.2-26.ent.ppc", "3WS:php-mysql-0:4.3.2-26.ent.s390", "3WS:php-mysql-0:4.3.2-26.ent.s390x", "3WS:php-mysql-0:4.3.2-26.ent.x86_64", "3WS:php-odbc-0:4.3.2-26.ent.i386", "3WS:php-odbc-0:4.3.2-26.ent.ia64", "3WS:php-odbc-0:4.3.2-26.ent.ppc", "3WS:php-odbc-0:4.3.2-26.ent.s390", "3WS:php-odbc-0:4.3.2-26.ent.s390x", "3WS:php-odbc-0:4.3.2-26.ent.x86_64", "3WS:php-pgsql-0:4.3.2-26.ent.i386", "3WS:php-pgsql-0:4.3.2-26.ent.ia64", "3WS:php-pgsql-0:4.3.2-26.ent.ppc", "3WS:php-pgsql-0:4.3.2-26.ent.s390", "3WS:php-pgsql-0:4.3.2-26.ent.s390x", "3WS:php-pgsql-0:4.3.2-26.ent.x86_64", "4AS:php-0:4.3.9-3.9.i386", "4AS:php-0:4.3.9-3.9.ia64", "4AS:php-0:4.3.9-3.9.ppc", "4AS:php-0:4.3.9-3.9.s390", "4AS:php-0:4.3.9-3.9.s390x", "4AS:php-0:4.3.9-3.9.src", "4AS:php-0:4.3.9-3.9.x86_64", "4AS:php-debuginfo-0:4.3.9-3.9.i386", "4AS:php-debuginfo-0:4.3.9-3.9.ia64", "4AS:php-debuginfo-0:4.3.9-3.9.ppc", "4AS:php-debuginfo-0:4.3.9-3.9.s390", "4AS:php-debuginfo-0:4.3.9-3.9.s390x", "4AS:php-debuginfo-0:4.3.9-3.9.x86_64", "4AS:php-devel-0:4.3.9-3.9.i386", "4AS:php-devel-0:4.3.9-3.9.ia64", "4AS:php-devel-0:4.3.9-3.9.ppc", "4AS:php-devel-0:4.3.9-3.9.s390", "4AS:php-devel-0:4.3.9-3.9.s390x", "4AS:php-devel-0:4.3.9-3.9.x86_64", "4AS:php-domxml-0:4.3.9-3.9.i386", "4AS:php-domxml-0:4.3.9-3.9.ia64", "4AS:php-domxml-0:4.3.9-3.9.ppc", "4AS:php-domxml-0:4.3.9-3.9.s390", "4AS:php-domxml-0:4.3.9-3.9.s390x", "4AS:php-domxml-0:4.3.9-3.9.x86_64", "4AS:php-gd-0:4.3.9-3.9.i386", "4AS:php-gd-0:4.3.9-3.9.ia64", "4AS:php-gd-0:4.3.9-3.9.ppc", "4AS:php-gd-0:4.3.9-3.9.s390", "4AS:php-gd-0:4.3.9-3.9.s390x", "4AS:php-gd-0:4.3.9-3.9.x86_64", "4AS:php-imap-0:4.3.9-3.9.i386", "4AS:php-imap-0:4.3.9-3.9.ia64", "4AS:php-imap-0:4.3.9-3.9.ppc", "4AS:php-imap-0:4.3.9-3.9.s390", "4AS:php-imap-0:4.3.9-3.9.s390x", "4AS:php-imap-0:4.3.9-3.9.x86_64", "4AS:php-ldap-0:4.3.9-3.9.i386", "4AS:php-ldap-0:4.3.9-3.9.ia64", "4AS:php-ldap-0:4.3.9-3.9.ppc", "4AS:php-ldap-0:4.3.9-3.9.s390", "4AS:php-ldap-0:4.3.9-3.9.s390x", "4AS:php-ldap-0:4.3.9-3.9.x86_64", "4AS:php-mbstring-0:4.3.9-3.9.i386", "4AS:php-mbstring-0:4.3.9-3.9.ia64", "4AS:php-mbstring-0:4.3.9-3.9.ppc", "4AS:php-mbstring-0:4.3.9-3.9.s390", "4AS:php-mbstring-0:4.3.9-3.9.s390x", "4AS:php-mbstring-0:4.3.9-3.9.x86_64", "4AS:php-mysql-0:4.3.9-3.9.i386", "4AS:php-mysql-0:4.3.9-3.9.ia64", "4AS:php-mysql-0:4.3.9-3.9.ppc", "4AS:php-mysql-0:4.3.9-3.9.s390", "4AS:php-mysql-0:4.3.9-3.9.s390x", "4AS:php-mysql-0:4.3.9-3.9.x86_64", "4AS:php-ncurses-0:4.3.9-3.9.i386", "4AS:php-ncurses-0:4.3.9-3.9.ia64", "4AS:php-ncurses-0:4.3.9-3.9.ppc", "4AS:php-ncurses-0:4.3.9-3.9.s390", "4AS:php-ncurses-0:4.3.9-3.9.s390x", "4AS:php-ncurses-0:4.3.9-3.9.x86_64", "4AS:php-odbc-0:4.3.9-3.9.i386", "4AS:php-odbc-0:4.3.9-3.9.ia64", "4AS:php-odbc-0:4.3.9-3.9.ppc", "4AS:php-odbc-0:4.3.9-3.9.s390", "4AS:php-odbc-0:4.3.9-3.9.s390x", "4AS:php-odbc-0:4.3.9-3.9.x86_64", "4AS:php-pear-0:4.3.9-3.9.i386", "4AS:php-pear-0:4.3.9-3.9.ia64", "4AS:php-pear-0:4.3.9-3.9.ppc", "4AS:php-pear-0:4.3.9-3.9.s390", "4AS:php-pear-0:4.3.9-3.9.s390x", "4AS:php-pear-0:4.3.9-3.9.x86_64", "4AS:php-pgsql-0:4.3.9-3.9.i386", "4AS:php-pgsql-0:4.3.9-3.9.ia64", "4AS:php-pgsql-0:4.3.9-3.9.ppc", "4AS:php-pgsql-0:4.3.9-3.9.s390", "4AS:php-pgsql-0:4.3.9-3.9.s390x", "4AS:php-pgsql-0:4.3.9-3.9.x86_64", "4AS:php-snmp-0:4.3.9-3.9.i386", "4AS:php-snmp-0:4.3.9-3.9.ia64", "4AS:php-snmp-0:4.3.9-3.9.ppc", "4AS:php-snmp-0:4.3.9-3.9.s390", "4AS:php-snmp-0:4.3.9-3.9.s390x", "4AS:php-snmp-0:4.3.9-3.9.x86_64", "4AS:php-xmlrpc-0:4.3.9-3.9.i386", "4AS:php-xmlrpc-0:4.3.9-3.9.ia64", "4AS:php-xmlrpc-0:4.3.9-3.9.ppc", "4AS:php-xmlrpc-0:4.3.9-3.9.s390", "4AS:php-xmlrpc-0:4.3.9-3.9.s390x", "4AS:php-xmlrpc-0:4.3.9-3.9.x86_64", "4Desktop:php-0:4.3.9-3.9.i386", "4Desktop:php-0:4.3.9-3.9.ia64", "4Desktop:php-0:4.3.9-3.9.ppc", "4Desktop:php-0:4.3.9-3.9.s390", "4Desktop:php-0:4.3.9-3.9.s390x", "4Desktop:php-0:4.3.9-3.9.src", "4Desktop:php-0:4.3.9-3.9.x86_64", "4Desktop:php-debuginfo-0:4.3.9-3.9.i386", "4Desktop:php-debuginfo-0:4.3.9-3.9.ia64", "4Desktop:php-debuginfo-0:4.3.9-3.9.ppc", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390x", "4Desktop:php-debuginfo-0:4.3.9-3.9.x86_64", "4Desktop:php-devel-0:4.3.9-3.9.i386", "4Desktop:php-devel-0:4.3.9-3.9.ia64", "4Desktop:php-devel-0:4.3.9-3.9.ppc", "4Desktop:php-devel-0:4.3.9-3.9.s390", "4Desktop:php-devel-0:4.3.9-3.9.s390x", "4Desktop:php-devel-0:4.3.9-3.9.x86_64", "4Desktop:php-domxml-0:4.3.9-3.9.i386", "4Desktop:php-domxml-0:4.3.9-3.9.ia64", "4Desktop:php-domxml-0:4.3.9-3.9.ppc", "4Desktop:php-domxml-0:4.3.9-3.9.s390", "4Desktop:php-domxml-0:4.3.9-3.9.s390x", "4Desktop:php-domxml-0:4.3.9-3.9.x86_64", "4Desktop:php-gd-0:4.3.9-3.9.i386", "4Desktop:php-gd-0:4.3.9-3.9.ia64", "4Desktop:php-gd-0:4.3.9-3.9.ppc", "4Desktop:php-gd-0:4.3.9-3.9.s390", "4Desktop:php-gd-0:4.3.9-3.9.s390x", "4Desktop:php-gd-0:4.3.9-3.9.x86_64", "4Desktop:php-imap-0:4.3.9-3.9.i386", "4Desktop:php-imap-0:4.3.9-3.9.ia64", "4Desktop:php-imap-0:4.3.9-3.9.ppc", "4Desktop:php-imap-0:4.3.9-3.9.s390", "4Desktop:php-imap-0:4.3.9-3.9.s390x", "4Desktop:php-imap-0:4.3.9-3.9.x86_64", "4Desktop:php-ldap-0:4.3.9-3.9.i386", "4Desktop:php-ldap-0:4.3.9-3.9.ia64", "4Desktop:php-ldap-0:4.3.9-3.9.ppc", "4Desktop:php-ldap-0:4.3.9-3.9.s390", "4Desktop:php-ldap-0:4.3.9-3.9.s390x", "4Desktop:php-ldap-0:4.3.9-3.9.x86_64", "4Desktop:php-mbstring-0:4.3.9-3.9.i386", "4Desktop:php-mbstring-0:4.3.9-3.9.ia64", "4Desktop:php-mbstring-0:4.3.9-3.9.ppc", "4Desktop:php-mbstring-0:4.3.9-3.9.s390", "4Desktop:php-mbstring-0:4.3.9-3.9.s390x", "4Desktop:php-mbstring-0:4.3.9-3.9.x86_64", "4Desktop:php-mysql-0:4.3.9-3.9.i386", "4Desktop:php-mysql-0:4.3.9-3.9.ia64", "4Desktop:php-mysql-0:4.3.9-3.9.ppc", "4Desktop:php-mysql-0:4.3.9-3.9.s390", "4Desktop:php-mysql-0:4.3.9-3.9.s390x", "4Desktop:php-mysql-0:4.3.9-3.9.x86_64", "4Desktop:php-ncurses-0:4.3.9-3.9.i386", "4Desktop:php-ncurses-0:4.3.9-3.9.ia64", "4Desktop:php-ncurses-0:4.3.9-3.9.ppc", "4Desktop:php-ncurses-0:4.3.9-3.9.s390", "4Desktop:php-ncurses-0:4.3.9-3.9.s390x", "4Desktop:php-ncurses-0:4.3.9-3.9.x86_64", "4Desktop:php-odbc-0:4.3.9-3.9.i386", "4Desktop:php-odbc-0:4.3.9-3.9.ia64", "4Desktop:php-odbc-0:4.3.9-3.9.ppc", "4Desktop:php-odbc-0:4.3.9-3.9.s390", "4Desktop:php-odbc-0:4.3.9-3.9.s390x", "4Desktop:php-odbc-0:4.3.9-3.9.x86_64", "4Desktop:php-pear-0:4.3.9-3.9.i386", "4Desktop:php-pear-0:4.3.9-3.9.ia64", "4Desktop:php-pear-0:4.3.9-3.9.ppc", "4Desktop:php-pear-0:4.3.9-3.9.s390", "4Desktop:php-pear-0:4.3.9-3.9.s390x", "4Desktop:php-pear-0:4.3.9-3.9.x86_64", "4Desktop:php-pgsql-0:4.3.9-3.9.i386", "4Desktop:php-pgsql-0:4.3.9-3.9.ia64", "4Desktop:php-pgsql-0:4.3.9-3.9.ppc", "4Desktop:php-pgsql-0:4.3.9-3.9.s390", "4Desktop:php-pgsql-0:4.3.9-3.9.s390x", "4Desktop:php-pgsql-0:4.3.9-3.9.x86_64", "4Desktop:php-snmp-0:4.3.9-3.9.i386", "4Desktop:php-snmp-0:4.3.9-3.9.ia64", "4Desktop:php-snmp-0:4.3.9-3.9.ppc", "4Desktop:php-snmp-0:4.3.9-3.9.s390", "4Desktop:php-snmp-0:4.3.9-3.9.s390x", "4Desktop:php-snmp-0:4.3.9-3.9.x86_64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.i386", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ia64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ppc", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390x", "4Desktop:php-xmlrpc-0:4.3.9-3.9.x86_64", "4ES:php-0:4.3.9-3.9.i386", "4ES:php-0:4.3.9-3.9.ia64", "4ES:php-0:4.3.9-3.9.ppc", "4ES:php-0:4.3.9-3.9.s390", "4ES:php-0:4.3.9-3.9.s390x", "4ES:php-0:4.3.9-3.9.src", "4ES:php-0:4.3.9-3.9.x86_64", "4ES:php-debuginfo-0:4.3.9-3.9.i386", "4ES:php-debuginfo-0:4.3.9-3.9.ia64", "4ES:php-debuginfo-0:4.3.9-3.9.ppc", "4ES:php-debuginfo-0:4.3.9-3.9.s390", "4ES:php-debuginfo-0:4.3.9-3.9.s390x", "4ES:php-debuginfo-0:4.3.9-3.9.x86_64", "4ES:php-devel-0:4.3.9-3.9.i386", "4ES:php-devel-0:4.3.9-3.9.ia64", "4ES:php-devel-0:4.3.9-3.9.ppc", "4ES:php-devel-0:4.3.9-3.9.s390", "4ES:php-devel-0:4.3.9-3.9.s390x", "4ES:php-devel-0:4.3.9-3.9.x86_64", "4ES:php-domxml-0:4.3.9-3.9.i386", "4ES:php-domxml-0:4.3.9-3.9.ia64", "4ES:php-domxml-0:4.3.9-3.9.ppc", "4ES:php-domxml-0:4.3.9-3.9.s390", "4ES:php-domxml-0:4.3.9-3.9.s390x", "4ES:php-domxml-0:4.3.9-3.9.x86_64", "4ES:php-gd-0:4.3.9-3.9.i386", "4ES:php-gd-0:4.3.9-3.9.ia64", "4ES:php-gd-0:4.3.9-3.9.ppc", "4ES:php-gd-0:4.3.9-3.9.s390", "4ES:php-gd-0:4.3.9-3.9.s390x", "4ES:php-gd-0:4.3.9-3.9.x86_64", "4ES:php-imap-0:4.3.9-3.9.i386", "4ES:php-imap-0:4.3.9-3.9.ia64", "4ES:php-imap-0:4.3.9-3.9.ppc", "4ES:php-imap-0:4.3.9-3.9.s390", "4ES:php-imap-0:4.3.9-3.9.s390x", "4ES:php-imap-0:4.3.9-3.9.x86_64", "4ES:php-ldap-0:4.3.9-3.9.i386", "4ES:php-ldap-0:4.3.9-3.9.ia64", "4ES:php-ldap-0:4.3.9-3.9.ppc", "4ES:php-ldap-0:4.3.9-3.9.s390", "4ES:php-ldap-0:4.3.9-3.9.s390x", "4ES:php-ldap-0:4.3.9-3.9.x86_64", "4ES:php-mbstring-0:4.3.9-3.9.i386", "4ES:php-mbstring-0:4.3.9-3.9.ia64", "4ES:php-mbstring-0:4.3.9-3.9.ppc", "4ES:php-mbstring-0:4.3.9-3.9.s390", "4ES:php-mbstring-0:4.3.9-3.9.s390x", "4ES:php-mbstring-0:4.3.9-3.9.x86_64", "4ES:php-mysql-0:4.3.9-3.9.i386", "4ES:php-mysql-0:4.3.9-3.9.ia64", "4ES:php-mysql-0:4.3.9-3.9.ppc", "4ES:php-mysql-0:4.3.9-3.9.s390", "4ES:php-mysql-0:4.3.9-3.9.s390x", "4ES:php-mysql-0:4.3.9-3.9.x86_64", "4ES:php-ncurses-0:4.3.9-3.9.i386", "4ES:php-ncurses-0:4.3.9-3.9.ia64", "4ES:php-ncurses-0:4.3.9-3.9.ppc", "4ES:php-ncurses-0:4.3.9-3.9.s390", "4ES:php-ncurses-0:4.3.9-3.9.s390x", "4ES:php-ncurses-0:4.3.9-3.9.x86_64", "4ES:php-odbc-0:4.3.9-3.9.i386", "4ES:php-odbc-0:4.3.9-3.9.ia64", "4ES:php-odbc-0:4.3.9-3.9.ppc", "4ES:php-odbc-0:4.3.9-3.9.s390", "4ES:php-odbc-0:4.3.9-3.9.s390x", "4ES:php-odbc-0:4.3.9-3.9.x86_64", "4ES:php-pear-0:4.3.9-3.9.i386", "4ES:php-pear-0:4.3.9-3.9.ia64", "4ES:php-pear-0:4.3.9-3.9.ppc", "4ES:php-pear-0:4.3.9-3.9.s390", "4ES:php-pear-0:4.3.9-3.9.s390x", "4ES:php-pear-0:4.3.9-3.9.x86_64", "4ES:php-pgsql-0:4.3.9-3.9.i386", "4ES:php-pgsql-0:4.3.9-3.9.ia64", "4ES:php-pgsql-0:4.3.9-3.9.ppc", "4ES:php-pgsql-0:4.3.9-3.9.s390", "4ES:php-pgsql-0:4.3.9-3.9.s390x", "4ES:php-pgsql-0:4.3.9-3.9.x86_64", "4ES:php-snmp-0:4.3.9-3.9.i386", "4ES:php-snmp-0:4.3.9-3.9.ia64", "4ES:php-snmp-0:4.3.9-3.9.ppc", "4ES:php-snmp-0:4.3.9-3.9.s390", "4ES:php-snmp-0:4.3.9-3.9.s390x", "4ES:php-snmp-0:4.3.9-3.9.x86_64", "4ES:php-xmlrpc-0:4.3.9-3.9.i386", "4ES:php-xmlrpc-0:4.3.9-3.9.ia64", "4ES:php-xmlrpc-0:4.3.9-3.9.ppc", "4ES:php-xmlrpc-0:4.3.9-3.9.s390", "4ES:php-xmlrpc-0:4.3.9-3.9.s390x", "4ES:php-xmlrpc-0:4.3.9-3.9.x86_64", "4WS:php-0:4.3.9-3.9.i386", "4WS:php-0:4.3.9-3.9.ia64", "4WS:php-0:4.3.9-3.9.ppc", "4WS:php-0:4.3.9-3.9.s390", "4WS:php-0:4.3.9-3.9.s390x", "4WS:php-0:4.3.9-3.9.src", "4WS:php-0:4.3.9-3.9.x86_64", "4WS:php-debuginfo-0:4.3.9-3.9.i386", "4WS:php-debuginfo-0:4.3.9-3.9.ia64", "4WS:php-debuginfo-0:4.3.9-3.9.ppc", "4WS:php-debuginfo-0:4.3.9-3.9.s390", "4WS:php-debuginfo-0:4.3.9-3.9.s390x", "4WS:php-debuginfo-0:4.3.9-3.9.x86_64", "4WS:php-devel-0:4.3.9-3.9.i386", "4WS:php-devel-0:4.3.9-3.9.ia64", "4WS:php-devel-0:4.3.9-3.9.ppc", "4WS:php-devel-0:4.3.9-3.9.s390", "4WS:php-devel-0:4.3.9-3.9.s390x", "4WS:php-devel-0:4.3.9-3.9.x86_64", "4WS:php-domxml-0:4.3.9-3.9.i386", "4WS:php-domxml-0:4.3.9-3.9.ia64", "4WS:php-domxml-0:4.3.9-3.9.ppc", "4WS:php-domxml-0:4.3.9-3.9.s390", "4WS:php-domxml-0:4.3.9-3.9.s390x", "4WS:php-domxml-0:4.3.9-3.9.x86_64", "4WS:php-gd-0:4.3.9-3.9.i386", "4WS:php-gd-0:4.3.9-3.9.ia64", "4WS:php-gd-0:4.3.9-3.9.ppc", "4WS:php-gd-0:4.3.9-3.9.s390", "4WS:php-gd-0:4.3.9-3.9.s390x", "4WS:php-gd-0:4.3.9-3.9.x86_64", "4WS:php-imap-0:4.3.9-3.9.i386", "4WS:php-imap-0:4.3.9-3.9.ia64", "4WS:php-imap-0:4.3.9-3.9.ppc", "4WS:php-imap-0:4.3.9-3.9.s390", "4WS:php-imap-0:4.3.9-3.9.s390x", "4WS:php-imap-0:4.3.9-3.9.x86_64", "4WS:php-ldap-0:4.3.9-3.9.i386", "4WS:php-ldap-0:4.3.9-3.9.ia64", "4WS:php-ldap-0:4.3.9-3.9.ppc", "4WS:php-ldap-0:4.3.9-3.9.s390", "4WS:php-ldap-0:4.3.9-3.9.s390x", "4WS:php-ldap-0:4.3.9-3.9.x86_64", "4WS:php-mbstring-0:4.3.9-3.9.i386", "4WS:php-mbstring-0:4.3.9-3.9.ia64", "4WS:php-mbstring-0:4.3.9-3.9.ppc", "4WS:php-mbstring-0:4.3.9-3.9.s390", "4WS:php-mbstring-0:4.3.9-3.9.s390x", "4WS:php-mbstring-0:4.3.9-3.9.x86_64", "4WS:php-mysql-0:4.3.9-3.9.i386", "4WS:php-mysql-0:4.3.9-3.9.ia64", "4WS:php-mysql-0:4.3.9-3.9.ppc", "4WS:php-mysql-0:4.3.9-3.9.s390", "4WS:php-mysql-0:4.3.9-3.9.s390x", "4WS:php-mysql-0:4.3.9-3.9.x86_64", "4WS:php-ncurses-0:4.3.9-3.9.i386", "4WS:php-ncurses-0:4.3.9-3.9.ia64", "4WS:php-ncurses-0:4.3.9-3.9.ppc", "4WS:php-ncurses-0:4.3.9-3.9.s390", "4WS:php-ncurses-0:4.3.9-3.9.s390x", "4WS:php-ncurses-0:4.3.9-3.9.x86_64", "4WS:php-odbc-0:4.3.9-3.9.i386", "4WS:php-odbc-0:4.3.9-3.9.ia64", "4WS:php-odbc-0:4.3.9-3.9.ppc", "4WS:php-odbc-0:4.3.9-3.9.s390", "4WS:php-odbc-0:4.3.9-3.9.s390x", "4WS:php-odbc-0:4.3.9-3.9.x86_64", "4WS:php-pear-0:4.3.9-3.9.i386", "4WS:php-pear-0:4.3.9-3.9.ia64", "4WS:php-pear-0:4.3.9-3.9.ppc", "4WS:php-pear-0:4.3.9-3.9.s390", "4WS:php-pear-0:4.3.9-3.9.s390x", "4WS:php-pear-0:4.3.9-3.9.x86_64", "4WS:php-pgsql-0:4.3.9-3.9.i386", "4WS:php-pgsql-0:4.3.9-3.9.ia64", "4WS:php-pgsql-0:4.3.9-3.9.ppc", "4WS:php-pgsql-0:4.3.9-3.9.s390", "4WS:php-pgsql-0:4.3.9-3.9.s390x", "4WS:php-pgsql-0:4.3.9-3.9.x86_64", "4WS:php-snmp-0:4.3.9-3.9.i386", "4WS:php-snmp-0:4.3.9-3.9.ia64", "4WS:php-snmp-0:4.3.9-3.9.ppc", "4WS:php-snmp-0:4.3.9-3.9.s390", "4WS:php-snmp-0:4.3.9-3.9.s390x", "4WS:php-snmp-0:4.3.9-3.9.x86_64", "4WS:php-xmlrpc-0:4.3.9-3.9.i386", "4WS:php-xmlrpc-0:4.3.9-3.9.ia64", "4WS:php-xmlrpc-0:4.3.9-3.9.ppc", "4WS:php-xmlrpc-0:4.3.9-3.9.s390", "4WS:php-xmlrpc-0:4.3.9-3.9.s390x", "4WS:php-xmlrpc-0:4.3.9-3.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3353" }, { "category": "external", "summary": "RHBZ#1617816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617816" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3353", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3353" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3353", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3353" } ], "release_date": "2005-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-11-10T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:php-0:4.3.2-26.ent.i386", "3AS:php-0:4.3.2-26.ent.ia64", "3AS:php-0:4.3.2-26.ent.ppc", "3AS:php-0:4.3.2-26.ent.s390", "3AS:php-0:4.3.2-26.ent.s390x", "3AS:php-0:4.3.2-26.ent.src", "3AS:php-0:4.3.2-26.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-26.ent.i386", "3AS:php-debuginfo-0:4.3.2-26.ent.ia64", "3AS:php-debuginfo-0:4.3.2-26.ent.ppc", "3AS:php-debuginfo-0:4.3.2-26.ent.s390", "3AS:php-debuginfo-0:4.3.2-26.ent.s390x", "3AS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3AS:php-devel-0:4.3.2-26.ent.i386", "3AS:php-devel-0:4.3.2-26.ent.ia64", "3AS:php-devel-0:4.3.2-26.ent.ppc", "3AS:php-devel-0:4.3.2-26.ent.s390", "3AS:php-devel-0:4.3.2-26.ent.s390x", "3AS:php-devel-0:4.3.2-26.ent.x86_64", "3AS:php-imap-0:4.3.2-26.ent.i386", "3AS:php-imap-0:4.3.2-26.ent.ia64", "3AS:php-imap-0:4.3.2-26.ent.ppc", "3AS:php-imap-0:4.3.2-26.ent.s390", "3AS:php-imap-0:4.3.2-26.ent.s390x", "3AS:php-imap-0:4.3.2-26.ent.x86_64", "3AS:php-ldap-0:4.3.2-26.ent.i386", "3AS:php-ldap-0:4.3.2-26.ent.ia64", "3AS:php-ldap-0:4.3.2-26.ent.ppc", "3AS:php-ldap-0:4.3.2-26.ent.s390", "3AS:php-ldap-0:4.3.2-26.ent.s390x", "3AS:php-ldap-0:4.3.2-26.ent.x86_64", "3AS:php-mysql-0:4.3.2-26.ent.i386", "3AS:php-mysql-0:4.3.2-26.ent.ia64", "3AS:php-mysql-0:4.3.2-26.ent.ppc", "3AS:php-mysql-0:4.3.2-26.ent.s390", "3AS:php-mysql-0:4.3.2-26.ent.s390x", "3AS:php-mysql-0:4.3.2-26.ent.x86_64", "3AS:php-odbc-0:4.3.2-26.ent.i386", "3AS:php-odbc-0:4.3.2-26.ent.ia64", "3AS:php-odbc-0:4.3.2-26.ent.ppc", "3AS:php-odbc-0:4.3.2-26.ent.s390", "3AS:php-odbc-0:4.3.2-26.ent.s390x", "3AS:php-odbc-0:4.3.2-26.ent.x86_64", "3AS:php-pgsql-0:4.3.2-26.ent.i386", "3AS:php-pgsql-0:4.3.2-26.ent.ia64", "3AS:php-pgsql-0:4.3.2-26.ent.ppc", "3AS:php-pgsql-0:4.3.2-26.ent.s390", "3AS:php-pgsql-0:4.3.2-26.ent.s390x", "3AS:php-pgsql-0:4.3.2-26.ent.x86_64", "3Desktop:php-0:4.3.2-26.ent.i386", "3Desktop:php-0:4.3.2-26.ent.ia64", "3Desktop:php-0:4.3.2-26.ent.ppc", "3Desktop:php-0:4.3.2-26.ent.s390", "3Desktop:php-0:4.3.2-26.ent.s390x", "3Desktop:php-0:4.3.2-26.ent.src", "3Desktop:php-0:4.3.2-26.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-26.ent.x86_64", "3Desktop:php-devel-0:4.3.2-26.ent.i386", "3Desktop:php-devel-0:4.3.2-26.ent.ia64", "3Desktop:php-devel-0:4.3.2-26.ent.ppc", "3Desktop:php-devel-0:4.3.2-26.ent.s390", "3Desktop:php-devel-0:4.3.2-26.ent.s390x", "3Desktop:php-devel-0:4.3.2-26.ent.x86_64", "3Desktop:php-imap-0:4.3.2-26.ent.i386", "3Desktop:php-imap-0:4.3.2-26.ent.ia64", "3Desktop:php-imap-0:4.3.2-26.ent.ppc", "3Desktop:php-imap-0:4.3.2-26.ent.s390", "3Desktop:php-imap-0:4.3.2-26.ent.s390x", "3Desktop:php-imap-0:4.3.2-26.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-26.ent.i386", "3Desktop:php-ldap-0:4.3.2-26.ent.ia64", "3Desktop:php-ldap-0:4.3.2-26.ent.ppc", "3Desktop:php-ldap-0:4.3.2-26.ent.s390", "3Desktop:php-ldap-0:4.3.2-26.ent.s390x", "3Desktop:php-ldap-0:4.3.2-26.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-26.ent.i386", "3Desktop:php-mysql-0:4.3.2-26.ent.ia64", "3Desktop:php-mysql-0:4.3.2-26.ent.ppc", "3Desktop:php-mysql-0:4.3.2-26.ent.s390", "3Desktop:php-mysql-0:4.3.2-26.ent.s390x", "3Desktop:php-mysql-0:4.3.2-26.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-26.ent.i386", "3Desktop:php-odbc-0:4.3.2-26.ent.ia64", "3Desktop:php-odbc-0:4.3.2-26.ent.ppc", "3Desktop:php-odbc-0:4.3.2-26.ent.s390", "3Desktop:php-odbc-0:4.3.2-26.ent.s390x", "3Desktop:php-odbc-0:4.3.2-26.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-26.ent.i386", "3Desktop:php-pgsql-0:4.3.2-26.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-26.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-26.ent.x86_64", "3ES:php-0:4.3.2-26.ent.i386", "3ES:php-0:4.3.2-26.ent.ia64", "3ES:php-0:4.3.2-26.ent.ppc", "3ES:php-0:4.3.2-26.ent.s390", "3ES:php-0:4.3.2-26.ent.s390x", "3ES:php-0:4.3.2-26.ent.src", "3ES:php-0:4.3.2-26.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-26.ent.i386", "3ES:php-debuginfo-0:4.3.2-26.ent.ia64", "3ES:php-debuginfo-0:4.3.2-26.ent.ppc", "3ES:php-debuginfo-0:4.3.2-26.ent.s390", "3ES:php-debuginfo-0:4.3.2-26.ent.s390x", "3ES:php-debuginfo-0:4.3.2-26.ent.x86_64", "3ES:php-devel-0:4.3.2-26.ent.i386", "3ES:php-devel-0:4.3.2-26.ent.ia64", "3ES:php-devel-0:4.3.2-26.ent.ppc", "3ES:php-devel-0:4.3.2-26.ent.s390", "3ES:php-devel-0:4.3.2-26.ent.s390x", "3ES:php-devel-0:4.3.2-26.ent.x86_64", "3ES:php-imap-0:4.3.2-26.ent.i386", "3ES:php-imap-0:4.3.2-26.ent.ia64", "3ES:php-imap-0:4.3.2-26.ent.ppc", "3ES:php-imap-0:4.3.2-26.ent.s390", "3ES:php-imap-0:4.3.2-26.ent.s390x", "3ES:php-imap-0:4.3.2-26.ent.x86_64", "3ES:php-ldap-0:4.3.2-26.ent.i386", "3ES:php-ldap-0:4.3.2-26.ent.ia64", "3ES:php-ldap-0:4.3.2-26.ent.ppc", "3ES:php-ldap-0:4.3.2-26.ent.s390", "3ES:php-ldap-0:4.3.2-26.ent.s390x", "3ES:php-ldap-0:4.3.2-26.ent.x86_64", "3ES:php-mysql-0:4.3.2-26.ent.i386", "3ES:php-mysql-0:4.3.2-26.ent.ia64", "3ES:php-mysql-0:4.3.2-26.ent.ppc", "3ES:php-mysql-0:4.3.2-26.ent.s390", "3ES:php-mysql-0:4.3.2-26.ent.s390x", "3ES:php-mysql-0:4.3.2-26.ent.x86_64", "3ES:php-odbc-0:4.3.2-26.ent.i386", "3ES:php-odbc-0:4.3.2-26.ent.ia64", "3ES:php-odbc-0:4.3.2-26.ent.ppc", "3ES:php-odbc-0:4.3.2-26.ent.s390", "3ES:php-odbc-0:4.3.2-26.ent.s390x", "3ES:php-odbc-0:4.3.2-26.ent.x86_64", "3ES:php-pgsql-0:4.3.2-26.ent.i386", "3ES:php-pgsql-0:4.3.2-26.ent.ia64", "3ES:php-pgsql-0:4.3.2-26.ent.ppc", "3ES:php-pgsql-0:4.3.2-26.ent.s390", "3ES:php-pgsql-0:4.3.2-26.ent.s390x", "3ES:php-pgsql-0:4.3.2-26.ent.x86_64", "3WS:php-0:4.3.2-26.ent.i386", "3WS:php-0:4.3.2-26.ent.ia64", "3WS:php-0:4.3.2-26.ent.ppc", "3WS:php-0:4.3.2-26.ent.s390", "3WS:php-0:4.3.2-26.ent.s390x", "3WS:php-0:4.3.2-26.ent.src", "3WS:php-0:4.3.2-26.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-26.ent.i386", "3WS:php-debuginfo-0:4.3.2-26.ent.ia64", "3WS:php-debuginfo-0:4.3.2-26.ent.ppc", "3WS:php-debuginfo-0:4.3.2-26.ent.s390", "3WS:php-debuginfo-0:4.3.2-26.ent.s390x", "3WS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3WS:php-devel-0:4.3.2-26.ent.i386", "3WS:php-devel-0:4.3.2-26.ent.ia64", "3WS:php-devel-0:4.3.2-26.ent.ppc", "3WS:php-devel-0:4.3.2-26.ent.s390", "3WS:php-devel-0:4.3.2-26.ent.s390x", "3WS:php-devel-0:4.3.2-26.ent.x86_64", "3WS:php-imap-0:4.3.2-26.ent.i386", "3WS:php-imap-0:4.3.2-26.ent.ia64", "3WS:php-imap-0:4.3.2-26.ent.ppc", "3WS:php-imap-0:4.3.2-26.ent.s390", "3WS:php-imap-0:4.3.2-26.ent.s390x", "3WS:php-imap-0:4.3.2-26.ent.x86_64", "3WS:php-ldap-0:4.3.2-26.ent.i386", "3WS:php-ldap-0:4.3.2-26.ent.ia64", "3WS:php-ldap-0:4.3.2-26.ent.ppc", "3WS:php-ldap-0:4.3.2-26.ent.s390", "3WS:php-ldap-0:4.3.2-26.ent.s390x", "3WS:php-ldap-0:4.3.2-26.ent.x86_64", "3WS:php-mysql-0:4.3.2-26.ent.i386", "3WS:php-mysql-0:4.3.2-26.ent.ia64", "3WS:php-mysql-0:4.3.2-26.ent.ppc", "3WS:php-mysql-0:4.3.2-26.ent.s390", "3WS:php-mysql-0:4.3.2-26.ent.s390x", "3WS:php-mysql-0:4.3.2-26.ent.x86_64", "3WS:php-odbc-0:4.3.2-26.ent.i386", "3WS:php-odbc-0:4.3.2-26.ent.ia64", "3WS:php-odbc-0:4.3.2-26.ent.ppc", "3WS:php-odbc-0:4.3.2-26.ent.s390", "3WS:php-odbc-0:4.3.2-26.ent.s390x", "3WS:php-odbc-0:4.3.2-26.ent.x86_64", "3WS:php-pgsql-0:4.3.2-26.ent.i386", "3WS:php-pgsql-0:4.3.2-26.ent.ia64", "3WS:php-pgsql-0:4.3.2-26.ent.ppc", "3WS:php-pgsql-0:4.3.2-26.ent.s390", "3WS:php-pgsql-0:4.3.2-26.ent.s390x", "3WS:php-pgsql-0:4.3.2-26.ent.x86_64", "4AS:php-0:4.3.9-3.9.i386", "4AS:php-0:4.3.9-3.9.ia64", "4AS:php-0:4.3.9-3.9.ppc", "4AS:php-0:4.3.9-3.9.s390", "4AS:php-0:4.3.9-3.9.s390x", "4AS:php-0:4.3.9-3.9.src", "4AS:php-0:4.3.9-3.9.x86_64", "4AS:php-debuginfo-0:4.3.9-3.9.i386", "4AS:php-debuginfo-0:4.3.9-3.9.ia64", "4AS:php-debuginfo-0:4.3.9-3.9.ppc", "4AS:php-debuginfo-0:4.3.9-3.9.s390", "4AS:php-debuginfo-0:4.3.9-3.9.s390x", "4AS:php-debuginfo-0:4.3.9-3.9.x86_64", "4AS:php-devel-0:4.3.9-3.9.i386", "4AS:php-devel-0:4.3.9-3.9.ia64", "4AS:php-devel-0:4.3.9-3.9.ppc", "4AS:php-devel-0:4.3.9-3.9.s390", "4AS:php-devel-0:4.3.9-3.9.s390x", "4AS:php-devel-0:4.3.9-3.9.x86_64", "4AS:php-domxml-0:4.3.9-3.9.i386", "4AS:php-domxml-0:4.3.9-3.9.ia64", "4AS:php-domxml-0:4.3.9-3.9.ppc", "4AS:php-domxml-0:4.3.9-3.9.s390", "4AS:php-domxml-0:4.3.9-3.9.s390x", "4AS:php-domxml-0:4.3.9-3.9.x86_64", "4AS:php-gd-0:4.3.9-3.9.i386", "4AS:php-gd-0:4.3.9-3.9.ia64", "4AS:php-gd-0:4.3.9-3.9.ppc", "4AS:php-gd-0:4.3.9-3.9.s390", "4AS:php-gd-0:4.3.9-3.9.s390x", "4AS:php-gd-0:4.3.9-3.9.x86_64", "4AS:php-imap-0:4.3.9-3.9.i386", "4AS:php-imap-0:4.3.9-3.9.ia64", "4AS:php-imap-0:4.3.9-3.9.ppc", "4AS:php-imap-0:4.3.9-3.9.s390", "4AS:php-imap-0:4.3.9-3.9.s390x", "4AS:php-imap-0:4.3.9-3.9.x86_64", "4AS:php-ldap-0:4.3.9-3.9.i386", "4AS:php-ldap-0:4.3.9-3.9.ia64", "4AS:php-ldap-0:4.3.9-3.9.ppc", "4AS:php-ldap-0:4.3.9-3.9.s390", "4AS:php-ldap-0:4.3.9-3.9.s390x", "4AS:php-ldap-0:4.3.9-3.9.x86_64", "4AS:php-mbstring-0:4.3.9-3.9.i386", "4AS:php-mbstring-0:4.3.9-3.9.ia64", "4AS:php-mbstring-0:4.3.9-3.9.ppc", "4AS:php-mbstring-0:4.3.9-3.9.s390", "4AS:php-mbstring-0:4.3.9-3.9.s390x", "4AS:php-mbstring-0:4.3.9-3.9.x86_64", "4AS:php-mysql-0:4.3.9-3.9.i386", "4AS:php-mysql-0:4.3.9-3.9.ia64", "4AS:php-mysql-0:4.3.9-3.9.ppc", "4AS:php-mysql-0:4.3.9-3.9.s390", "4AS:php-mysql-0:4.3.9-3.9.s390x", "4AS:php-mysql-0:4.3.9-3.9.x86_64", "4AS:php-ncurses-0:4.3.9-3.9.i386", "4AS:php-ncurses-0:4.3.9-3.9.ia64", "4AS:php-ncurses-0:4.3.9-3.9.ppc", "4AS:php-ncurses-0:4.3.9-3.9.s390", "4AS:php-ncurses-0:4.3.9-3.9.s390x", "4AS:php-ncurses-0:4.3.9-3.9.x86_64", "4AS:php-odbc-0:4.3.9-3.9.i386", "4AS:php-odbc-0:4.3.9-3.9.ia64", "4AS:php-odbc-0:4.3.9-3.9.ppc", "4AS:php-odbc-0:4.3.9-3.9.s390", "4AS:php-odbc-0:4.3.9-3.9.s390x", "4AS:php-odbc-0:4.3.9-3.9.x86_64", "4AS:php-pear-0:4.3.9-3.9.i386", "4AS:php-pear-0:4.3.9-3.9.ia64", "4AS:php-pear-0:4.3.9-3.9.ppc", "4AS:php-pear-0:4.3.9-3.9.s390", "4AS:php-pear-0:4.3.9-3.9.s390x", "4AS:php-pear-0:4.3.9-3.9.x86_64", "4AS:php-pgsql-0:4.3.9-3.9.i386", "4AS:php-pgsql-0:4.3.9-3.9.ia64", "4AS:php-pgsql-0:4.3.9-3.9.ppc", "4AS:php-pgsql-0:4.3.9-3.9.s390", "4AS:php-pgsql-0:4.3.9-3.9.s390x", "4AS:php-pgsql-0:4.3.9-3.9.x86_64", "4AS:php-snmp-0:4.3.9-3.9.i386", "4AS:php-snmp-0:4.3.9-3.9.ia64", "4AS:php-snmp-0:4.3.9-3.9.ppc", "4AS:php-snmp-0:4.3.9-3.9.s390", "4AS:php-snmp-0:4.3.9-3.9.s390x", "4AS:php-snmp-0:4.3.9-3.9.x86_64", "4AS:php-xmlrpc-0:4.3.9-3.9.i386", "4AS:php-xmlrpc-0:4.3.9-3.9.ia64", "4AS:php-xmlrpc-0:4.3.9-3.9.ppc", "4AS:php-xmlrpc-0:4.3.9-3.9.s390", "4AS:php-xmlrpc-0:4.3.9-3.9.s390x", "4AS:php-xmlrpc-0:4.3.9-3.9.x86_64", "4Desktop:php-0:4.3.9-3.9.i386", "4Desktop:php-0:4.3.9-3.9.ia64", "4Desktop:php-0:4.3.9-3.9.ppc", "4Desktop:php-0:4.3.9-3.9.s390", "4Desktop:php-0:4.3.9-3.9.s390x", "4Desktop:php-0:4.3.9-3.9.src", "4Desktop:php-0:4.3.9-3.9.x86_64", "4Desktop:php-debuginfo-0:4.3.9-3.9.i386", "4Desktop:php-debuginfo-0:4.3.9-3.9.ia64", "4Desktop:php-debuginfo-0:4.3.9-3.9.ppc", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390x", "4Desktop:php-debuginfo-0:4.3.9-3.9.x86_64", "4Desktop:php-devel-0:4.3.9-3.9.i386", "4Desktop:php-devel-0:4.3.9-3.9.ia64", "4Desktop:php-devel-0:4.3.9-3.9.ppc", "4Desktop:php-devel-0:4.3.9-3.9.s390", "4Desktop:php-devel-0:4.3.9-3.9.s390x", "4Desktop:php-devel-0:4.3.9-3.9.x86_64", "4Desktop:php-domxml-0:4.3.9-3.9.i386", "4Desktop:php-domxml-0:4.3.9-3.9.ia64", "4Desktop:php-domxml-0:4.3.9-3.9.ppc", "4Desktop:php-domxml-0:4.3.9-3.9.s390", "4Desktop:php-domxml-0:4.3.9-3.9.s390x", "4Desktop:php-domxml-0:4.3.9-3.9.x86_64", "4Desktop:php-gd-0:4.3.9-3.9.i386", "4Desktop:php-gd-0:4.3.9-3.9.ia64", "4Desktop:php-gd-0:4.3.9-3.9.ppc", "4Desktop:php-gd-0:4.3.9-3.9.s390", "4Desktop:php-gd-0:4.3.9-3.9.s390x", "4Desktop:php-gd-0:4.3.9-3.9.x86_64", "4Desktop:php-imap-0:4.3.9-3.9.i386", "4Desktop:php-imap-0:4.3.9-3.9.ia64", "4Desktop:php-imap-0:4.3.9-3.9.ppc", "4Desktop:php-imap-0:4.3.9-3.9.s390", "4Desktop:php-imap-0:4.3.9-3.9.s390x", "4Desktop:php-imap-0:4.3.9-3.9.x86_64", "4Desktop:php-ldap-0:4.3.9-3.9.i386", "4Desktop:php-ldap-0:4.3.9-3.9.ia64", "4Desktop:php-ldap-0:4.3.9-3.9.ppc", "4Desktop:php-ldap-0:4.3.9-3.9.s390", "4Desktop:php-ldap-0:4.3.9-3.9.s390x", "4Desktop:php-ldap-0:4.3.9-3.9.x86_64", "4Desktop:php-mbstring-0:4.3.9-3.9.i386", "4Desktop:php-mbstring-0:4.3.9-3.9.ia64", "4Desktop:php-mbstring-0:4.3.9-3.9.ppc", "4Desktop:php-mbstring-0:4.3.9-3.9.s390", "4Desktop:php-mbstring-0:4.3.9-3.9.s390x", "4Desktop:php-mbstring-0:4.3.9-3.9.x86_64", "4Desktop:php-mysql-0:4.3.9-3.9.i386", "4Desktop:php-mysql-0:4.3.9-3.9.ia64", "4Desktop:php-mysql-0:4.3.9-3.9.ppc", "4Desktop:php-mysql-0:4.3.9-3.9.s390", "4Desktop:php-mysql-0:4.3.9-3.9.s390x", "4Desktop:php-mysql-0:4.3.9-3.9.x86_64", "4Desktop:php-ncurses-0:4.3.9-3.9.i386", "4Desktop:php-ncurses-0:4.3.9-3.9.ia64", "4Desktop:php-ncurses-0:4.3.9-3.9.ppc", "4Desktop:php-ncurses-0:4.3.9-3.9.s390", "4Desktop:php-ncurses-0:4.3.9-3.9.s390x", "4Desktop:php-ncurses-0:4.3.9-3.9.x86_64", "4Desktop:php-odbc-0:4.3.9-3.9.i386", "4Desktop:php-odbc-0:4.3.9-3.9.ia64", "4Desktop:php-odbc-0:4.3.9-3.9.ppc", "4Desktop:php-odbc-0:4.3.9-3.9.s390", "4Desktop:php-odbc-0:4.3.9-3.9.s390x", "4Desktop:php-odbc-0:4.3.9-3.9.x86_64", "4Desktop:php-pear-0:4.3.9-3.9.i386", "4Desktop:php-pear-0:4.3.9-3.9.ia64", "4Desktop:php-pear-0:4.3.9-3.9.ppc", "4Desktop:php-pear-0:4.3.9-3.9.s390", "4Desktop:php-pear-0:4.3.9-3.9.s390x", "4Desktop:php-pear-0:4.3.9-3.9.x86_64", "4Desktop:php-pgsql-0:4.3.9-3.9.i386", "4Desktop:php-pgsql-0:4.3.9-3.9.ia64", "4Desktop:php-pgsql-0:4.3.9-3.9.ppc", "4Desktop:php-pgsql-0:4.3.9-3.9.s390", "4Desktop:php-pgsql-0:4.3.9-3.9.s390x", "4Desktop:php-pgsql-0:4.3.9-3.9.x86_64", "4Desktop:php-snmp-0:4.3.9-3.9.i386", "4Desktop:php-snmp-0:4.3.9-3.9.ia64", "4Desktop:php-snmp-0:4.3.9-3.9.ppc", "4Desktop:php-snmp-0:4.3.9-3.9.s390", "4Desktop:php-snmp-0:4.3.9-3.9.s390x", "4Desktop:php-snmp-0:4.3.9-3.9.x86_64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.i386", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ia64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ppc", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390x", "4Desktop:php-xmlrpc-0:4.3.9-3.9.x86_64", "4ES:php-0:4.3.9-3.9.i386", "4ES:php-0:4.3.9-3.9.ia64", "4ES:php-0:4.3.9-3.9.ppc", "4ES:php-0:4.3.9-3.9.s390", "4ES:php-0:4.3.9-3.9.s390x", "4ES:php-0:4.3.9-3.9.src", "4ES:php-0:4.3.9-3.9.x86_64", "4ES:php-debuginfo-0:4.3.9-3.9.i386", "4ES:php-debuginfo-0:4.3.9-3.9.ia64", "4ES:php-debuginfo-0:4.3.9-3.9.ppc", "4ES:php-debuginfo-0:4.3.9-3.9.s390", "4ES:php-debuginfo-0:4.3.9-3.9.s390x", "4ES:php-debuginfo-0:4.3.9-3.9.x86_64", "4ES:php-devel-0:4.3.9-3.9.i386", "4ES:php-devel-0:4.3.9-3.9.ia64", "4ES:php-devel-0:4.3.9-3.9.ppc", "4ES:php-devel-0:4.3.9-3.9.s390", "4ES:php-devel-0:4.3.9-3.9.s390x", "4ES:php-devel-0:4.3.9-3.9.x86_64", "4ES:php-domxml-0:4.3.9-3.9.i386", "4ES:php-domxml-0:4.3.9-3.9.ia64", "4ES:php-domxml-0:4.3.9-3.9.ppc", "4ES:php-domxml-0:4.3.9-3.9.s390", "4ES:php-domxml-0:4.3.9-3.9.s390x", "4ES:php-domxml-0:4.3.9-3.9.x86_64", "4ES:php-gd-0:4.3.9-3.9.i386", "4ES:php-gd-0:4.3.9-3.9.ia64", "4ES:php-gd-0:4.3.9-3.9.ppc", "4ES:php-gd-0:4.3.9-3.9.s390", "4ES:php-gd-0:4.3.9-3.9.s390x", "4ES:php-gd-0:4.3.9-3.9.x86_64", "4ES:php-imap-0:4.3.9-3.9.i386", "4ES:php-imap-0:4.3.9-3.9.ia64", "4ES:php-imap-0:4.3.9-3.9.ppc", "4ES:php-imap-0:4.3.9-3.9.s390", "4ES:php-imap-0:4.3.9-3.9.s390x", "4ES:php-imap-0:4.3.9-3.9.x86_64", "4ES:php-ldap-0:4.3.9-3.9.i386", "4ES:php-ldap-0:4.3.9-3.9.ia64", "4ES:php-ldap-0:4.3.9-3.9.ppc", "4ES:php-ldap-0:4.3.9-3.9.s390", "4ES:php-ldap-0:4.3.9-3.9.s390x", "4ES:php-ldap-0:4.3.9-3.9.x86_64", "4ES:php-mbstring-0:4.3.9-3.9.i386", "4ES:php-mbstring-0:4.3.9-3.9.ia64", "4ES:php-mbstring-0:4.3.9-3.9.ppc", "4ES:php-mbstring-0:4.3.9-3.9.s390", "4ES:php-mbstring-0:4.3.9-3.9.s390x", "4ES:php-mbstring-0:4.3.9-3.9.x86_64", "4ES:php-mysql-0:4.3.9-3.9.i386", "4ES:php-mysql-0:4.3.9-3.9.ia64", "4ES:php-mysql-0:4.3.9-3.9.ppc", "4ES:php-mysql-0:4.3.9-3.9.s390", "4ES:php-mysql-0:4.3.9-3.9.s390x", "4ES:php-mysql-0:4.3.9-3.9.x86_64", "4ES:php-ncurses-0:4.3.9-3.9.i386", "4ES:php-ncurses-0:4.3.9-3.9.ia64", "4ES:php-ncurses-0:4.3.9-3.9.ppc", "4ES:php-ncurses-0:4.3.9-3.9.s390", "4ES:php-ncurses-0:4.3.9-3.9.s390x", "4ES:php-ncurses-0:4.3.9-3.9.x86_64", "4ES:php-odbc-0:4.3.9-3.9.i386", "4ES:php-odbc-0:4.3.9-3.9.ia64", "4ES:php-odbc-0:4.3.9-3.9.ppc", "4ES:php-odbc-0:4.3.9-3.9.s390", "4ES:php-odbc-0:4.3.9-3.9.s390x", "4ES:php-odbc-0:4.3.9-3.9.x86_64", "4ES:php-pear-0:4.3.9-3.9.i386", "4ES:php-pear-0:4.3.9-3.9.ia64", "4ES:php-pear-0:4.3.9-3.9.ppc", "4ES:php-pear-0:4.3.9-3.9.s390", "4ES:php-pear-0:4.3.9-3.9.s390x", "4ES:php-pear-0:4.3.9-3.9.x86_64", "4ES:php-pgsql-0:4.3.9-3.9.i386", "4ES:php-pgsql-0:4.3.9-3.9.ia64", "4ES:php-pgsql-0:4.3.9-3.9.ppc", "4ES:php-pgsql-0:4.3.9-3.9.s390", "4ES:php-pgsql-0:4.3.9-3.9.s390x", "4ES:php-pgsql-0:4.3.9-3.9.x86_64", "4ES:php-snmp-0:4.3.9-3.9.i386", "4ES:php-snmp-0:4.3.9-3.9.ia64", "4ES:php-snmp-0:4.3.9-3.9.ppc", "4ES:php-snmp-0:4.3.9-3.9.s390", "4ES:php-snmp-0:4.3.9-3.9.s390x", "4ES:php-snmp-0:4.3.9-3.9.x86_64", "4ES:php-xmlrpc-0:4.3.9-3.9.i386", "4ES:php-xmlrpc-0:4.3.9-3.9.ia64", "4ES:php-xmlrpc-0:4.3.9-3.9.ppc", "4ES:php-xmlrpc-0:4.3.9-3.9.s390", "4ES:php-xmlrpc-0:4.3.9-3.9.s390x", "4ES:php-xmlrpc-0:4.3.9-3.9.x86_64", "4WS:php-0:4.3.9-3.9.i386", "4WS:php-0:4.3.9-3.9.ia64", "4WS:php-0:4.3.9-3.9.ppc", "4WS:php-0:4.3.9-3.9.s390", "4WS:php-0:4.3.9-3.9.s390x", "4WS:php-0:4.3.9-3.9.src", "4WS:php-0:4.3.9-3.9.x86_64", "4WS:php-debuginfo-0:4.3.9-3.9.i386", "4WS:php-debuginfo-0:4.3.9-3.9.ia64", "4WS:php-debuginfo-0:4.3.9-3.9.ppc", "4WS:php-debuginfo-0:4.3.9-3.9.s390", "4WS:php-debuginfo-0:4.3.9-3.9.s390x", "4WS:php-debuginfo-0:4.3.9-3.9.x86_64", "4WS:php-devel-0:4.3.9-3.9.i386", "4WS:php-devel-0:4.3.9-3.9.ia64", "4WS:php-devel-0:4.3.9-3.9.ppc", "4WS:php-devel-0:4.3.9-3.9.s390", "4WS:php-devel-0:4.3.9-3.9.s390x", "4WS:php-devel-0:4.3.9-3.9.x86_64", "4WS:php-domxml-0:4.3.9-3.9.i386", "4WS:php-domxml-0:4.3.9-3.9.ia64", "4WS:php-domxml-0:4.3.9-3.9.ppc", "4WS:php-domxml-0:4.3.9-3.9.s390", "4WS:php-domxml-0:4.3.9-3.9.s390x", "4WS:php-domxml-0:4.3.9-3.9.x86_64", "4WS:php-gd-0:4.3.9-3.9.i386", "4WS:php-gd-0:4.3.9-3.9.ia64", "4WS:php-gd-0:4.3.9-3.9.ppc", "4WS:php-gd-0:4.3.9-3.9.s390", "4WS:php-gd-0:4.3.9-3.9.s390x", "4WS:php-gd-0:4.3.9-3.9.x86_64", "4WS:php-imap-0:4.3.9-3.9.i386", "4WS:php-imap-0:4.3.9-3.9.ia64", "4WS:php-imap-0:4.3.9-3.9.ppc", "4WS:php-imap-0:4.3.9-3.9.s390", "4WS:php-imap-0:4.3.9-3.9.s390x", "4WS:php-imap-0:4.3.9-3.9.x86_64", "4WS:php-ldap-0:4.3.9-3.9.i386", "4WS:php-ldap-0:4.3.9-3.9.ia64", "4WS:php-ldap-0:4.3.9-3.9.ppc", "4WS:php-ldap-0:4.3.9-3.9.s390", "4WS:php-ldap-0:4.3.9-3.9.s390x", "4WS:php-ldap-0:4.3.9-3.9.x86_64", "4WS:php-mbstring-0:4.3.9-3.9.i386", "4WS:php-mbstring-0:4.3.9-3.9.ia64", "4WS:php-mbstring-0:4.3.9-3.9.ppc", "4WS:php-mbstring-0:4.3.9-3.9.s390", "4WS:php-mbstring-0:4.3.9-3.9.s390x", "4WS:php-mbstring-0:4.3.9-3.9.x86_64", "4WS:php-mysql-0:4.3.9-3.9.i386", "4WS:php-mysql-0:4.3.9-3.9.ia64", "4WS:php-mysql-0:4.3.9-3.9.ppc", "4WS:php-mysql-0:4.3.9-3.9.s390", "4WS:php-mysql-0:4.3.9-3.9.s390x", "4WS:php-mysql-0:4.3.9-3.9.x86_64", "4WS:php-ncurses-0:4.3.9-3.9.i386", "4WS:php-ncurses-0:4.3.9-3.9.ia64", "4WS:php-ncurses-0:4.3.9-3.9.ppc", "4WS:php-ncurses-0:4.3.9-3.9.s390", "4WS:php-ncurses-0:4.3.9-3.9.s390x", "4WS:php-ncurses-0:4.3.9-3.9.x86_64", "4WS:php-odbc-0:4.3.9-3.9.i386", "4WS:php-odbc-0:4.3.9-3.9.ia64", "4WS:php-odbc-0:4.3.9-3.9.ppc", "4WS:php-odbc-0:4.3.9-3.9.s390", "4WS:php-odbc-0:4.3.9-3.9.s390x", "4WS:php-odbc-0:4.3.9-3.9.x86_64", "4WS:php-pear-0:4.3.9-3.9.i386", "4WS:php-pear-0:4.3.9-3.9.ia64", "4WS:php-pear-0:4.3.9-3.9.ppc", "4WS:php-pear-0:4.3.9-3.9.s390", "4WS:php-pear-0:4.3.9-3.9.s390x", "4WS:php-pear-0:4.3.9-3.9.x86_64", "4WS:php-pgsql-0:4.3.9-3.9.i386", "4WS:php-pgsql-0:4.3.9-3.9.ia64", "4WS:php-pgsql-0:4.3.9-3.9.ppc", "4WS:php-pgsql-0:4.3.9-3.9.s390", "4WS:php-pgsql-0:4.3.9-3.9.s390x", "4WS:php-pgsql-0:4.3.9-3.9.x86_64", "4WS:php-snmp-0:4.3.9-3.9.i386", "4WS:php-snmp-0:4.3.9-3.9.ia64", "4WS:php-snmp-0:4.3.9-3.9.ppc", "4WS:php-snmp-0:4.3.9-3.9.s390", "4WS:php-snmp-0:4.3.9-3.9.s390x", "4WS:php-snmp-0:4.3.9-3.9.x86_64", "4WS:php-xmlrpc-0:4.3.9-3.9.i386", "4WS:php-xmlrpc-0:4.3.9-3.9.ia64", "4WS:php-xmlrpc-0:4.3.9-3.9.ppc", "4WS:php-xmlrpc-0:4.3.9-3.9.s390", "4WS:php-xmlrpc-0:4.3.9-3.9.s390x", "4WS:php-xmlrpc-0:4.3.9-3.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:831" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-3388", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617821" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a \"stacked array assignment.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:php-0:4.3.2-26.ent.i386", "3AS:php-0:4.3.2-26.ent.ia64", "3AS:php-0:4.3.2-26.ent.ppc", "3AS:php-0:4.3.2-26.ent.s390", "3AS:php-0:4.3.2-26.ent.s390x", "3AS:php-0:4.3.2-26.ent.src", "3AS:php-0:4.3.2-26.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-26.ent.i386", "3AS:php-debuginfo-0:4.3.2-26.ent.ia64", "3AS:php-debuginfo-0:4.3.2-26.ent.ppc", "3AS:php-debuginfo-0:4.3.2-26.ent.s390", "3AS:php-debuginfo-0:4.3.2-26.ent.s390x", "3AS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3AS:php-devel-0:4.3.2-26.ent.i386", "3AS:php-devel-0:4.3.2-26.ent.ia64", "3AS:php-devel-0:4.3.2-26.ent.ppc", "3AS:php-devel-0:4.3.2-26.ent.s390", "3AS:php-devel-0:4.3.2-26.ent.s390x", "3AS:php-devel-0:4.3.2-26.ent.x86_64", "3AS:php-imap-0:4.3.2-26.ent.i386", "3AS:php-imap-0:4.3.2-26.ent.ia64", "3AS:php-imap-0:4.3.2-26.ent.ppc", "3AS:php-imap-0:4.3.2-26.ent.s390", "3AS:php-imap-0:4.3.2-26.ent.s390x", "3AS:php-imap-0:4.3.2-26.ent.x86_64", "3AS:php-ldap-0:4.3.2-26.ent.i386", "3AS:php-ldap-0:4.3.2-26.ent.ia64", "3AS:php-ldap-0:4.3.2-26.ent.ppc", "3AS:php-ldap-0:4.3.2-26.ent.s390", "3AS:php-ldap-0:4.3.2-26.ent.s390x", "3AS:php-ldap-0:4.3.2-26.ent.x86_64", "3AS:php-mysql-0:4.3.2-26.ent.i386", "3AS:php-mysql-0:4.3.2-26.ent.ia64", "3AS:php-mysql-0:4.3.2-26.ent.ppc", "3AS:php-mysql-0:4.3.2-26.ent.s390", "3AS:php-mysql-0:4.3.2-26.ent.s390x", "3AS:php-mysql-0:4.3.2-26.ent.x86_64", "3AS:php-odbc-0:4.3.2-26.ent.i386", "3AS:php-odbc-0:4.3.2-26.ent.ia64", "3AS:php-odbc-0:4.3.2-26.ent.ppc", "3AS:php-odbc-0:4.3.2-26.ent.s390", "3AS:php-odbc-0:4.3.2-26.ent.s390x", "3AS:php-odbc-0:4.3.2-26.ent.x86_64", "3AS:php-pgsql-0:4.3.2-26.ent.i386", "3AS:php-pgsql-0:4.3.2-26.ent.ia64", "3AS:php-pgsql-0:4.3.2-26.ent.ppc", "3AS:php-pgsql-0:4.3.2-26.ent.s390", "3AS:php-pgsql-0:4.3.2-26.ent.s390x", "3AS:php-pgsql-0:4.3.2-26.ent.x86_64", "3Desktop:php-0:4.3.2-26.ent.i386", "3Desktop:php-0:4.3.2-26.ent.ia64", "3Desktop:php-0:4.3.2-26.ent.ppc", "3Desktop:php-0:4.3.2-26.ent.s390", "3Desktop:php-0:4.3.2-26.ent.s390x", "3Desktop:php-0:4.3.2-26.ent.src", "3Desktop:php-0:4.3.2-26.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-26.ent.x86_64", "3Desktop:php-devel-0:4.3.2-26.ent.i386", "3Desktop:php-devel-0:4.3.2-26.ent.ia64", "3Desktop:php-devel-0:4.3.2-26.ent.ppc", "3Desktop:php-devel-0:4.3.2-26.ent.s390", "3Desktop:php-devel-0:4.3.2-26.ent.s390x", "3Desktop:php-devel-0:4.3.2-26.ent.x86_64", "3Desktop:php-imap-0:4.3.2-26.ent.i386", "3Desktop:php-imap-0:4.3.2-26.ent.ia64", "3Desktop:php-imap-0:4.3.2-26.ent.ppc", "3Desktop:php-imap-0:4.3.2-26.ent.s390", "3Desktop:php-imap-0:4.3.2-26.ent.s390x", "3Desktop:php-imap-0:4.3.2-26.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-26.ent.i386", "3Desktop:php-ldap-0:4.3.2-26.ent.ia64", "3Desktop:php-ldap-0:4.3.2-26.ent.ppc", "3Desktop:php-ldap-0:4.3.2-26.ent.s390", "3Desktop:php-ldap-0:4.3.2-26.ent.s390x", "3Desktop:php-ldap-0:4.3.2-26.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-26.ent.i386", "3Desktop:php-mysql-0:4.3.2-26.ent.ia64", "3Desktop:php-mysql-0:4.3.2-26.ent.ppc", "3Desktop:php-mysql-0:4.3.2-26.ent.s390", "3Desktop:php-mysql-0:4.3.2-26.ent.s390x", "3Desktop:php-mysql-0:4.3.2-26.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-26.ent.i386", "3Desktop:php-odbc-0:4.3.2-26.ent.ia64", "3Desktop:php-odbc-0:4.3.2-26.ent.ppc", "3Desktop:php-odbc-0:4.3.2-26.ent.s390", "3Desktop:php-odbc-0:4.3.2-26.ent.s390x", "3Desktop:php-odbc-0:4.3.2-26.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-26.ent.i386", "3Desktop:php-pgsql-0:4.3.2-26.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-26.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-26.ent.x86_64", "3ES:php-0:4.3.2-26.ent.i386", "3ES:php-0:4.3.2-26.ent.ia64", "3ES:php-0:4.3.2-26.ent.ppc", "3ES:php-0:4.3.2-26.ent.s390", "3ES:php-0:4.3.2-26.ent.s390x", "3ES:php-0:4.3.2-26.ent.src", "3ES:php-0:4.3.2-26.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-26.ent.i386", "3ES:php-debuginfo-0:4.3.2-26.ent.ia64", "3ES:php-debuginfo-0:4.3.2-26.ent.ppc", "3ES:php-debuginfo-0:4.3.2-26.ent.s390", "3ES:php-debuginfo-0:4.3.2-26.ent.s390x", "3ES:php-debuginfo-0:4.3.2-26.ent.x86_64", "3ES:php-devel-0:4.3.2-26.ent.i386", "3ES:php-devel-0:4.3.2-26.ent.ia64", "3ES:php-devel-0:4.3.2-26.ent.ppc", "3ES:php-devel-0:4.3.2-26.ent.s390", "3ES:php-devel-0:4.3.2-26.ent.s390x", "3ES:php-devel-0:4.3.2-26.ent.x86_64", "3ES:php-imap-0:4.3.2-26.ent.i386", "3ES:php-imap-0:4.3.2-26.ent.ia64", "3ES:php-imap-0:4.3.2-26.ent.ppc", "3ES:php-imap-0:4.3.2-26.ent.s390", "3ES:php-imap-0:4.3.2-26.ent.s390x", "3ES:php-imap-0:4.3.2-26.ent.x86_64", "3ES:php-ldap-0:4.3.2-26.ent.i386", "3ES:php-ldap-0:4.3.2-26.ent.ia64", "3ES:php-ldap-0:4.3.2-26.ent.ppc", "3ES:php-ldap-0:4.3.2-26.ent.s390", "3ES:php-ldap-0:4.3.2-26.ent.s390x", "3ES:php-ldap-0:4.3.2-26.ent.x86_64", "3ES:php-mysql-0:4.3.2-26.ent.i386", "3ES:php-mysql-0:4.3.2-26.ent.ia64", "3ES:php-mysql-0:4.3.2-26.ent.ppc", "3ES:php-mysql-0:4.3.2-26.ent.s390", "3ES:php-mysql-0:4.3.2-26.ent.s390x", "3ES:php-mysql-0:4.3.2-26.ent.x86_64", "3ES:php-odbc-0:4.3.2-26.ent.i386", "3ES:php-odbc-0:4.3.2-26.ent.ia64", "3ES:php-odbc-0:4.3.2-26.ent.ppc", "3ES:php-odbc-0:4.3.2-26.ent.s390", "3ES:php-odbc-0:4.3.2-26.ent.s390x", "3ES:php-odbc-0:4.3.2-26.ent.x86_64", "3ES:php-pgsql-0:4.3.2-26.ent.i386", "3ES:php-pgsql-0:4.3.2-26.ent.ia64", "3ES:php-pgsql-0:4.3.2-26.ent.ppc", "3ES:php-pgsql-0:4.3.2-26.ent.s390", "3ES:php-pgsql-0:4.3.2-26.ent.s390x", "3ES:php-pgsql-0:4.3.2-26.ent.x86_64", "3WS:php-0:4.3.2-26.ent.i386", "3WS:php-0:4.3.2-26.ent.ia64", "3WS:php-0:4.3.2-26.ent.ppc", "3WS:php-0:4.3.2-26.ent.s390", "3WS:php-0:4.3.2-26.ent.s390x", "3WS:php-0:4.3.2-26.ent.src", "3WS:php-0:4.3.2-26.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-26.ent.i386", "3WS:php-debuginfo-0:4.3.2-26.ent.ia64", "3WS:php-debuginfo-0:4.3.2-26.ent.ppc", "3WS:php-debuginfo-0:4.3.2-26.ent.s390", "3WS:php-debuginfo-0:4.3.2-26.ent.s390x", "3WS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3WS:php-devel-0:4.3.2-26.ent.i386", "3WS:php-devel-0:4.3.2-26.ent.ia64", "3WS:php-devel-0:4.3.2-26.ent.ppc", "3WS:php-devel-0:4.3.2-26.ent.s390", "3WS:php-devel-0:4.3.2-26.ent.s390x", "3WS:php-devel-0:4.3.2-26.ent.x86_64", "3WS:php-imap-0:4.3.2-26.ent.i386", "3WS:php-imap-0:4.3.2-26.ent.ia64", "3WS:php-imap-0:4.3.2-26.ent.ppc", "3WS:php-imap-0:4.3.2-26.ent.s390", "3WS:php-imap-0:4.3.2-26.ent.s390x", "3WS:php-imap-0:4.3.2-26.ent.x86_64", "3WS:php-ldap-0:4.3.2-26.ent.i386", "3WS:php-ldap-0:4.3.2-26.ent.ia64", "3WS:php-ldap-0:4.3.2-26.ent.ppc", "3WS:php-ldap-0:4.3.2-26.ent.s390", "3WS:php-ldap-0:4.3.2-26.ent.s390x", "3WS:php-ldap-0:4.3.2-26.ent.x86_64", "3WS:php-mysql-0:4.3.2-26.ent.i386", "3WS:php-mysql-0:4.3.2-26.ent.ia64", "3WS:php-mysql-0:4.3.2-26.ent.ppc", "3WS:php-mysql-0:4.3.2-26.ent.s390", "3WS:php-mysql-0:4.3.2-26.ent.s390x", "3WS:php-mysql-0:4.3.2-26.ent.x86_64", "3WS:php-odbc-0:4.3.2-26.ent.i386", "3WS:php-odbc-0:4.3.2-26.ent.ia64", "3WS:php-odbc-0:4.3.2-26.ent.ppc", "3WS:php-odbc-0:4.3.2-26.ent.s390", "3WS:php-odbc-0:4.3.2-26.ent.s390x", "3WS:php-odbc-0:4.3.2-26.ent.x86_64", "3WS:php-pgsql-0:4.3.2-26.ent.i386", "3WS:php-pgsql-0:4.3.2-26.ent.ia64", "3WS:php-pgsql-0:4.3.2-26.ent.ppc", "3WS:php-pgsql-0:4.3.2-26.ent.s390", "3WS:php-pgsql-0:4.3.2-26.ent.s390x", "3WS:php-pgsql-0:4.3.2-26.ent.x86_64", "4AS:php-0:4.3.9-3.9.i386", "4AS:php-0:4.3.9-3.9.ia64", "4AS:php-0:4.3.9-3.9.ppc", "4AS:php-0:4.3.9-3.9.s390", "4AS:php-0:4.3.9-3.9.s390x", "4AS:php-0:4.3.9-3.9.src", "4AS:php-0:4.3.9-3.9.x86_64", "4AS:php-debuginfo-0:4.3.9-3.9.i386", "4AS:php-debuginfo-0:4.3.9-3.9.ia64", "4AS:php-debuginfo-0:4.3.9-3.9.ppc", "4AS:php-debuginfo-0:4.3.9-3.9.s390", "4AS:php-debuginfo-0:4.3.9-3.9.s390x", "4AS:php-debuginfo-0:4.3.9-3.9.x86_64", "4AS:php-devel-0:4.3.9-3.9.i386", "4AS:php-devel-0:4.3.9-3.9.ia64", "4AS:php-devel-0:4.3.9-3.9.ppc", "4AS:php-devel-0:4.3.9-3.9.s390", "4AS:php-devel-0:4.3.9-3.9.s390x", "4AS:php-devel-0:4.3.9-3.9.x86_64", "4AS:php-domxml-0:4.3.9-3.9.i386", "4AS:php-domxml-0:4.3.9-3.9.ia64", "4AS:php-domxml-0:4.3.9-3.9.ppc", "4AS:php-domxml-0:4.3.9-3.9.s390", "4AS:php-domxml-0:4.3.9-3.9.s390x", "4AS:php-domxml-0:4.3.9-3.9.x86_64", "4AS:php-gd-0:4.3.9-3.9.i386", "4AS:php-gd-0:4.3.9-3.9.ia64", "4AS:php-gd-0:4.3.9-3.9.ppc", "4AS:php-gd-0:4.3.9-3.9.s390", "4AS:php-gd-0:4.3.9-3.9.s390x", "4AS:php-gd-0:4.3.9-3.9.x86_64", "4AS:php-imap-0:4.3.9-3.9.i386", "4AS:php-imap-0:4.3.9-3.9.ia64", "4AS:php-imap-0:4.3.9-3.9.ppc", "4AS:php-imap-0:4.3.9-3.9.s390", "4AS:php-imap-0:4.3.9-3.9.s390x", "4AS:php-imap-0:4.3.9-3.9.x86_64", "4AS:php-ldap-0:4.3.9-3.9.i386", "4AS:php-ldap-0:4.3.9-3.9.ia64", "4AS:php-ldap-0:4.3.9-3.9.ppc", "4AS:php-ldap-0:4.3.9-3.9.s390", "4AS:php-ldap-0:4.3.9-3.9.s390x", "4AS:php-ldap-0:4.3.9-3.9.x86_64", "4AS:php-mbstring-0:4.3.9-3.9.i386", "4AS:php-mbstring-0:4.3.9-3.9.ia64", "4AS:php-mbstring-0:4.3.9-3.9.ppc", "4AS:php-mbstring-0:4.3.9-3.9.s390", "4AS:php-mbstring-0:4.3.9-3.9.s390x", "4AS:php-mbstring-0:4.3.9-3.9.x86_64", "4AS:php-mysql-0:4.3.9-3.9.i386", "4AS:php-mysql-0:4.3.9-3.9.ia64", "4AS:php-mysql-0:4.3.9-3.9.ppc", "4AS:php-mysql-0:4.3.9-3.9.s390", "4AS:php-mysql-0:4.3.9-3.9.s390x", "4AS:php-mysql-0:4.3.9-3.9.x86_64", "4AS:php-ncurses-0:4.3.9-3.9.i386", "4AS:php-ncurses-0:4.3.9-3.9.ia64", "4AS:php-ncurses-0:4.3.9-3.9.ppc", "4AS:php-ncurses-0:4.3.9-3.9.s390", "4AS:php-ncurses-0:4.3.9-3.9.s390x", "4AS:php-ncurses-0:4.3.9-3.9.x86_64", "4AS:php-odbc-0:4.3.9-3.9.i386", "4AS:php-odbc-0:4.3.9-3.9.ia64", "4AS:php-odbc-0:4.3.9-3.9.ppc", "4AS:php-odbc-0:4.3.9-3.9.s390", "4AS:php-odbc-0:4.3.9-3.9.s390x", "4AS:php-odbc-0:4.3.9-3.9.x86_64", "4AS:php-pear-0:4.3.9-3.9.i386", "4AS:php-pear-0:4.3.9-3.9.ia64", "4AS:php-pear-0:4.3.9-3.9.ppc", "4AS:php-pear-0:4.3.9-3.9.s390", "4AS:php-pear-0:4.3.9-3.9.s390x", "4AS:php-pear-0:4.3.9-3.9.x86_64", "4AS:php-pgsql-0:4.3.9-3.9.i386", "4AS:php-pgsql-0:4.3.9-3.9.ia64", "4AS:php-pgsql-0:4.3.9-3.9.ppc", "4AS:php-pgsql-0:4.3.9-3.9.s390", "4AS:php-pgsql-0:4.3.9-3.9.s390x", "4AS:php-pgsql-0:4.3.9-3.9.x86_64", "4AS:php-snmp-0:4.3.9-3.9.i386", "4AS:php-snmp-0:4.3.9-3.9.ia64", "4AS:php-snmp-0:4.3.9-3.9.ppc", "4AS:php-snmp-0:4.3.9-3.9.s390", "4AS:php-snmp-0:4.3.9-3.9.s390x", "4AS:php-snmp-0:4.3.9-3.9.x86_64", "4AS:php-xmlrpc-0:4.3.9-3.9.i386", "4AS:php-xmlrpc-0:4.3.9-3.9.ia64", "4AS:php-xmlrpc-0:4.3.9-3.9.ppc", "4AS:php-xmlrpc-0:4.3.9-3.9.s390", "4AS:php-xmlrpc-0:4.3.9-3.9.s390x", "4AS:php-xmlrpc-0:4.3.9-3.9.x86_64", "4Desktop:php-0:4.3.9-3.9.i386", "4Desktop:php-0:4.3.9-3.9.ia64", "4Desktop:php-0:4.3.9-3.9.ppc", "4Desktop:php-0:4.3.9-3.9.s390", "4Desktop:php-0:4.3.9-3.9.s390x", "4Desktop:php-0:4.3.9-3.9.src", "4Desktop:php-0:4.3.9-3.9.x86_64", "4Desktop:php-debuginfo-0:4.3.9-3.9.i386", "4Desktop:php-debuginfo-0:4.3.9-3.9.ia64", "4Desktop:php-debuginfo-0:4.3.9-3.9.ppc", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390x", "4Desktop:php-debuginfo-0:4.3.9-3.9.x86_64", "4Desktop:php-devel-0:4.3.9-3.9.i386", "4Desktop:php-devel-0:4.3.9-3.9.ia64", "4Desktop:php-devel-0:4.3.9-3.9.ppc", "4Desktop:php-devel-0:4.3.9-3.9.s390", "4Desktop:php-devel-0:4.3.9-3.9.s390x", "4Desktop:php-devel-0:4.3.9-3.9.x86_64", "4Desktop:php-domxml-0:4.3.9-3.9.i386", "4Desktop:php-domxml-0:4.3.9-3.9.ia64", "4Desktop:php-domxml-0:4.3.9-3.9.ppc", "4Desktop:php-domxml-0:4.3.9-3.9.s390", "4Desktop:php-domxml-0:4.3.9-3.9.s390x", "4Desktop:php-domxml-0:4.3.9-3.9.x86_64", "4Desktop:php-gd-0:4.3.9-3.9.i386", "4Desktop:php-gd-0:4.3.9-3.9.ia64", "4Desktop:php-gd-0:4.3.9-3.9.ppc", "4Desktop:php-gd-0:4.3.9-3.9.s390", "4Desktop:php-gd-0:4.3.9-3.9.s390x", "4Desktop:php-gd-0:4.3.9-3.9.x86_64", "4Desktop:php-imap-0:4.3.9-3.9.i386", "4Desktop:php-imap-0:4.3.9-3.9.ia64", "4Desktop:php-imap-0:4.3.9-3.9.ppc", "4Desktop:php-imap-0:4.3.9-3.9.s390", "4Desktop:php-imap-0:4.3.9-3.9.s390x", "4Desktop:php-imap-0:4.3.9-3.9.x86_64", "4Desktop:php-ldap-0:4.3.9-3.9.i386", "4Desktop:php-ldap-0:4.3.9-3.9.ia64", "4Desktop:php-ldap-0:4.3.9-3.9.ppc", "4Desktop:php-ldap-0:4.3.9-3.9.s390", "4Desktop:php-ldap-0:4.3.9-3.9.s390x", "4Desktop:php-ldap-0:4.3.9-3.9.x86_64", "4Desktop:php-mbstring-0:4.3.9-3.9.i386", "4Desktop:php-mbstring-0:4.3.9-3.9.ia64", "4Desktop:php-mbstring-0:4.3.9-3.9.ppc", "4Desktop:php-mbstring-0:4.3.9-3.9.s390", "4Desktop:php-mbstring-0:4.3.9-3.9.s390x", "4Desktop:php-mbstring-0:4.3.9-3.9.x86_64", "4Desktop:php-mysql-0:4.3.9-3.9.i386", "4Desktop:php-mysql-0:4.3.9-3.9.ia64", "4Desktop:php-mysql-0:4.3.9-3.9.ppc", "4Desktop:php-mysql-0:4.3.9-3.9.s390", "4Desktop:php-mysql-0:4.3.9-3.9.s390x", "4Desktop:php-mysql-0:4.3.9-3.9.x86_64", "4Desktop:php-ncurses-0:4.3.9-3.9.i386", "4Desktop:php-ncurses-0:4.3.9-3.9.ia64", "4Desktop:php-ncurses-0:4.3.9-3.9.ppc", "4Desktop:php-ncurses-0:4.3.9-3.9.s390", "4Desktop:php-ncurses-0:4.3.9-3.9.s390x", "4Desktop:php-ncurses-0:4.3.9-3.9.x86_64", "4Desktop:php-odbc-0:4.3.9-3.9.i386", "4Desktop:php-odbc-0:4.3.9-3.9.ia64", "4Desktop:php-odbc-0:4.3.9-3.9.ppc", "4Desktop:php-odbc-0:4.3.9-3.9.s390", "4Desktop:php-odbc-0:4.3.9-3.9.s390x", "4Desktop:php-odbc-0:4.3.9-3.9.x86_64", "4Desktop:php-pear-0:4.3.9-3.9.i386", "4Desktop:php-pear-0:4.3.9-3.9.ia64", "4Desktop:php-pear-0:4.3.9-3.9.ppc", "4Desktop:php-pear-0:4.3.9-3.9.s390", "4Desktop:php-pear-0:4.3.9-3.9.s390x", "4Desktop:php-pear-0:4.3.9-3.9.x86_64", "4Desktop:php-pgsql-0:4.3.9-3.9.i386", "4Desktop:php-pgsql-0:4.3.9-3.9.ia64", "4Desktop:php-pgsql-0:4.3.9-3.9.ppc", "4Desktop:php-pgsql-0:4.3.9-3.9.s390", "4Desktop:php-pgsql-0:4.3.9-3.9.s390x", "4Desktop:php-pgsql-0:4.3.9-3.9.x86_64", "4Desktop:php-snmp-0:4.3.9-3.9.i386", "4Desktop:php-snmp-0:4.3.9-3.9.ia64", "4Desktop:php-snmp-0:4.3.9-3.9.ppc", "4Desktop:php-snmp-0:4.3.9-3.9.s390", "4Desktop:php-snmp-0:4.3.9-3.9.s390x", "4Desktop:php-snmp-0:4.3.9-3.9.x86_64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.i386", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ia64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ppc", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390x", "4Desktop:php-xmlrpc-0:4.3.9-3.9.x86_64", "4ES:php-0:4.3.9-3.9.i386", "4ES:php-0:4.3.9-3.9.ia64", "4ES:php-0:4.3.9-3.9.ppc", "4ES:php-0:4.3.9-3.9.s390", "4ES:php-0:4.3.9-3.9.s390x", "4ES:php-0:4.3.9-3.9.src", "4ES:php-0:4.3.9-3.9.x86_64", "4ES:php-debuginfo-0:4.3.9-3.9.i386", "4ES:php-debuginfo-0:4.3.9-3.9.ia64", "4ES:php-debuginfo-0:4.3.9-3.9.ppc", "4ES:php-debuginfo-0:4.3.9-3.9.s390", "4ES:php-debuginfo-0:4.3.9-3.9.s390x", "4ES:php-debuginfo-0:4.3.9-3.9.x86_64", "4ES:php-devel-0:4.3.9-3.9.i386", "4ES:php-devel-0:4.3.9-3.9.ia64", "4ES:php-devel-0:4.3.9-3.9.ppc", "4ES:php-devel-0:4.3.9-3.9.s390", "4ES:php-devel-0:4.3.9-3.9.s390x", "4ES:php-devel-0:4.3.9-3.9.x86_64", "4ES:php-domxml-0:4.3.9-3.9.i386", "4ES:php-domxml-0:4.3.9-3.9.ia64", "4ES:php-domxml-0:4.3.9-3.9.ppc", "4ES:php-domxml-0:4.3.9-3.9.s390", "4ES:php-domxml-0:4.3.9-3.9.s390x", "4ES:php-domxml-0:4.3.9-3.9.x86_64", "4ES:php-gd-0:4.3.9-3.9.i386", "4ES:php-gd-0:4.3.9-3.9.ia64", "4ES:php-gd-0:4.3.9-3.9.ppc", "4ES:php-gd-0:4.3.9-3.9.s390", "4ES:php-gd-0:4.3.9-3.9.s390x", "4ES:php-gd-0:4.3.9-3.9.x86_64", "4ES:php-imap-0:4.3.9-3.9.i386", "4ES:php-imap-0:4.3.9-3.9.ia64", "4ES:php-imap-0:4.3.9-3.9.ppc", "4ES:php-imap-0:4.3.9-3.9.s390", "4ES:php-imap-0:4.3.9-3.9.s390x", "4ES:php-imap-0:4.3.9-3.9.x86_64", "4ES:php-ldap-0:4.3.9-3.9.i386", "4ES:php-ldap-0:4.3.9-3.9.ia64", "4ES:php-ldap-0:4.3.9-3.9.ppc", "4ES:php-ldap-0:4.3.9-3.9.s390", "4ES:php-ldap-0:4.3.9-3.9.s390x", "4ES:php-ldap-0:4.3.9-3.9.x86_64", "4ES:php-mbstring-0:4.3.9-3.9.i386", "4ES:php-mbstring-0:4.3.9-3.9.ia64", "4ES:php-mbstring-0:4.3.9-3.9.ppc", "4ES:php-mbstring-0:4.3.9-3.9.s390", "4ES:php-mbstring-0:4.3.9-3.9.s390x", "4ES:php-mbstring-0:4.3.9-3.9.x86_64", "4ES:php-mysql-0:4.3.9-3.9.i386", "4ES:php-mysql-0:4.3.9-3.9.ia64", "4ES:php-mysql-0:4.3.9-3.9.ppc", "4ES:php-mysql-0:4.3.9-3.9.s390", "4ES:php-mysql-0:4.3.9-3.9.s390x", "4ES:php-mysql-0:4.3.9-3.9.x86_64", "4ES:php-ncurses-0:4.3.9-3.9.i386", "4ES:php-ncurses-0:4.3.9-3.9.ia64", "4ES:php-ncurses-0:4.3.9-3.9.ppc", "4ES:php-ncurses-0:4.3.9-3.9.s390", "4ES:php-ncurses-0:4.3.9-3.9.s390x", "4ES:php-ncurses-0:4.3.9-3.9.x86_64", "4ES:php-odbc-0:4.3.9-3.9.i386", "4ES:php-odbc-0:4.3.9-3.9.ia64", "4ES:php-odbc-0:4.3.9-3.9.ppc", "4ES:php-odbc-0:4.3.9-3.9.s390", "4ES:php-odbc-0:4.3.9-3.9.s390x", "4ES:php-odbc-0:4.3.9-3.9.x86_64", "4ES:php-pear-0:4.3.9-3.9.i386", "4ES:php-pear-0:4.3.9-3.9.ia64", "4ES:php-pear-0:4.3.9-3.9.ppc", "4ES:php-pear-0:4.3.9-3.9.s390", "4ES:php-pear-0:4.3.9-3.9.s390x", "4ES:php-pear-0:4.3.9-3.9.x86_64", "4ES:php-pgsql-0:4.3.9-3.9.i386", "4ES:php-pgsql-0:4.3.9-3.9.ia64", "4ES:php-pgsql-0:4.3.9-3.9.ppc", "4ES:php-pgsql-0:4.3.9-3.9.s390", "4ES:php-pgsql-0:4.3.9-3.9.s390x", "4ES:php-pgsql-0:4.3.9-3.9.x86_64", "4ES:php-snmp-0:4.3.9-3.9.i386", "4ES:php-snmp-0:4.3.9-3.9.ia64", "4ES:php-snmp-0:4.3.9-3.9.ppc", "4ES:php-snmp-0:4.3.9-3.9.s390", "4ES:php-snmp-0:4.3.9-3.9.s390x", "4ES:php-snmp-0:4.3.9-3.9.x86_64", "4ES:php-xmlrpc-0:4.3.9-3.9.i386", "4ES:php-xmlrpc-0:4.3.9-3.9.ia64", "4ES:php-xmlrpc-0:4.3.9-3.9.ppc", "4ES:php-xmlrpc-0:4.3.9-3.9.s390", "4ES:php-xmlrpc-0:4.3.9-3.9.s390x", "4ES:php-xmlrpc-0:4.3.9-3.9.x86_64", "4WS:php-0:4.3.9-3.9.i386", "4WS:php-0:4.3.9-3.9.ia64", "4WS:php-0:4.3.9-3.9.ppc", "4WS:php-0:4.3.9-3.9.s390", "4WS:php-0:4.3.9-3.9.s390x", "4WS:php-0:4.3.9-3.9.src", "4WS:php-0:4.3.9-3.9.x86_64", "4WS:php-debuginfo-0:4.3.9-3.9.i386", "4WS:php-debuginfo-0:4.3.9-3.9.ia64", "4WS:php-debuginfo-0:4.3.9-3.9.ppc", "4WS:php-debuginfo-0:4.3.9-3.9.s390", "4WS:php-debuginfo-0:4.3.9-3.9.s390x", "4WS:php-debuginfo-0:4.3.9-3.9.x86_64", "4WS:php-devel-0:4.3.9-3.9.i386", "4WS:php-devel-0:4.3.9-3.9.ia64", "4WS:php-devel-0:4.3.9-3.9.ppc", "4WS:php-devel-0:4.3.9-3.9.s390", "4WS:php-devel-0:4.3.9-3.9.s390x", "4WS:php-devel-0:4.3.9-3.9.x86_64", "4WS:php-domxml-0:4.3.9-3.9.i386", "4WS:php-domxml-0:4.3.9-3.9.ia64", "4WS:php-domxml-0:4.3.9-3.9.ppc", "4WS:php-domxml-0:4.3.9-3.9.s390", "4WS:php-domxml-0:4.3.9-3.9.s390x", "4WS:php-domxml-0:4.3.9-3.9.x86_64", "4WS:php-gd-0:4.3.9-3.9.i386", "4WS:php-gd-0:4.3.9-3.9.ia64", "4WS:php-gd-0:4.3.9-3.9.ppc", "4WS:php-gd-0:4.3.9-3.9.s390", "4WS:php-gd-0:4.3.9-3.9.s390x", "4WS:php-gd-0:4.3.9-3.9.x86_64", "4WS:php-imap-0:4.3.9-3.9.i386", "4WS:php-imap-0:4.3.9-3.9.ia64", "4WS:php-imap-0:4.3.9-3.9.ppc", "4WS:php-imap-0:4.3.9-3.9.s390", "4WS:php-imap-0:4.3.9-3.9.s390x", "4WS:php-imap-0:4.3.9-3.9.x86_64", "4WS:php-ldap-0:4.3.9-3.9.i386", "4WS:php-ldap-0:4.3.9-3.9.ia64", "4WS:php-ldap-0:4.3.9-3.9.ppc", "4WS:php-ldap-0:4.3.9-3.9.s390", "4WS:php-ldap-0:4.3.9-3.9.s390x", "4WS:php-ldap-0:4.3.9-3.9.x86_64", "4WS:php-mbstring-0:4.3.9-3.9.i386", "4WS:php-mbstring-0:4.3.9-3.9.ia64", "4WS:php-mbstring-0:4.3.9-3.9.ppc", "4WS:php-mbstring-0:4.3.9-3.9.s390", "4WS:php-mbstring-0:4.3.9-3.9.s390x", "4WS:php-mbstring-0:4.3.9-3.9.x86_64", "4WS:php-mysql-0:4.3.9-3.9.i386", "4WS:php-mysql-0:4.3.9-3.9.ia64", "4WS:php-mysql-0:4.3.9-3.9.ppc", "4WS:php-mysql-0:4.3.9-3.9.s390", "4WS:php-mysql-0:4.3.9-3.9.s390x", "4WS:php-mysql-0:4.3.9-3.9.x86_64", "4WS:php-ncurses-0:4.3.9-3.9.i386", "4WS:php-ncurses-0:4.3.9-3.9.ia64", "4WS:php-ncurses-0:4.3.9-3.9.ppc", "4WS:php-ncurses-0:4.3.9-3.9.s390", "4WS:php-ncurses-0:4.3.9-3.9.s390x", "4WS:php-ncurses-0:4.3.9-3.9.x86_64", "4WS:php-odbc-0:4.3.9-3.9.i386", "4WS:php-odbc-0:4.3.9-3.9.ia64", "4WS:php-odbc-0:4.3.9-3.9.ppc", "4WS:php-odbc-0:4.3.9-3.9.s390", "4WS:php-odbc-0:4.3.9-3.9.s390x", "4WS:php-odbc-0:4.3.9-3.9.x86_64", "4WS:php-pear-0:4.3.9-3.9.i386", "4WS:php-pear-0:4.3.9-3.9.ia64", "4WS:php-pear-0:4.3.9-3.9.ppc", "4WS:php-pear-0:4.3.9-3.9.s390", "4WS:php-pear-0:4.3.9-3.9.s390x", "4WS:php-pear-0:4.3.9-3.9.x86_64", "4WS:php-pgsql-0:4.3.9-3.9.i386", "4WS:php-pgsql-0:4.3.9-3.9.ia64", "4WS:php-pgsql-0:4.3.9-3.9.ppc", "4WS:php-pgsql-0:4.3.9-3.9.s390", "4WS:php-pgsql-0:4.3.9-3.9.s390x", "4WS:php-pgsql-0:4.3.9-3.9.x86_64", "4WS:php-snmp-0:4.3.9-3.9.i386", "4WS:php-snmp-0:4.3.9-3.9.ia64", "4WS:php-snmp-0:4.3.9-3.9.ppc", "4WS:php-snmp-0:4.3.9-3.9.s390", "4WS:php-snmp-0:4.3.9-3.9.s390x", "4WS:php-snmp-0:4.3.9-3.9.x86_64", "4WS:php-xmlrpc-0:4.3.9-3.9.i386", "4WS:php-xmlrpc-0:4.3.9-3.9.ia64", "4WS:php-xmlrpc-0:4.3.9-3.9.ppc", "4WS:php-xmlrpc-0:4.3.9-3.9.s390", "4WS:php-xmlrpc-0:4.3.9-3.9.s390x", "4WS:php-xmlrpc-0:4.3.9-3.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3388" }, { "category": "external", "summary": "RHBZ#1617821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3388", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-11-10T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:php-0:4.3.2-26.ent.i386", "3AS:php-0:4.3.2-26.ent.ia64", "3AS:php-0:4.3.2-26.ent.ppc", "3AS:php-0:4.3.2-26.ent.s390", "3AS:php-0:4.3.2-26.ent.s390x", "3AS:php-0:4.3.2-26.ent.src", "3AS:php-0:4.3.2-26.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-26.ent.i386", "3AS:php-debuginfo-0:4.3.2-26.ent.ia64", "3AS:php-debuginfo-0:4.3.2-26.ent.ppc", "3AS:php-debuginfo-0:4.3.2-26.ent.s390", "3AS:php-debuginfo-0:4.3.2-26.ent.s390x", "3AS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3AS:php-devel-0:4.3.2-26.ent.i386", "3AS:php-devel-0:4.3.2-26.ent.ia64", "3AS:php-devel-0:4.3.2-26.ent.ppc", "3AS:php-devel-0:4.3.2-26.ent.s390", "3AS:php-devel-0:4.3.2-26.ent.s390x", "3AS:php-devel-0:4.3.2-26.ent.x86_64", "3AS:php-imap-0:4.3.2-26.ent.i386", "3AS:php-imap-0:4.3.2-26.ent.ia64", "3AS:php-imap-0:4.3.2-26.ent.ppc", "3AS:php-imap-0:4.3.2-26.ent.s390", "3AS:php-imap-0:4.3.2-26.ent.s390x", "3AS:php-imap-0:4.3.2-26.ent.x86_64", "3AS:php-ldap-0:4.3.2-26.ent.i386", "3AS:php-ldap-0:4.3.2-26.ent.ia64", "3AS:php-ldap-0:4.3.2-26.ent.ppc", "3AS:php-ldap-0:4.3.2-26.ent.s390", "3AS:php-ldap-0:4.3.2-26.ent.s390x", "3AS:php-ldap-0:4.3.2-26.ent.x86_64", "3AS:php-mysql-0:4.3.2-26.ent.i386", "3AS:php-mysql-0:4.3.2-26.ent.ia64", "3AS:php-mysql-0:4.3.2-26.ent.ppc", "3AS:php-mysql-0:4.3.2-26.ent.s390", "3AS:php-mysql-0:4.3.2-26.ent.s390x", "3AS:php-mysql-0:4.3.2-26.ent.x86_64", "3AS:php-odbc-0:4.3.2-26.ent.i386", "3AS:php-odbc-0:4.3.2-26.ent.ia64", "3AS:php-odbc-0:4.3.2-26.ent.ppc", "3AS:php-odbc-0:4.3.2-26.ent.s390", "3AS:php-odbc-0:4.3.2-26.ent.s390x", "3AS:php-odbc-0:4.3.2-26.ent.x86_64", "3AS:php-pgsql-0:4.3.2-26.ent.i386", "3AS:php-pgsql-0:4.3.2-26.ent.ia64", "3AS:php-pgsql-0:4.3.2-26.ent.ppc", "3AS:php-pgsql-0:4.3.2-26.ent.s390", "3AS:php-pgsql-0:4.3.2-26.ent.s390x", "3AS:php-pgsql-0:4.3.2-26.ent.x86_64", "3Desktop:php-0:4.3.2-26.ent.i386", "3Desktop:php-0:4.3.2-26.ent.ia64", "3Desktop:php-0:4.3.2-26.ent.ppc", "3Desktop:php-0:4.3.2-26.ent.s390", "3Desktop:php-0:4.3.2-26.ent.s390x", "3Desktop:php-0:4.3.2-26.ent.src", "3Desktop:php-0:4.3.2-26.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-26.ent.x86_64", "3Desktop:php-devel-0:4.3.2-26.ent.i386", "3Desktop:php-devel-0:4.3.2-26.ent.ia64", "3Desktop:php-devel-0:4.3.2-26.ent.ppc", "3Desktop:php-devel-0:4.3.2-26.ent.s390", "3Desktop:php-devel-0:4.3.2-26.ent.s390x", "3Desktop:php-devel-0:4.3.2-26.ent.x86_64", "3Desktop:php-imap-0:4.3.2-26.ent.i386", "3Desktop:php-imap-0:4.3.2-26.ent.ia64", "3Desktop:php-imap-0:4.3.2-26.ent.ppc", "3Desktop:php-imap-0:4.3.2-26.ent.s390", "3Desktop:php-imap-0:4.3.2-26.ent.s390x", "3Desktop:php-imap-0:4.3.2-26.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-26.ent.i386", "3Desktop:php-ldap-0:4.3.2-26.ent.ia64", "3Desktop:php-ldap-0:4.3.2-26.ent.ppc", "3Desktop:php-ldap-0:4.3.2-26.ent.s390", "3Desktop:php-ldap-0:4.3.2-26.ent.s390x", "3Desktop:php-ldap-0:4.3.2-26.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-26.ent.i386", "3Desktop:php-mysql-0:4.3.2-26.ent.ia64", "3Desktop:php-mysql-0:4.3.2-26.ent.ppc", "3Desktop:php-mysql-0:4.3.2-26.ent.s390", "3Desktop:php-mysql-0:4.3.2-26.ent.s390x", "3Desktop:php-mysql-0:4.3.2-26.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-26.ent.i386", "3Desktop:php-odbc-0:4.3.2-26.ent.ia64", "3Desktop:php-odbc-0:4.3.2-26.ent.ppc", "3Desktop:php-odbc-0:4.3.2-26.ent.s390", "3Desktop:php-odbc-0:4.3.2-26.ent.s390x", "3Desktop:php-odbc-0:4.3.2-26.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-26.ent.i386", "3Desktop:php-pgsql-0:4.3.2-26.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-26.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-26.ent.x86_64", "3ES:php-0:4.3.2-26.ent.i386", "3ES:php-0:4.3.2-26.ent.ia64", "3ES:php-0:4.3.2-26.ent.ppc", "3ES:php-0:4.3.2-26.ent.s390", "3ES:php-0:4.3.2-26.ent.s390x", "3ES:php-0:4.3.2-26.ent.src", "3ES:php-0:4.3.2-26.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-26.ent.i386", "3ES:php-debuginfo-0:4.3.2-26.ent.ia64", "3ES:php-debuginfo-0:4.3.2-26.ent.ppc", "3ES:php-debuginfo-0:4.3.2-26.ent.s390", "3ES:php-debuginfo-0:4.3.2-26.ent.s390x", "3ES:php-debuginfo-0:4.3.2-26.ent.x86_64", "3ES:php-devel-0:4.3.2-26.ent.i386", "3ES:php-devel-0:4.3.2-26.ent.ia64", "3ES:php-devel-0:4.3.2-26.ent.ppc", "3ES:php-devel-0:4.3.2-26.ent.s390", "3ES:php-devel-0:4.3.2-26.ent.s390x", "3ES:php-devel-0:4.3.2-26.ent.x86_64", "3ES:php-imap-0:4.3.2-26.ent.i386", "3ES:php-imap-0:4.3.2-26.ent.ia64", "3ES:php-imap-0:4.3.2-26.ent.ppc", "3ES:php-imap-0:4.3.2-26.ent.s390", "3ES:php-imap-0:4.3.2-26.ent.s390x", "3ES:php-imap-0:4.3.2-26.ent.x86_64", "3ES:php-ldap-0:4.3.2-26.ent.i386", "3ES:php-ldap-0:4.3.2-26.ent.ia64", "3ES:php-ldap-0:4.3.2-26.ent.ppc", "3ES:php-ldap-0:4.3.2-26.ent.s390", "3ES:php-ldap-0:4.3.2-26.ent.s390x", "3ES:php-ldap-0:4.3.2-26.ent.x86_64", "3ES:php-mysql-0:4.3.2-26.ent.i386", "3ES:php-mysql-0:4.3.2-26.ent.ia64", "3ES:php-mysql-0:4.3.2-26.ent.ppc", "3ES:php-mysql-0:4.3.2-26.ent.s390", "3ES:php-mysql-0:4.3.2-26.ent.s390x", "3ES:php-mysql-0:4.3.2-26.ent.x86_64", "3ES:php-odbc-0:4.3.2-26.ent.i386", "3ES:php-odbc-0:4.3.2-26.ent.ia64", "3ES:php-odbc-0:4.3.2-26.ent.ppc", "3ES:php-odbc-0:4.3.2-26.ent.s390", "3ES:php-odbc-0:4.3.2-26.ent.s390x", "3ES:php-odbc-0:4.3.2-26.ent.x86_64", "3ES:php-pgsql-0:4.3.2-26.ent.i386", "3ES:php-pgsql-0:4.3.2-26.ent.ia64", "3ES:php-pgsql-0:4.3.2-26.ent.ppc", "3ES:php-pgsql-0:4.3.2-26.ent.s390", "3ES:php-pgsql-0:4.3.2-26.ent.s390x", "3ES:php-pgsql-0:4.3.2-26.ent.x86_64", "3WS:php-0:4.3.2-26.ent.i386", "3WS:php-0:4.3.2-26.ent.ia64", "3WS:php-0:4.3.2-26.ent.ppc", "3WS:php-0:4.3.2-26.ent.s390", "3WS:php-0:4.3.2-26.ent.s390x", "3WS:php-0:4.3.2-26.ent.src", "3WS:php-0:4.3.2-26.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-26.ent.i386", "3WS:php-debuginfo-0:4.3.2-26.ent.ia64", "3WS:php-debuginfo-0:4.3.2-26.ent.ppc", "3WS:php-debuginfo-0:4.3.2-26.ent.s390", "3WS:php-debuginfo-0:4.3.2-26.ent.s390x", "3WS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3WS:php-devel-0:4.3.2-26.ent.i386", "3WS:php-devel-0:4.3.2-26.ent.ia64", "3WS:php-devel-0:4.3.2-26.ent.ppc", "3WS:php-devel-0:4.3.2-26.ent.s390", "3WS:php-devel-0:4.3.2-26.ent.s390x", "3WS:php-devel-0:4.3.2-26.ent.x86_64", "3WS:php-imap-0:4.3.2-26.ent.i386", "3WS:php-imap-0:4.3.2-26.ent.ia64", "3WS:php-imap-0:4.3.2-26.ent.ppc", "3WS:php-imap-0:4.3.2-26.ent.s390", "3WS:php-imap-0:4.3.2-26.ent.s390x", "3WS:php-imap-0:4.3.2-26.ent.x86_64", "3WS:php-ldap-0:4.3.2-26.ent.i386", "3WS:php-ldap-0:4.3.2-26.ent.ia64", "3WS:php-ldap-0:4.3.2-26.ent.ppc", "3WS:php-ldap-0:4.3.2-26.ent.s390", "3WS:php-ldap-0:4.3.2-26.ent.s390x", "3WS:php-ldap-0:4.3.2-26.ent.x86_64", "3WS:php-mysql-0:4.3.2-26.ent.i386", "3WS:php-mysql-0:4.3.2-26.ent.ia64", "3WS:php-mysql-0:4.3.2-26.ent.ppc", "3WS:php-mysql-0:4.3.2-26.ent.s390", "3WS:php-mysql-0:4.3.2-26.ent.s390x", "3WS:php-mysql-0:4.3.2-26.ent.x86_64", "3WS:php-odbc-0:4.3.2-26.ent.i386", "3WS:php-odbc-0:4.3.2-26.ent.ia64", "3WS:php-odbc-0:4.3.2-26.ent.ppc", "3WS:php-odbc-0:4.3.2-26.ent.s390", "3WS:php-odbc-0:4.3.2-26.ent.s390x", "3WS:php-odbc-0:4.3.2-26.ent.x86_64", "3WS:php-pgsql-0:4.3.2-26.ent.i386", "3WS:php-pgsql-0:4.3.2-26.ent.ia64", "3WS:php-pgsql-0:4.3.2-26.ent.ppc", "3WS:php-pgsql-0:4.3.2-26.ent.s390", "3WS:php-pgsql-0:4.3.2-26.ent.s390x", "3WS:php-pgsql-0:4.3.2-26.ent.x86_64", "4AS:php-0:4.3.9-3.9.i386", "4AS:php-0:4.3.9-3.9.ia64", "4AS:php-0:4.3.9-3.9.ppc", "4AS:php-0:4.3.9-3.9.s390", "4AS:php-0:4.3.9-3.9.s390x", "4AS:php-0:4.3.9-3.9.src", "4AS:php-0:4.3.9-3.9.x86_64", "4AS:php-debuginfo-0:4.3.9-3.9.i386", "4AS:php-debuginfo-0:4.3.9-3.9.ia64", "4AS:php-debuginfo-0:4.3.9-3.9.ppc", "4AS:php-debuginfo-0:4.3.9-3.9.s390", "4AS:php-debuginfo-0:4.3.9-3.9.s390x", "4AS:php-debuginfo-0:4.3.9-3.9.x86_64", "4AS:php-devel-0:4.3.9-3.9.i386", "4AS:php-devel-0:4.3.9-3.9.ia64", "4AS:php-devel-0:4.3.9-3.9.ppc", "4AS:php-devel-0:4.3.9-3.9.s390", "4AS:php-devel-0:4.3.9-3.9.s390x", "4AS:php-devel-0:4.3.9-3.9.x86_64", "4AS:php-domxml-0:4.3.9-3.9.i386", "4AS:php-domxml-0:4.3.9-3.9.ia64", "4AS:php-domxml-0:4.3.9-3.9.ppc", "4AS:php-domxml-0:4.3.9-3.9.s390", "4AS:php-domxml-0:4.3.9-3.9.s390x", "4AS:php-domxml-0:4.3.9-3.9.x86_64", "4AS:php-gd-0:4.3.9-3.9.i386", "4AS:php-gd-0:4.3.9-3.9.ia64", "4AS:php-gd-0:4.3.9-3.9.ppc", "4AS:php-gd-0:4.3.9-3.9.s390", "4AS:php-gd-0:4.3.9-3.9.s390x", "4AS:php-gd-0:4.3.9-3.9.x86_64", "4AS:php-imap-0:4.3.9-3.9.i386", "4AS:php-imap-0:4.3.9-3.9.ia64", "4AS:php-imap-0:4.3.9-3.9.ppc", "4AS:php-imap-0:4.3.9-3.9.s390", "4AS:php-imap-0:4.3.9-3.9.s390x", "4AS:php-imap-0:4.3.9-3.9.x86_64", "4AS:php-ldap-0:4.3.9-3.9.i386", "4AS:php-ldap-0:4.3.9-3.9.ia64", "4AS:php-ldap-0:4.3.9-3.9.ppc", "4AS:php-ldap-0:4.3.9-3.9.s390", "4AS:php-ldap-0:4.3.9-3.9.s390x", "4AS:php-ldap-0:4.3.9-3.9.x86_64", "4AS:php-mbstring-0:4.3.9-3.9.i386", "4AS:php-mbstring-0:4.3.9-3.9.ia64", "4AS:php-mbstring-0:4.3.9-3.9.ppc", "4AS:php-mbstring-0:4.3.9-3.9.s390", "4AS:php-mbstring-0:4.3.9-3.9.s390x", "4AS:php-mbstring-0:4.3.9-3.9.x86_64", "4AS:php-mysql-0:4.3.9-3.9.i386", "4AS:php-mysql-0:4.3.9-3.9.ia64", "4AS:php-mysql-0:4.3.9-3.9.ppc", "4AS:php-mysql-0:4.3.9-3.9.s390", "4AS:php-mysql-0:4.3.9-3.9.s390x", "4AS:php-mysql-0:4.3.9-3.9.x86_64", "4AS:php-ncurses-0:4.3.9-3.9.i386", "4AS:php-ncurses-0:4.3.9-3.9.ia64", "4AS:php-ncurses-0:4.3.9-3.9.ppc", "4AS:php-ncurses-0:4.3.9-3.9.s390", "4AS:php-ncurses-0:4.3.9-3.9.s390x", "4AS:php-ncurses-0:4.3.9-3.9.x86_64", "4AS:php-odbc-0:4.3.9-3.9.i386", "4AS:php-odbc-0:4.3.9-3.9.ia64", "4AS:php-odbc-0:4.3.9-3.9.ppc", "4AS:php-odbc-0:4.3.9-3.9.s390", "4AS:php-odbc-0:4.3.9-3.9.s390x", "4AS:php-odbc-0:4.3.9-3.9.x86_64", "4AS:php-pear-0:4.3.9-3.9.i386", "4AS:php-pear-0:4.3.9-3.9.ia64", "4AS:php-pear-0:4.3.9-3.9.ppc", "4AS:php-pear-0:4.3.9-3.9.s390", "4AS:php-pear-0:4.3.9-3.9.s390x", "4AS:php-pear-0:4.3.9-3.9.x86_64", "4AS:php-pgsql-0:4.3.9-3.9.i386", "4AS:php-pgsql-0:4.3.9-3.9.ia64", "4AS:php-pgsql-0:4.3.9-3.9.ppc", "4AS:php-pgsql-0:4.3.9-3.9.s390", "4AS:php-pgsql-0:4.3.9-3.9.s390x", "4AS:php-pgsql-0:4.3.9-3.9.x86_64", "4AS:php-snmp-0:4.3.9-3.9.i386", "4AS:php-snmp-0:4.3.9-3.9.ia64", "4AS:php-snmp-0:4.3.9-3.9.ppc", "4AS:php-snmp-0:4.3.9-3.9.s390", "4AS:php-snmp-0:4.3.9-3.9.s390x", "4AS:php-snmp-0:4.3.9-3.9.x86_64", "4AS:php-xmlrpc-0:4.3.9-3.9.i386", "4AS:php-xmlrpc-0:4.3.9-3.9.ia64", "4AS:php-xmlrpc-0:4.3.9-3.9.ppc", "4AS:php-xmlrpc-0:4.3.9-3.9.s390", "4AS:php-xmlrpc-0:4.3.9-3.9.s390x", "4AS:php-xmlrpc-0:4.3.9-3.9.x86_64", "4Desktop:php-0:4.3.9-3.9.i386", "4Desktop:php-0:4.3.9-3.9.ia64", "4Desktop:php-0:4.3.9-3.9.ppc", "4Desktop:php-0:4.3.9-3.9.s390", "4Desktop:php-0:4.3.9-3.9.s390x", "4Desktop:php-0:4.3.9-3.9.src", "4Desktop:php-0:4.3.9-3.9.x86_64", "4Desktop:php-debuginfo-0:4.3.9-3.9.i386", "4Desktop:php-debuginfo-0:4.3.9-3.9.ia64", "4Desktop:php-debuginfo-0:4.3.9-3.9.ppc", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390x", "4Desktop:php-debuginfo-0:4.3.9-3.9.x86_64", "4Desktop:php-devel-0:4.3.9-3.9.i386", "4Desktop:php-devel-0:4.3.9-3.9.ia64", "4Desktop:php-devel-0:4.3.9-3.9.ppc", "4Desktop:php-devel-0:4.3.9-3.9.s390", "4Desktop:php-devel-0:4.3.9-3.9.s390x", "4Desktop:php-devel-0:4.3.9-3.9.x86_64", "4Desktop:php-domxml-0:4.3.9-3.9.i386", "4Desktop:php-domxml-0:4.3.9-3.9.ia64", "4Desktop:php-domxml-0:4.3.9-3.9.ppc", "4Desktop:php-domxml-0:4.3.9-3.9.s390", "4Desktop:php-domxml-0:4.3.9-3.9.s390x", "4Desktop:php-domxml-0:4.3.9-3.9.x86_64", "4Desktop:php-gd-0:4.3.9-3.9.i386", "4Desktop:php-gd-0:4.3.9-3.9.ia64", "4Desktop:php-gd-0:4.3.9-3.9.ppc", "4Desktop:php-gd-0:4.3.9-3.9.s390", "4Desktop:php-gd-0:4.3.9-3.9.s390x", "4Desktop:php-gd-0:4.3.9-3.9.x86_64", "4Desktop:php-imap-0:4.3.9-3.9.i386", "4Desktop:php-imap-0:4.3.9-3.9.ia64", "4Desktop:php-imap-0:4.3.9-3.9.ppc", "4Desktop:php-imap-0:4.3.9-3.9.s390", "4Desktop:php-imap-0:4.3.9-3.9.s390x", "4Desktop:php-imap-0:4.3.9-3.9.x86_64", "4Desktop:php-ldap-0:4.3.9-3.9.i386", "4Desktop:php-ldap-0:4.3.9-3.9.ia64", "4Desktop:php-ldap-0:4.3.9-3.9.ppc", "4Desktop:php-ldap-0:4.3.9-3.9.s390", "4Desktop:php-ldap-0:4.3.9-3.9.s390x", "4Desktop:php-ldap-0:4.3.9-3.9.x86_64", "4Desktop:php-mbstring-0:4.3.9-3.9.i386", "4Desktop:php-mbstring-0:4.3.9-3.9.ia64", "4Desktop:php-mbstring-0:4.3.9-3.9.ppc", "4Desktop:php-mbstring-0:4.3.9-3.9.s390", "4Desktop:php-mbstring-0:4.3.9-3.9.s390x", "4Desktop:php-mbstring-0:4.3.9-3.9.x86_64", "4Desktop:php-mysql-0:4.3.9-3.9.i386", "4Desktop:php-mysql-0:4.3.9-3.9.ia64", "4Desktop:php-mysql-0:4.3.9-3.9.ppc", "4Desktop:php-mysql-0:4.3.9-3.9.s390", "4Desktop:php-mysql-0:4.3.9-3.9.s390x", "4Desktop:php-mysql-0:4.3.9-3.9.x86_64", "4Desktop:php-ncurses-0:4.3.9-3.9.i386", "4Desktop:php-ncurses-0:4.3.9-3.9.ia64", "4Desktop:php-ncurses-0:4.3.9-3.9.ppc", "4Desktop:php-ncurses-0:4.3.9-3.9.s390", "4Desktop:php-ncurses-0:4.3.9-3.9.s390x", "4Desktop:php-ncurses-0:4.3.9-3.9.x86_64", "4Desktop:php-odbc-0:4.3.9-3.9.i386", "4Desktop:php-odbc-0:4.3.9-3.9.ia64", "4Desktop:php-odbc-0:4.3.9-3.9.ppc", "4Desktop:php-odbc-0:4.3.9-3.9.s390", "4Desktop:php-odbc-0:4.3.9-3.9.s390x", "4Desktop:php-odbc-0:4.3.9-3.9.x86_64", "4Desktop:php-pear-0:4.3.9-3.9.i386", "4Desktop:php-pear-0:4.3.9-3.9.ia64", "4Desktop:php-pear-0:4.3.9-3.9.ppc", "4Desktop:php-pear-0:4.3.9-3.9.s390", "4Desktop:php-pear-0:4.3.9-3.9.s390x", "4Desktop:php-pear-0:4.3.9-3.9.x86_64", "4Desktop:php-pgsql-0:4.3.9-3.9.i386", "4Desktop:php-pgsql-0:4.3.9-3.9.ia64", "4Desktop:php-pgsql-0:4.3.9-3.9.ppc", "4Desktop:php-pgsql-0:4.3.9-3.9.s390", "4Desktop:php-pgsql-0:4.3.9-3.9.s390x", "4Desktop:php-pgsql-0:4.3.9-3.9.x86_64", "4Desktop:php-snmp-0:4.3.9-3.9.i386", "4Desktop:php-snmp-0:4.3.9-3.9.ia64", "4Desktop:php-snmp-0:4.3.9-3.9.ppc", "4Desktop:php-snmp-0:4.3.9-3.9.s390", "4Desktop:php-snmp-0:4.3.9-3.9.s390x", "4Desktop:php-snmp-0:4.3.9-3.9.x86_64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.i386", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ia64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ppc", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390x", "4Desktop:php-xmlrpc-0:4.3.9-3.9.x86_64", "4ES:php-0:4.3.9-3.9.i386", "4ES:php-0:4.3.9-3.9.ia64", "4ES:php-0:4.3.9-3.9.ppc", "4ES:php-0:4.3.9-3.9.s390", "4ES:php-0:4.3.9-3.9.s390x", "4ES:php-0:4.3.9-3.9.src", "4ES:php-0:4.3.9-3.9.x86_64", "4ES:php-debuginfo-0:4.3.9-3.9.i386", "4ES:php-debuginfo-0:4.3.9-3.9.ia64", "4ES:php-debuginfo-0:4.3.9-3.9.ppc", "4ES:php-debuginfo-0:4.3.9-3.9.s390", "4ES:php-debuginfo-0:4.3.9-3.9.s390x", "4ES:php-debuginfo-0:4.3.9-3.9.x86_64", "4ES:php-devel-0:4.3.9-3.9.i386", "4ES:php-devel-0:4.3.9-3.9.ia64", "4ES:php-devel-0:4.3.9-3.9.ppc", "4ES:php-devel-0:4.3.9-3.9.s390", "4ES:php-devel-0:4.3.9-3.9.s390x", "4ES:php-devel-0:4.3.9-3.9.x86_64", "4ES:php-domxml-0:4.3.9-3.9.i386", "4ES:php-domxml-0:4.3.9-3.9.ia64", "4ES:php-domxml-0:4.3.9-3.9.ppc", "4ES:php-domxml-0:4.3.9-3.9.s390", "4ES:php-domxml-0:4.3.9-3.9.s390x", "4ES:php-domxml-0:4.3.9-3.9.x86_64", "4ES:php-gd-0:4.3.9-3.9.i386", "4ES:php-gd-0:4.3.9-3.9.ia64", "4ES:php-gd-0:4.3.9-3.9.ppc", "4ES:php-gd-0:4.3.9-3.9.s390", "4ES:php-gd-0:4.3.9-3.9.s390x", "4ES:php-gd-0:4.3.9-3.9.x86_64", "4ES:php-imap-0:4.3.9-3.9.i386", "4ES:php-imap-0:4.3.9-3.9.ia64", "4ES:php-imap-0:4.3.9-3.9.ppc", "4ES:php-imap-0:4.3.9-3.9.s390", "4ES:php-imap-0:4.3.9-3.9.s390x", "4ES:php-imap-0:4.3.9-3.9.x86_64", "4ES:php-ldap-0:4.3.9-3.9.i386", "4ES:php-ldap-0:4.3.9-3.9.ia64", "4ES:php-ldap-0:4.3.9-3.9.ppc", "4ES:php-ldap-0:4.3.9-3.9.s390", "4ES:php-ldap-0:4.3.9-3.9.s390x", "4ES:php-ldap-0:4.3.9-3.9.x86_64", "4ES:php-mbstring-0:4.3.9-3.9.i386", "4ES:php-mbstring-0:4.3.9-3.9.ia64", "4ES:php-mbstring-0:4.3.9-3.9.ppc", "4ES:php-mbstring-0:4.3.9-3.9.s390", "4ES:php-mbstring-0:4.3.9-3.9.s390x", "4ES:php-mbstring-0:4.3.9-3.9.x86_64", "4ES:php-mysql-0:4.3.9-3.9.i386", "4ES:php-mysql-0:4.3.9-3.9.ia64", "4ES:php-mysql-0:4.3.9-3.9.ppc", "4ES:php-mysql-0:4.3.9-3.9.s390", "4ES:php-mysql-0:4.3.9-3.9.s390x", "4ES:php-mysql-0:4.3.9-3.9.x86_64", "4ES:php-ncurses-0:4.3.9-3.9.i386", "4ES:php-ncurses-0:4.3.9-3.9.ia64", "4ES:php-ncurses-0:4.3.9-3.9.ppc", "4ES:php-ncurses-0:4.3.9-3.9.s390", "4ES:php-ncurses-0:4.3.9-3.9.s390x", "4ES:php-ncurses-0:4.3.9-3.9.x86_64", "4ES:php-odbc-0:4.3.9-3.9.i386", "4ES:php-odbc-0:4.3.9-3.9.ia64", "4ES:php-odbc-0:4.3.9-3.9.ppc", "4ES:php-odbc-0:4.3.9-3.9.s390", "4ES:php-odbc-0:4.3.9-3.9.s390x", "4ES:php-odbc-0:4.3.9-3.9.x86_64", "4ES:php-pear-0:4.3.9-3.9.i386", "4ES:php-pear-0:4.3.9-3.9.ia64", "4ES:php-pear-0:4.3.9-3.9.ppc", "4ES:php-pear-0:4.3.9-3.9.s390", "4ES:php-pear-0:4.3.9-3.9.s390x", "4ES:php-pear-0:4.3.9-3.9.x86_64", "4ES:php-pgsql-0:4.3.9-3.9.i386", "4ES:php-pgsql-0:4.3.9-3.9.ia64", "4ES:php-pgsql-0:4.3.9-3.9.ppc", "4ES:php-pgsql-0:4.3.9-3.9.s390", "4ES:php-pgsql-0:4.3.9-3.9.s390x", "4ES:php-pgsql-0:4.3.9-3.9.x86_64", "4ES:php-snmp-0:4.3.9-3.9.i386", "4ES:php-snmp-0:4.3.9-3.9.ia64", "4ES:php-snmp-0:4.3.9-3.9.ppc", "4ES:php-snmp-0:4.3.9-3.9.s390", "4ES:php-snmp-0:4.3.9-3.9.s390x", "4ES:php-snmp-0:4.3.9-3.9.x86_64", "4ES:php-xmlrpc-0:4.3.9-3.9.i386", "4ES:php-xmlrpc-0:4.3.9-3.9.ia64", "4ES:php-xmlrpc-0:4.3.9-3.9.ppc", "4ES:php-xmlrpc-0:4.3.9-3.9.s390", "4ES:php-xmlrpc-0:4.3.9-3.9.s390x", "4ES:php-xmlrpc-0:4.3.9-3.9.x86_64", "4WS:php-0:4.3.9-3.9.i386", "4WS:php-0:4.3.9-3.9.ia64", "4WS:php-0:4.3.9-3.9.ppc", "4WS:php-0:4.3.9-3.9.s390", "4WS:php-0:4.3.9-3.9.s390x", "4WS:php-0:4.3.9-3.9.src", "4WS:php-0:4.3.9-3.9.x86_64", "4WS:php-debuginfo-0:4.3.9-3.9.i386", "4WS:php-debuginfo-0:4.3.9-3.9.ia64", "4WS:php-debuginfo-0:4.3.9-3.9.ppc", "4WS:php-debuginfo-0:4.3.9-3.9.s390", "4WS:php-debuginfo-0:4.3.9-3.9.s390x", "4WS:php-debuginfo-0:4.3.9-3.9.x86_64", "4WS:php-devel-0:4.3.9-3.9.i386", "4WS:php-devel-0:4.3.9-3.9.ia64", "4WS:php-devel-0:4.3.9-3.9.ppc", "4WS:php-devel-0:4.3.9-3.9.s390", "4WS:php-devel-0:4.3.9-3.9.s390x", "4WS:php-devel-0:4.3.9-3.9.x86_64", "4WS:php-domxml-0:4.3.9-3.9.i386", "4WS:php-domxml-0:4.3.9-3.9.ia64", "4WS:php-domxml-0:4.3.9-3.9.ppc", "4WS:php-domxml-0:4.3.9-3.9.s390", "4WS:php-domxml-0:4.3.9-3.9.s390x", "4WS:php-domxml-0:4.3.9-3.9.x86_64", "4WS:php-gd-0:4.3.9-3.9.i386", "4WS:php-gd-0:4.3.9-3.9.ia64", "4WS:php-gd-0:4.3.9-3.9.ppc", "4WS:php-gd-0:4.3.9-3.9.s390", "4WS:php-gd-0:4.3.9-3.9.s390x", "4WS:php-gd-0:4.3.9-3.9.x86_64", "4WS:php-imap-0:4.3.9-3.9.i386", "4WS:php-imap-0:4.3.9-3.9.ia64", "4WS:php-imap-0:4.3.9-3.9.ppc", "4WS:php-imap-0:4.3.9-3.9.s390", "4WS:php-imap-0:4.3.9-3.9.s390x", "4WS:php-imap-0:4.3.9-3.9.x86_64", "4WS:php-ldap-0:4.3.9-3.9.i386", "4WS:php-ldap-0:4.3.9-3.9.ia64", "4WS:php-ldap-0:4.3.9-3.9.ppc", "4WS:php-ldap-0:4.3.9-3.9.s390", "4WS:php-ldap-0:4.3.9-3.9.s390x", "4WS:php-ldap-0:4.3.9-3.9.x86_64", "4WS:php-mbstring-0:4.3.9-3.9.i386", "4WS:php-mbstring-0:4.3.9-3.9.ia64", "4WS:php-mbstring-0:4.3.9-3.9.ppc", "4WS:php-mbstring-0:4.3.9-3.9.s390", "4WS:php-mbstring-0:4.3.9-3.9.s390x", "4WS:php-mbstring-0:4.3.9-3.9.x86_64", "4WS:php-mysql-0:4.3.9-3.9.i386", "4WS:php-mysql-0:4.3.9-3.9.ia64", "4WS:php-mysql-0:4.3.9-3.9.ppc", "4WS:php-mysql-0:4.3.9-3.9.s390", "4WS:php-mysql-0:4.3.9-3.9.s390x", "4WS:php-mysql-0:4.3.9-3.9.x86_64", "4WS:php-ncurses-0:4.3.9-3.9.i386", "4WS:php-ncurses-0:4.3.9-3.9.ia64", "4WS:php-ncurses-0:4.3.9-3.9.ppc", "4WS:php-ncurses-0:4.3.9-3.9.s390", "4WS:php-ncurses-0:4.3.9-3.9.s390x", "4WS:php-ncurses-0:4.3.9-3.9.x86_64", "4WS:php-odbc-0:4.3.9-3.9.i386", "4WS:php-odbc-0:4.3.9-3.9.ia64", "4WS:php-odbc-0:4.3.9-3.9.ppc", "4WS:php-odbc-0:4.3.9-3.9.s390", "4WS:php-odbc-0:4.3.9-3.9.s390x", "4WS:php-odbc-0:4.3.9-3.9.x86_64", "4WS:php-pear-0:4.3.9-3.9.i386", "4WS:php-pear-0:4.3.9-3.9.ia64", "4WS:php-pear-0:4.3.9-3.9.ppc", "4WS:php-pear-0:4.3.9-3.9.s390", "4WS:php-pear-0:4.3.9-3.9.s390x", "4WS:php-pear-0:4.3.9-3.9.x86_64", "4WS:php-pgsql-0:4.3.9-3.9.i386", "4WS:php-pgsql-0:4.3.9-3.9.ia64", "4WS:php-pgsql-0:4.3.9-3.9.ppc", "4WS:php-pgsql-0:4.3.9-3.9.s390", "4WS:php-pgsql-0:4.3.9-3.9.s390x", "4WS:php-pgsql-0:4.3.9-3.9.x86_64", "4WS:php-snmp-0:4.3.9-3.9.i386", "4WS:php-snmp-0:4.3.9-3.9.ia64", "4WS:php-snmp-0:4.3.9-3.9.ppc", "4WS:php-snmp-0:4.3.9-3.9.s390", "4WS:php-snmp-0:4.3.9-3.9.s390x", "4WS:php-snmp-0:4.3.9-3.9.x86_64", "4WS:php-xmlrpc-0:4.3.9-3.9.i386", "4WS:php-xmlrpc-0:4.3.9-3.9.ia64", "4WS:php-xmlrpc-0:4.3.9-3.9.ppc", "4WS:php-xmlrpc-0:4.3.9-3.9.s390", "4WS:php-xmlrpc-0:4.3.9-3.9.s390x", "4WS:php-xmlrpc-0:4.3.9-3.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:831" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3389", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617822" } ], "notes": [ { "category": "description", "text": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:php-0:4.3.2-26.ent.i386", "3AS:php-0:4.3.2-26.ent.ia64", "3AS:php-0:4.3.2-26.ent.ppc", "3AS:php-0:4.3.2-26.ent.s390", "3AS:php-0:4.3.2-26.ent.s390x", "3AS:php-0:4.3.2-26.ent.src", "3AS:php-0:4.3.2-26.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-26.ent.i386", "3AS:php-debuginfo-0:4.3.2-26.ent.ia64", "3AS:php-debuginfo-0:4.3.2-26.ent.ppc", "3AS:php-debuginfo-0:4.3.2-26.ent.s390", "3AS:php-debuginfo-0:4.3.2-26.ent.s390x", "3AS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3AS:php-devel-0:4.3.2-26.ent.i386", "3AS:php-devel-0:4.3.2-26.ent.ia64", "3AS:php-devel-0:4.3.2-26.ent.ppc", "3AS:php-devel-0:4.3.2-26.ent.s390", "3AS:php-devel-0:4.3.2-26.ent.s390x", "3AS:php-devel-0:4.3.2-26.ent.x86_64", "3AS:php-imap-0:4.3.2-26.ent.i386", "3AS:php-imap-0:4.3.2-26.ent.ia64", "3AS:php-imap-0:4.3.2-26.ent.ppc", "3AS:php-imap-0:4.3.2-26.ent.s390", "3AS:php-imap-0:4.3.2-26.ent.s390x", "3AS:php-imap-0:4.3.2-26.ent.x86_64", "3AS:php-ldap-0:4.3.2-26.ent.i386", "3AS:php-ldap-0:4.3.2-26.ent.ia64", "3AS:php-ldap-0:4.3.2-26.ent.ppc", "3AS:php-ldap-0:4.3.2-26.ent.s390", "3AS:php-ldap-0:4.3.2-26.ent.s390x", "3AS:php-ldap-0:4.3.2-26.ent.x86_64", "3AS:php-mysql-0:4.3.2-26.ent.i386", "3AS:php-mysql-0:4.3.2-26.ent.ia64", "3AS:php-mysql-0:4.3.2-26.ent.ppc", "3AS:php-mysql-0:4.3.2-26.ent.s390", "3AS:php-mysql-0:4.3.2-26.ent.s390x", "3AS:php-mysql-0:4.3.2-26.ent.x86_64", "3AS:php-odbc-0:4.3.2-26.ent.i386", "3AS:php-odbc-0:4.3.2-26.ent.ia64", "3AS:php-odbc-0:4.3.2-26.ent.ppc", "3AS:php-odbc-0:4.3.2-26.ent.s390", "3AS:php-odbc-0:4.3.2-26.ent.s390x", "3AS:php-odbc-0:4.3.2-26.ent.x86_64", "3AS:php-pgsql-0:4.3.2-26.ent.i386", "3AS:php-pgsql-0:4.3.2-26.ent.ia64", "3AS:php-pgsql-0:4.3.2-26.ent.ppc", "3AS:php-pgsql-0:4.3.2-26.ent.s390", "3AS:php-pgsql-0:4.3.2-26.ent.s390x", "3AS:php-pgsql-0:4.3.2-26.ent.x86_64", "3Desktop:php-0:4.3.2-26.ent.i386", "3Desktop:php-0:4.3.2-26.ent.ia64", "3Desktop:php-0:4.3.2-26.ent.ppc", "3Desktop:php-0:4.3.2-26.ent.s390", "3Desktop:php-0:4.3.2-26.ent.s390x", "3Desktop:php-0:4.3.2-26.ent.src", "3Desktop:php-0:4.3.2-26.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-26.ent.x86_64", "3Desktop:php-devel-0:4.3.2-26.ent.i386", "3Desktop:php-devel-0:4.3.2-26.ent.ia64", "3Desktop:php-devel-0:4.3.2-26.ent.ppc", "3Desktop:php-devel-0:4.3.2-26.ent.s390", "3Desktop:php-devel-0:4.3.2-26.ent.s390x", "3Desktop:php-devel-0:4.3.2-26.ent.x86_64", "3Desktop:php-imap-0:4.3.2-26.ent.i386", "3Desktop:php-imap-0:4.3.2-26.ent.ia64", "3Desktop:php-imap-0:4.3.2-26.ent.ppc", "3Desktop:php-imap-0:4.3.2-26.ent.s390", "3Desktop:php-imap-0:4.3.2-26.ent.s390x", "3Desktop:php-imap-0:4.3.2-26.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-26.ent.i386", "3Desktop:php-ldap-0:4.3.2-26.ent.ia64", "3Desktop:php-ldap-0:4.3.2-26.ent.ppc", "3Desktop:php-ldap-0:4.3.2-26.ent.s390", "3Desktop:php-ldap-0:4.3.2-26.ent.s390x", "3Desktop:php-ldap-0:4.3.2-26.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-26.ent.i386", "3Desktop:php-mysql-0:4.3.2-26.ent.ia64", "3Desktop:php-mysql-0:4.3.2-26.ent.ppc", "3Desktop:php-mysql-0:4.3.2-26.ent.s390", "3Desktop:php-mysql-0:4.3.2-26.ent.s390x", "3Desktop:php-mysql-0:4.3.2-26.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-26.ent.i386", "3Desktop:php-odbc-0:4.3.2-26.ent.ia64", "3Desktop:php-odbc-0:4.3.2-26.ent.ppc", "3Desktop:php-odbc-0:4.3.2-26.ent.s390", "3Desktop:php-odbc-0:4.3.2-26.ent.s390x", "3Desktop:php-odbc-0:4.3.2-26.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-26.ent.i386", "3Desktop:php-pgsql-0:4.3.2-26.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-26.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-26.ent.x86_64", "3ES:php-0:4.3.2-26.ent.i386", "3ES:php-0:4.3.2-26.ent.ia64", "3ES:php-0:4.3.2-26.ent.ppc", "3ES:php-0:4.3.2-26.ent.s390", "3ES:php-0:4.3.2-26.ent.s390x", "3ES:php-0:4.3.2-26.ent.src", "3ES:php-0:4.3.2-26.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-26.ent.i386", "3ES:php-debuginfo-0:4.3.2-26.ent.ia64", "3ES:php-debuginfo-0:4.3.2-26.ent.ppc", "3ES:php-debuginfo-0:4.3.2-26.ent.s390", "3ES:php-debuginfo-0:4.3.2-26.ent.s390x", "3ES:php-debuginfo-0:4.3.2-26.ent.x86_64", "3ES:php-devel-0:4.3.2-26.ent.i386", "3ES:php-devel-0:4.3.2-26.ent.ia64", "3ES:php-devel-0:4.3.2-26.ent.ppc", "3ES:php-devel-0:4.3.2-26.ent.s390", "3ES:php-devel-0:4.3.2-26.ent.s390x", "3ES:php-devel-0:4.3.2-26.ent.x86_64", "3ES:php-imap-0:4.3.2-26.ent.i386", "3ES:php-imap-0:4.3.2-26.ent.ia64", "3ES:php-imap-0:4.3.2-26.ent.ppc", "3ES:php-imap-0:4.3.2-26.ent.s390", "3ES:php-imap-0:4.3.2-26.ent.s390x", "3ES:php-imap-0:4.3.2-26.ent.x86_64", "3ES:php-ldap-0:4.3.2-26.ent.i386", "3ES:php-ldap-0:4.3.2-26.ent.ia64", "3ES:php-ldap-0:4.3.2-26.ent.ppc", "3ES:php-ldap-0:4.3.2-26.ent.s390", "3ES:php-ldap-0:4.3.2-26.ent.s390x", "3ES:php-ldap-0:4.3.2-26.ent.x86_64", "3ES:php-mysql-0:4.3.2-26.ent.i386", "3ES:php-mysql-0:4.3.2-26.ent.ia64", "3ES:php-mysql-0:4.3.2-26.ent.ppc", "3ES:php-mysql-0:4.3.2-26.ent.s390", "3ES:php-mysql-0:4.3.2-26.ent.s390x", "3ES:php-mysql-0:4.3.2-26.ent.x86_64", "3ES:php-odbc-0:4.3.2-26.ent.i386", "3ES:php-odbc-0:4.3.2-26.ent.ia64", "3ES:php-odbc-0:4.3.2-26.ent.ppc", "3ES:php-odbc-0:4.3.2-26.ent.s390", "3ES:php-odbc-0:4.3.2-26.ent.s390x", "3ES:php-odbc-0:4.3.2-26.ent.x86_64", "3ES:php-pgsql-0:4.3.2-26.ent.i386", "3ES:php-pgsql-0:4.3.2-26.ent.ia64", "3ES:php-pgsql-0:4.3.2-26.ent.ppc", "3ES:php-pgsql-0:4.3.2-26.ent.s390", "3ES:php-pgsql-0:4.3.2-26.ent.s390x", "3ES:php-pgsql-0:4.3.2-26.ent.x86_64", "3WS:php-0:4.3.2-26.ent.i386", "3WS:php-0:4.3.2-26.ent.ia64", "3WS:php-0:4.3.2-26.ent.ppc", "3WS:php-0:4.3.2-26.ent.s390", "3WS:php-0:4.3.2-26.ent.s390x", "3WS:php-0:4.3.2-26.ent.src", "3WS:php-0:4.3.2-26.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-26.ent.i386", "3WS:php-debuginfo-0:4.3.2-26.ent.ia64", "3WS:php-debuginfo-0:4.3.2-26.ent.ppc", "3WS:php-debuginfo-0:4.3.2-26.ent.s390", "3WS:php-debuginfo-0:4.3.2-26.ent.s390x", "3WS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3WS:php-devel-0:4.3.2-26.ent.i386", "3WS:php-devel-0:4.3.2-26.ent.ia64", "3WS:php-devel-0:4.3.2-26.ent.ppc", "3WS:php-devel-0:4.3.2-26.ent.s390", "3WS:php-devel-0:4.3.2-26.ent.s390x", "3WS:php-devel-0:4.3.2-26.ent.x86_64", "3WS:php-imap-0:4.3.2-26.ent.i386", "3WS:php-imap-0:4.3.2-26.ent.ia64", "3WS:php-imap-0:4.3.2-26.ent.ppc", "3WS:php-imap-0:4.3.2-26.ent.s390", "3WS:php-imap-0:4.3.2-26.ent.s390x", "3WS:php-imap-0:4.3.2-26.ent.x86_64", "3WS:php-ldap-0:4.3.2-26.ent.i386", "3WS:php-ldap-0:4.3.2-26.ent.ia64", "3WS:php-ldap-0:4.3.2-26.ent.ppc", "3WS:php-ldap-0:4.3.2-26.ent.s390", "3WS:php-ldap-0:4.3.2-26.ent.s390x", "3WS:php-ldap-0:4.3.2-26.ent.x86_64", "3WS:php-mysql-0:4.3.2-26.ent.i386", "3WS:php-mysql-0:4.3.2-26.ent.ia64", "3WS:php-mysql-0:4.3.2-26.ent.ppc", "3WS:php-mysql-0:4.3.2-26.ent.s390", "3WS:php-mysql-0:4.3.2-26.ent.s390x", "3WS:php-mysql-0:4.3.2-26.ent.x86_64", "3WS:php-odbc-0:4.3.2-26.ent.i386", "3WS:php-odbc-0:4.3.2-26.ent.ia64", "3WS:php-odbc-0:4.3.2-26.ent.ppc", "3WS:php-odbc-0:4.3.2-26.ent.s390", "3WS:php-odbc-0:4.3.2-26.ent.s390x", "3WS:php-odbc-0:4.3.2-26.ent.x86_64", "3WS:php-pgsql-0:4.3.2-26.ent.i386", "3WS:php-pgsql-0:4.3.2-26.ent.ia64", "3WS:php-pgsql-0:4.3.2-26.ent.ppc", "3WS:php-pgsql-0:4.3.2-26.ent.s390", "3WS:php-pgsql-0:4.3.2-26.ent.s390x", "3WS:php-pgsql-0:4.3.2-26.ent.x86_64", "4AS:php-0:4.3.9-3.9.i386", "4AS:php-0:4.3.9-3.9.ia64", "4AS:php-0:4.3.9-3.9.ppc", "4AS:php-0:4.3.9-3.9.s390", "4AS:php-0:4.3.9-3.9.s390x", "4AS:php-0:4.3.9-3.9.src", "4AS:php-0:4.3.9-3.9.x86_64", "4AS:php-debuginfo-0:4.3.9-3.9.i386", "4AS:php-debuginfo-0:4.3.9-3.9.ia64", "4AS:php-debuginfo-0:4.3.9-3.9.ppc", "4AS:php-debuginfo-0:4.3.9-3.9.s390", "4AS:php-debuginfo-0:4.3.9-3.9.s390x", "4AS:php-debuginfo-0:4.3.9-3.9.x86_64", "4AS:php-devel-0:4.3.9-3.9.i386", "4AS:php-devel-0:4.3.9-3.9.ia64", "4AS:php-devel-0:4.3.9-3.9.ppc", "4AS:php-devel-0:4.3.9-3.9.s390", "4AS:php-devel-0:4.3.9-3.9.s390x", "4AS:php-devel-0:4.3.9-3.9.x86_64", "4AS:php-domxml-0:4.3.9-3.9.i386", "4AS:php-domxml-0:4.3.9-3.9.ia64", "4AS:php-domxml-0:4.3.9-3.9.ppc", "4AS:php-domxml-0:4.3.9-3.9.s390", "4AS:php-domxml-0:4.3.9-3.9.s390x", "4AS:php-domxml-0:4.3.9-3.9.x86_64", "4AS:php-gd-0:4.3.9-3.9.i386", "4AS:php-gd-0:4.3.9-3.9.ia64", "4AS:php-gd-0:4.3.9-3.9.ppc", "4AS:php-gd-0:4.3.9-3.9.s390", "4AS:php-gd-0:4.3.9-3.9.s390x", "4AS:php-gd-0:4.3.9-3.9.x86_64", "4AS:php-imap-0:4.3.9-3.9.i386", "4AS:php-imap-0:4.3.9-3.9.ia64", "4AS:php-imap-0:4.3.9-3.9.ppc", "4AS:php-imap-0:4.3.9-3.9.s390", "4AS:php-imap-0:4.3.9-3.9.s390x", "4AS:php-imap-0:4.3.9-3.9.x86_64", "4AS:php-ldap-0:4.3.9-3.9.i386", "4AS:php-ldap-0:4.3.9-3.9.ia64", "4AS:php-ldap-0:4.3.9-3.9.ppc", "4AS:php-ldap-0:4.3.9-3.9.s390", "4AS:php-ldap-0:4.3.9-3.9.s390x", "4AS:php-ldap-0:4.3.9-3.9.x86_64", "4AS:php-mbstring-0:4.3.9-3.9.i386", "4AS:php-mbstring-0:4.3.9-3.9.ia64", "4AS:php-mbstring-0:4.3.9-3.9.ppc", "4AS:php-mbstring-0:4.3.9-3.9.s390", "4AS:php-mbstring-0:4.3.9-3.9.s390x", "4AS:php-mbstring-0:4.3.9-3.9.x86_64", "4AS:php-mysql-0:4.3.9-3.9.i386", "4AS:php-mysql-0:4.3.9-3.9.ia64", "4AS:php-mysql-0:4.3.9-3.9.ppc", "4AS:php-mysql-0:4.3.9-3.9.s390", "4AS:php-mysql-0:4.3.9-3.9.s390x", "4AS:php-mysql-0:4.3.9-3.9.x86_64", "4AS:php-ncurses-0:4.3.9-3.9.i386", "4AS:php-ncurses-0:4.3.9-3.9.ia64", "4AS:php-ncurses-0:4.3.9-3.9.ppc", "4AS:php-ncurses-0:4.3.9-3.9.s390", "4AS:php-ncurses-0:4.3.9-3.9.s390x", "4AS:php-ncurses-0:4.3.9-3.9.x86_64", "4AS:php-odbc-0:4.3.9-3.9.i386", "4AS:php-odbc-0:4.3.9-3.9.ia64", "4AS:php-odbc-0:4.3.9-3.9.ppc", "4AS:php-odbc-0:4.3.9-3.9.s390", "4AS:php-odbc-0:4.3.9-3.9.s390x", "4AS:php-odbc-0:4.3.9-3.9.x86_64", "4AS:php-pear-0:4.3.9-3.9.i386", "4AS:php-pear-0:4.3.9-3.9.ia64", "4AS:php-pear-0:4.3.9-3.9.ppc", "4AS:php-pear-0:4.3.9-3.9.s390", "4AS:php-pear-0:4.3.9-3.9.s390x", "4AS:php-pear-0:4.3.9-3.9.x86_64", "4AS:php-pgsql-0:4.3.9-3.9.i386", "4AS:php-pgsql-0:4.3.9-3.9.ia64", "4AS:php-pgsql-0:4.3.9-3.9.ppc", "4AS:php-pgsql-0:4.3.9-3.9.s390", "4AS:php-pgsql-0:4.3.9-3.9.s390x", "4AS:php-pgsql-0:4.3.9-3.9.x86_64", "4AS:php-snmp-0:4.3.9-3.9.i386", "4AS:php-snmp-0:4.3.9-3.9.ia64", "4AS:php-snmp-0:4.3.9-3.9.ppc", "4AS:php-snmp-0:4.3.9-3.9.s390", "4AS:php-snmp-0:4.3.9-3.9.s390x", "4AS:php-snmp-0:4.3.9-3.9.x86_64", "4AS:php-xmlrpc-0:4.3.9-3.9.i386", "4AS:php-xmlrpc-0:4.3.9-3.9.ia64", "4AS:php-xmlrpc-0:4.3.9-3.9.ppc", "4AS:php-xmlrpc-0:4.3.9-3.9.s390", "4AS:php-xmlrpc-0:4.3.9-3.9.s390x", "4AS:php-xmlrpc-0:4.3.9-3.9.x86_64", "4Desktop:php-0:4.3.9-3.9.i386", "4Desktop:php-0:4.3.9-3.9.ia64", "4Desktop:php-0:4.3.9-3.9.ppc", "4Desktop:php-0:4.3.9-3.9.s390", "4Desktop:php-0:4.3.9-3.9.s390x", "4Desktop:php-0:4.3.9-3.9.src", "4Desktop:php-0:4.3.9-3.9.x86_64", "4Desktop:php-debuginfo-0:4.3.9-3.9.i386", "4Desktop:php-debuginfo-0:4.3.9-3.9.ia64", "4Desktop:php-debuginfo-0:4.3.9-3.9.ppc", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390x", "4Desktop:php-debuginfo-0:4.3.9-3.9.x86_64", "4Desktop:php-devel-0:4.3.9-3.9.i386", "4Desktop:php-devel-0:4.3.9-3.9.ia64", "4Desktop:php-devel-0:4.3.9-3.9.ppc", "4Desktop:php-devel-0:4.3.9-3.9.s390", "4Desktop:php-devel-0:4.3.9-3.9.s390x", "4Desktop:php-devel-0:4.3.9-3.9.x86_64", "4Desktop:php-domxml-0:4.3.9-3.9.i386", "4Desktop:php-domxml-0:4.3.9-3.9.ia64", "4Desktop:php-domxml-0:4.3.9-3.9.ppc", "4Desktop:php-domxml-0:4.3.9-3.9.s390", "4Desktop:php-domxml-0:4.3.9-3.9.s390x", "4Desktop:php-domxml-0:4.3.9-3.9.x86_64", "4Desktop:php-gd-0:4.3.9-3.9.i386", "4Desktop:php-gd-0:4.3.9-3.9.ia64", "4Desktop:php-gd-0:4.3.9-3.9.ppc", "4Desktop:php-gd-0:4.3.9-3.9.s390", "4Desktop:php-gd-0:4.3.9-3.9.s390x", "4Desktop:php-gd-0:4.3.9-3.9.x86_64", "4Desktop:php-imap-0:4.3.9-3.9.i386", "4Desktop:php-imap-0:4.3.9-3.9.ia64", "4Desktop:php-imap-0:4.3.9-3.9.ppc", "4Desktop:php-imap-0:4.3.9-3.9.s390", "4Desktop:php-imap-0:4.3.9-3.9.s390x", "4Desktop:php-imap-0:4.3.9-3.9.x86_64", "4Desktop:php-ldap-0:4.3.9-3.9.i386", "4Desktop:php-ldap-0:4.3.9-3.9.ia64", "4Desktop:php-ldap-0:4.3.9-3.9.ppc", "4Desktop:php-ldap-0:4.3.9-3.9.s390", "4Desktop:php-ldap-0:4.3.9-3.9.s390x", "4Desktop:php-ldap-0:4.3.9-3.9.x86_64", "4Desktop:php-mbstring-0:4.3.9-3.9.i386", "4Desktop:php-mbstring-0:4.3.9-3.9.ia64", "4Desktop:php-mbstring-0:4.3.9-3.9.ppc", "4Desktop:php-mbstring-0:4.3.9-3.9.s390", "4Desktop:php-mbstring-0:4.3.9-3.9.s390x", "4Desktop:php-mbstring-0:4.3.9-3.9.x86_64", "4Desktop:php-mysql-0:4.3.9-3.9.i386", "4Desktop:php-mysql-0:4.3.9-3.9.ia64", "4Desktop:php-mysql-0:4.3.9-3.9.ppc", "4Desktop:php-mysql-0:4.3.9-3.9.s390", "4Desktop:php-mysql-0:4.3.9-3.9.s390x", "4Desktop:php-mysql-0:4.3.9-3.9.x86_64", "4Desktop:php-ncurses-0:4.3.9-3.9.i386", "4Desktop:php-ncurses-0:4.3.9-3.9.ia64", "4Desktop:php-ncurses-0:4.3.9-3.9.ppc", "4Desktop:php-ncurses-0:4.3.9-3.9.s390", "4Desktop:php-ncurses-0:4.3.9-3.9.s390x", "4Desktop:php-ncurses-0:4.3.9-3.9.x86_64", "4Desktop:php-odbc-0:4.3.9-3.9.i386", "4Desktop:php-odbc-0:4.3.9-3.9.ia64", "4Desktop:php-odbc-0:4.3.9-3.9.ppc", "4Desktop:php-odbc-0:4.3.9-3.9.s390", "4Desktop:php-odbc-0:4.3.9-3.9.s390x", "4Desktop:php-odbc-0:4.3.9-3.9.x86_64", "4Desktop:php-pear-0:4.3.9-3.9.i386", "4Desktop:php-pear-0:4.3.9-3.9.ia64", "4Desktop:php-pear-0:4.3.9-3.9.ppc", "4Desktop:php-pear-0:4.3.9-3.9.s390", "4Desktop:php-pear-0:4.3.9-3.9.s390x", "4Desktop:php-pear-0:4.3.9-3.9.x86_64", "4Desktop:php-pgsql-0:4.3.9-3.9.i386", "4Desktop:php-pgsql-0:4.3.9-3.9.ia64", "4Desktop:php-pgsql-0:4.3.9-3.9.ppc", "4Desktop:php-pgsql-0:4.3.9-3.9.s390", "4Desktop:php-pgsql-0:4.3.9-3.9.s390x", "4Desktop:php-pgsql-0:4.3.9-3.9.x86_64", "4Desktop:php-snmp-0:4.3.9-3.9.i386", "4Desktop:php-snmp-0:4.3.9-3.9.ia64", "4Desktop:php-snmp-0:4.3.9-3.9.ppc", "4Desktop:php-snmp-0:4.3.9-3.9.s390", "4Desktop:php-snmp-0:4.3.9-3.9.s390x", "4Desktop:php-snmp-0:4.3.9-3.9.x86_64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.i386", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ia64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ppc", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390x", "4Desktop:php-xmlrpc-0:4.3.9-3.9.x86_64", "4ES:php-0:4.3.9-3.9.i386", "4ES:php-0:4.3.9-3.9.ia64", "4ES:php-0:4.3.9-3.9.ppc", "4ES:php-0:4.3.9-3.9.s390", "4ES:php-0:4.3.9-3.9.s390x", "4ES:php-0:4.3.9-3.9.src", "4ES:php-0:4.3.9-3.9.x86_64", "4ES:php-debuginfo-0:4.3.9-3.9.i386", "4ES:php-debuginfo-0:4.3.9-3.9.ia64", "4ES:php-debuginfo-0:4.3.9-3.9.ppc", "4ES:php-debuginfo-0:4.3.9-3.9.s390", "4ES:php-debuginfo-0:4.3.9-3.9.s390x", "4ES:php-debuginfo-0:4.3.9-3.9.x86_64", "4ES:php-devel-0:4.3.9-3.9.i386", "4ES:php-devel-0:4.3.9-3.9.ia64", "4ES:php-devel-0:4.3.9-3.9.ppc", "4ES:php-devel-0:4.3.9-3.9.s390", "4ES:php-devel-0:4.3.9-3.9.s390x", "4ES:php-devel-0:4.3.9-3.9.x86_64", "4ES:php-domxml-0:4.3.9-3.9.i386", "4ES:php-domxml-0:4.3.9-3.9.ia64", "4ES:php-domxml-0:4.3.9-3.9.ppc", "4ES:php-domxml-0:4.3.9-3.9.s390", "4ES:php-domxml-0:4.3.9-3.9.s390x", "4ES:php-domxml-0:4.3.9-3.9.x86_64", "4ES:php-gd-0:4.3.9-3.9.i386", "4ES:php-gd-0:4.3.9-3.9.ia64", "4ES:php-gd-0:4.3.9-3.9.ppc", "4ES:php-gd-0:4.3.9-3.9.s390", "4ES:php-gd-0:4.3.9-3.9.s390x", "4ES:php-gd-0:4.3.9-3.9.x86_64", "4ES:php-imap-0:4.3.9-3.9.i386", "4ES:php-imap-0:4.3.9-3.9.ia64", "4ES:php-imap-0:4.3.9-3.9.ppc", "4ES:php-imap-0:4.3.9-3.9.s390", "4ES:php-imap-0:4.3.9-3.9.s390x", "4ES:php-imap-0:4.3.9-3.9.x86_64", "4ES:php-ldap-0:4.3.9-3.9.i386", "4ES:php-ldap-0:4.3.9-3.9.ia64", "4ES:php-ldap-0:4.3.9-3.9.ppc", "4ES:php-ldap-0:4.3.9-3.9.s390", "4ES:php-ldap-0:4.3.9-3.9.s390x", "4ES:php-ldap-0:4.3.9-3.9.x86_64", "4ES:php-mbstring-0:4.3.9-3.9.i386", "4ES:php-mbstring-0:4.3.9-3.9.ia64", "4ES:php-mbstring-0:4.3.9-3.9.ppc", "4ES:php-mbstring-0:4.3.9-3.9.s390", "4ES:php-mbstring-0:4.3.9-3.9.s390x", "4ES:php-mbstring-0:4.3.9-3.9.x86_64", "4ES:php-mysql-0:4.3.9-3.9.i386", "4ES:php-mysql-0:4.3.9-3.9.ia64", "4ES:php-mysql-0:4.3.9-3.9.ppc", "4ES:php-mysql-0:4.3.9-3.9.s390", "4ES:php-mysql-0:4.3.9-3.9.s390x", "4ES:php-mysql-0:4.3.9-3.9.x86_64", "4ES:php-ncurses-0:4.3.9-3.9.i386", "4ES:php-ncurses-0:4.3.9-3.9.ia64", "4ES:php-ncurses-0:4.3.9-3.9.ppc", "4ES:php-ncurses-0:4.3.9-3.9.s390", "4ES:php-ncurses-0:4.3.9-3.9.s390x", "4ES:php-ncurses-0:4.3.9-3.9.x86_64", "4ES:php-odbc-0:4.3.9-3.9.i386", "4ES:php-odbc-0:4.3.9-3.9.ia64", "4ES:php-odbc-0:4.3.9-3.9.ppc", "4ES:php-odbc-0:4.3.9-3.9.s390", "4ES:php-odbc-0:4.3.9-3.9.s390x", "4ES:php-odbc-0:4.3.9-3.9.x86_64", "4ES:php-pear-0:4.3.9-3.9.i386", "4ES:php-pear-0:4.3.9-3.9.ia64", "4ES:php-pear-0:4.3.9-3.9.ppc", "4ES:php-pear-0:4.3.9-3.9.s390", "4ES:php-pear-0:4.3.9-3.9.s390x", "4ES:php-pear-0:4.3.9-3.9.x86_64", "4ES:php-pgsql-0:4.3.9-3.9.i386", "4ES:php-pgsql-0:4.3.9-3.9.ia64", "4ES:php-pgsql-0:4.3.9-3.9.ppc", "4ES:php-pgsql-0:4.3.9-3.9.s390", "4ES:php-pgsql-0:4.3.9-3.9.s390x", "4ES:php-pgsql-0:4.3.9-3.9.x86_64", "4ES:php-snmp-0:4.3.9-3.9.i386", "4ES:php-snmp-0:4.3.9-3.9.ia64", "4ES:php-snmp-0:4.3.9-3.9.ppc", "4ES:php-snmp-0:4.3.9-3.9.s390", "4ES:php-snmp-0:4.3.9-3.9.s390x", "4ES:php-snmp-0:4.3.9-3.9.x86_64", "4ES:php-xmlrpc-0:4.3.9-3.9.i386", "4ES:php-xmlrpc-0:4.3.9-3.9.ia64", "4ES:php-xmlrpc-0:4.3.9-3.9.ppc", "4ES:php-xmlrpc-0:4.3.9-3.9.s390", "4ES:php-xmlrpc-0:4.3.9-3.9.s390x", "4ES:php-xmlrpc-0:4.3.9-3.9.x86_64", "4WS:php-0:4.3.9-3.9.i386", "4WS:php-0:4.3.9-3.9.ia64", "4WS:php-0:4.3.9-3.9.ppc", "4WS:php-0:4.3.9-3.9.s390", "4WS:php-0:4.3.9-3.9.s390x", "4WS:php-0:4.3.9-3.9.src", "4WS:php-0:4.3.9-3.9.x86_64", "4WS:php-debuginfo-0:4.3.9-3.9.i386", "4WS:php-debuginfo-0:4.3.9-3.9.ia64", "4WS:php-debuginfo-0:4.3.9-3.9.ppc", "4WS:php-debuginfo-0:4.3.9-3.9.s390", "4WS:php-debuginfo-0:4.3.9-3.9.s390x", "4WS:php-debuginfo-0:4.3.9-3.9.x86_64", "4WS:php-devel-0:4.3.9-3.9.i386", "4WS:php-devel-0:4.3.9-3.9.ia64", "4WS:php-devel-0:4.3.9-3.9.ppc", "4WS:php-devel-0:4.3.9-3.9.s390", "4WS:php-devel-0:4.3.9-3.9.s390x", "4WS:php-devel-0:4.3.9-3.9.x86_64", "4WS:php-domxml-0:4.3.9-3.9.i386", "4WS:php-domxml-0:4.3.9-3.9.ia64", "4WS:php-domxml-0:4.3.9-3.9.ppc", "4WS:php-domxml-0:4.3.9-3.9.s390", "4WS:php-domxml-0:4.3.9-3.9.s390x", "4WS:php-domxml-0:4.3.9-3.9.x86_64", "4WS:php-gd-0:4.3.9-3.9.i386", "4WS:php-gd-0:4.3.9-3.9.ia64", "4WS:php-gd-0:4.3.9-3.9.ppc", "4WS:php-gd-0:4.3.9-3.9.s390", "4WS:php-gd-0:4.3.9-3.9.s390x", "4WS:php-gd-0:4.3.9-3.9.x86_64", "4WS:php-imap-0:4.3.9-3.9.i386", "4WS:php-imap-0:4.3.9-3.9.ia64", "4WS:php-imap-0:4.3.9-3.9.ppc", "4WS:php-imap-0:4.3.9-3.9.s390", "4WS:php-imap-0:4.3.9-3.9.s390x", "4WS:php-imap-0:4.3.9-3.9.x86_64", "4WS:php-ldap-0:4.3.9-3.9.i386", "4WS:php-ldap-0:4.3.9-3.9.ia64", "4WS:php-ldap-0:4.3.9-3.9.ppc", "4WS:php-ldap-0:4.3.9-3.9.s390", "4WS:php-ldap-0:4.3.9-3.9.s390x", "4WS:php-ldap-0:4.3.9-3.9.x86_64", "4WS:php-mbstring-0:4.3.9-3.9.i386", "4WS:php-mbstring-0:4.3.9-3.9.ia64", "4WS:php-mbstring-0:4.3.9-3.9.ppc", "4WS:php-mbstring-0:4.3.9-3.9.s390", "4WS:php-mbstring-0:4.3.9-3.9.s390x", "4WS:php-mbstring-0:4.3.9-3.9.x86_64", "4WS:php-mysql-0:4.3.9-3.9.i386", "4WS:php-mysql-0:4.3.9-3.9.ia64", "4WS:php-mysql-0:4.3.9-3.9.ppc", "4WS:php-mysql-0:4.3.9-3.9.s390", "4WS:php-mysql-0:4.3.9-3.9.s390x", "4WS:php-mysql-0:4.3.9-3.9.x86_64", "4WS:php-ncurses-0:4.3.9-3.9.i386", "4WS:php-ncurses-0:4.3.9-3.9.ia64", "4WS:php-ncurses-0:4.3.9-3.9.ppc", "4WS:php-ncurses-0:4.3.9-3.9.s390", "4WS:php-ncurses-0:4.3.9-3.9.s390x", "4WS:php-ncurses-0:4.3.9-3.9.x86_64", "4WS:php-odbc-0:4.3.9-3.9.i386", "4WS:php-odbc-0:4.3.9-3.9.ia64", "4WS:php-odbc-0:4.3.9-3.9.ppc", "4WS:php-odbc-0:4.3.9-3.9.s390", "4WS:php-odbc-0:4.3.9-3.9.s390x", "4WS:php-odbc-0:4.3.9-3.9.x86_64", "4WS:php-pear-0:4.3.9-3.9.i386", "4WS:php-pear-0:4.3.9-3.9.ia64", "4WS:php-pear-0:4.3.9-3.9.ppc", "4WS:php-pear-0:4.3.9-3.9.s390", "4WS:php-pear-0:4.3.9-3.9.s390x", "4WS:php-pear-0:4.3.9-3.9.x86_64", "4WS:php-pgsql-0:4.3.9-3.9.i386", "4WS:php-pgsql-0:4.3.9-3.9.ia64", "4WS:php-pgsql-0:4.3.9-3.9.ppc", "4WS:php-pgsql-0:4.3.9-3.9.s390", "4WS:php-pgsql-0:4.3.9-3.9.s390x", "4WS:php-pgsql-0:4.3.9-3.9.x86_64", "4WS:php-snmp-0:4.3.9-3.9.i386", "4WS:php-snmp-0:4.3.9-3.9.ia64", "4WS:php-snmp-0:4.3.9-3.9.ppc", "4WS:php-snmp-0:4.3.9-3.9.s390", "4WS:php-snmp-0:4.3.9-3.9.s390x", "4WS:php-snmp-0:4.3.9-3.9.x86_64", "4WS:php-xmlrpc-0:4.3.9-3.9.i386", "4WS:php-xmlrpc-0:4.3.9-3.9.ia64", "4WS:php-xmlrpc-0:4.3.9-3.9.ppc", "4WS:php-xmlrpc-0:4.3.9-3.9.s390", "4WS:php-xmlrpc-0:4.3.9-3.9.s390x", "4WS:php-xmlrpc-0:4.3.9-3.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3389" }, { "category": "external", "summary": "RHBZ#1617822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-11-10T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:php-0:4.3.2-26.ent.i386", "3AS:php-0:4.3.2-26.ent.ia64", "3AS:php-0:4.3.2-26.ent.ppc", "3AS:php-0:4.3.2-26.ent.s390", "3AS:php-0:4.3.2-26.ent.s390x", "3AS:php-0:4.3.2-26.ent.src", "3AS:php-0:4.3.2-26.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-26.ent.i386", "3AS:php-debuginfo-0:4.3.2-26.ent.ia64", "3AS:php-debuginfo-0:4.3.2-26.ent.ppc", "3AS:php-debuginfo-0:4.3.2-26.ent.s390", "3AS:php-debuginfo-0:4.3.2-26.ent.s390x", "3AS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3AS:php-devel-0:4.3.2-26.ent.i386", "3AS:php-devel-0:4.3.2-26.ent.ia64", "3AS:php-devel-0:4.3.2-26.ent.ppc", "3AS:php-devel-0:4.3.2-26.ent.s390", "3AS:php-devel-0:4.3.2-26.ent.s390x", "3AS:php-devel-0:4.3.2-26.ent.x86_64", "3AS:php-imap-0:4.3.2-26.ent.i386", "3AS:php-imap-0:4.3.2-26.ent.ia64", "3AS:php-imap-0:4.3.2-26.ent.ppc", "3AS:php-imap-0:4.3.2-26.ent.s390", "3AS:php-imap-0:4.3.2-26.ent.s390x", "3AS:php-imap-0:4.3.2-26.ent.x86_64", "3AS:php-ldap-0:4.3.2-26.ent.i386", "3AS:php-ldap-0:4.3.2-26.ent.ia64", "3AS:php-ldap-0:4.3.2-26.ent.ppc", "3AS:php-ldap-0:4.3.2-26.ent.s390", "3AS:php-ldap-0:4.3.2-26.ent.s390x", "3AS:php-ldap-0:4.3.2-26.ent.x86_64", "3AS:php-mysql-0:4.3.2-26.ent.i386", "3AS:php-mysql-0:4.3.2-26.ent.ia64", "3AS:php-mysql-0:4.3.2-26.ent.ppc", "3AS:php-mysql-0:4.3.2-26.ent.s390", "3AS:php-mysql-0:4.3.2-26.ent.s390x", "3AS:php-mysql-0:4.3.2-26.ent.x86_64", "3AS:php-odbc-0:4.3.2-26.ent.i386", "3AS:php-odbc-0:4.3.2-26.ent.ia64", "3AS:php-odbc-0:4.3.2-26.ent.ppc", "3AS:php-odbc-0:4.3.2-26.ent.s390", "3AS:php-odbc-0:4.3.2-26.ent.s390x", "3AS:php-odbc-0:4.3.2-26.ent.x86_64", "3AS:php-pgsql-0:4.3.2-26.ent.i386", "3AS:php-pgsql-0:4.3.2-26.ent.ia64", "3AS:php-pgsql-0:4.3.2-26.ent.ppc", "3AS:php-pgsql-0:4.3.2-26.ent.s390", "3AS:php-pgsql-0:4.3.2-26.ent.s390x", "3AS:php-pgsql-0:4.3.2-26.ent.x86_64", "3Desktop:php-0:4.3.2-26.ent.i386", "3Desktop:php-0:4.3.2-26.ent.ia64", "3Desktop:php-0:4.3.2-26.ent.ppc", "3Desktop:php-0:4.3.2-26.ent.s390", "3Desktop:php-0:4.3.2-26.ent.s390x", "3Desktop:php-0:4.3.2-26.ent.src", "3Desktop:php-0:4.3.2-26.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-26.ent.x86_64", "3Desktop:php-devel-0:4.3.2-26.ent.i386", "3Desktop:php-devel-0:4.3.2-26.ent.ia64", "3Desktop:php-devel-0:4.3.2-26.ent.ppc", "3Desktop:php-devel-0:4.3.2-26.ent.s390", "3Desktop:php-devel-0:4.3.2-26.ent.s390x", "3Desktop:php-devel-0:4.3.2-26.ent.x86_64", "3Desktop:php-imap-0:4.3.2-26.ent.i386", "3Desktop:php-imap-0:4.3.2-26.ent.ia64", "3Desktop:php-imap-0:4.3.2-26.ent.ppc", "3Desktop:php-imap-0:4.3.2-26.ent.s390", "3Desktop:php-imap-0:4.3.2-26.ent.s390x", "3Desktop:php-imap-0:4.3.2-26.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-26.ent.i386", "3Desktop:php-ldap-0:4.3.2-26.ent.ia64", "3Desktop:php-ldap-0:4.3.2-26.ent.ppc", "3Desktop:php-ldap-0:4.3.2-26.ent.s390", "3Desktop:php-ldap-0:4.3.2-26.ent.s390x", "3Desktop:php-ldap-0:4.3.2-26.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-26.ent.i386", "3Desktop:php-mysql-0:4.3.2-26.ent.ia64", "3Desktop:php-mysql-0:4.3.2-26.ent.ppc", "3Desktop:php-mysql-0:4.3.2-26.ent.s390", "3Desktop:php-mysql-0:4.3.2-26.ent.s390x", "3Desktop:php-mysql-0:4.3.2-26.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-26.ent.i386", "3Desktop:php-odbc-0:4.3.2-26.ent.ia64", "3Desktop:php-odbc-0:4.3.2-26.ent.ppc", "3Desktop:php-odbc-0:4.3.2-26.ent.s390", "3Desktop:php-odbc-0:4.3.2-26.ent.s390x", "3Desktop:php-odbc-0:4.3.2-26.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-26.ent.i386", "3Desktop:php-pgsql-0:4.3.2-26.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-26.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-26.ent.x86_64", "3ES:php-0:4.3.2-26.ent.i386", "3ES:php-0:4.3.2-26.ent.ia64", "3ES:php-0:4.3.2-26.ent.ppc", "3ES:php-0:4.3.2-26.ent.s390", "3ES:php-0:4.3.2-26.ent.s390x", "3ES:php-0:4.3.2-26.ent.src", "3ES:php-0:4.3.2-26.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-26.ent.i386", "3ES:php-debuginfo-0:4.3.2-26.ent.ia64", "3ES:php-debuginfo-0:4.3.2-26.ent.ppc", "3ES:php-debuginfo-0:4.3.2-26.ent.s390", "3ES:php-debuginfo-0:4.3.2-26.ent.s390x", "3ES:php-debuginfo-0:4.3.2-26.ent.x86_64", "3ES:php-devel-0:4.3.2-26.ent.i386", "3ES:php-devel-0:4.3.2-26.ent.ia64", "3ES:php-devel-0:4.3.2-26.ent.ppc", "3ES:php-devel-0:4.3.2-26.ent.s390", "3ES:php-devel-0:4.3.2-26.ent.s390x", "3ES:php-devel-0:4.3.2-26.ent.x86_64", "3ES:php-imap-0:4.3.2-26.ent.i386", "3ES:php-imap-0:4.3.2-26.ent.ia64", "3ES:php-imap-0:4.3.2-26.ent.ppc", "3ES:php-imap-0:4.3.2-26.ent.s390", "3ES:php-imap-0:4.3.2-26.ent.s390x", "3ES:php-imap-0:4.3.2-26.ent.x86_64", "3ES:php-ldap-0:4.3.2-26.ent.i386", "3ES:php-ldap-0:4.3.2-26.ent.ia64", "3ES:php-ldap-0:4.3.2-26.ent.ppc", "3ES:php-ldap-0:4.3.2-26.ent.s390", "3ES:php-ldap-0:4.3.2-26.ent.s390x", "3ES:php-ldap-0:4.3.2-26.ent.x86_64", "3ES:php-mysql-0:4.3.2-26.ent.i386", "3ES:php-mysql-0:4.3.2-26.ent.ia64", "3ES:php-mysql-0:4.3.2-26.ent.ppc", "3ES:php-mysql-0:4.3.2-26.ent.s390", "3ES:php-mysql-0:4.3.2-26.ent.s390x", "3ES:php-mysql-0:4.3.2-26.ent.x86_64", "3ES:php-odbc-0:4.3.2-26.ent.i386", "3ES:php-odbc-0:4.3.2-26.ent.ia64", "3ES:php-odbc-0:4.3.2-26.ent.ppc", "3ES:php-odbc-0:4.3.2-26.ent.s390", "3ES:php-odbc-0:4.3.2-26.ent.s390x", "3ES:php-odbc-0:4.3.2-26.ent.x86_64", "3ES:php-pgsql-0:4.3.2-26.ent.i386", "3ES:php-pgsql-0:4.3.2-26.ent.ia64", "3ES:php-pgsql-0:4.3.2-26.ent.ppc", "3ES:php-pgsql-0:4.3.2-26.ent.s390", "3ES:php-pgsql-0:4.3.2-26.ent.s390x", "3ES:php-pgsql-0:4.3.2-26.ent.x86_64", "3WS:php-0:4.3.2-26.ent.i386", "3WS:php-0:4.3.2-26.ent.ia64", "3WS:php-0:4.3.2-26.ent.ppc", "3WS:php-0:4.3.2-26.ent.s390", "3WS:php-0:4.3.2-26.ent.s390x", "3WS:php-0:4.3.2-26.ent.src", "3WS:php-0:4.3.2-26.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-26.ent.i386", "3WS:php-debuginfo-0:4.3.2-26.ent.ia64", "3WS:php-debuginfo-0:4.3.2-26.ent.ppc", "3WS:php-debuginfo-0:4.3.2-26.ent.s390", "3WS:php-debuginfo-0:4.3.2-26.ent.s390x", "3WS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3WS:php-devel-0:4.3.2-26.ent.i386", "3WS:php-devel-0:4.3.2-26.ent.ia64", "3WS:php-devel-0:4.3.2-26.ent.ppc", "3WS:php-devel-0:4.3.2-26.ent.s390", "3WS:php-devel-0:4.3.2-26.ent.s390x", "3WS:php-devel-0:4.3.2-26.ent.x86_64", "3WS:php-imap-0:4.3.2-26.ent.i386", "3WS:php-imap-0:4.3.2-26.ent.ia64", "3WS:php-imap-0:4.3.2-26.ent.ppc", "3WS:php-imap-0:4.3.2-26.ent.s390", "3WS:php-imap-0:4.3.2-26.ent.s390x", "3WS:php-imap-0:4.3.2-26.ent.x86_64", "3WS:php-ldap-0:4.3.2-26.ent.i386", "3WS:php-ldap-0:4.3.2-26.ent.ia64", "3WS:php-ldap-0:4.3.2-26.ent.ppc", "3WS:php-ldap-0:4.3.2-26.ent.s390", "3WS:php-ldap-0:4.3.2-26.ent.s390x", "3WS:php-ldap-0:4.3.2-26.ent.x86_64", "3WS:php-mysql-0:4.3.2-26.ent.i386", "3WS:php-mysql-0:4.3.2-26.ent.ia64", "3WS:php-mysql-0:4.3.2-26.ent.ppc", "3WS:php-mysql-0:4.3.2-26.ent.s390", "3WS:php-mysql-0:4.3.2-26.ent.s390x", "3WS:php-mysql-0:4.3.2-26.ent.x86_64", "3WS:php-odbc-0:4.3.2-26.ent.i386", "3WS:php-odbc-0:4.3.2-26.ent.ia64", "3WS:php-odbc-0:4.3.2-26.ent.ppc", "3WS:php-odbc-0:4.3.2-26.ent.s390", "3WS:php-odbc-0:4.3.2-26.ent.s390x", "3WS:php-odbc-0:4.3.2-26.ent.x86_64", "3WS:php-pgsql-0:4.3.2-26.ent.i386", "3WS:php-pgsql-0:4.3.2-26.ent.ia64", "3WS:php-pgsql-0:4.3.2-26.ent.ppc", "3WS:php-pgsql-0:4.3.2-26.ent.s390", "3WS:php-pgsql-0:4.3.2-26.ent.s390x", "3WS:php-pgsql-0:4.3.2-26.ent.x86_64", "4AS:php-0:4.3.9-3.9.i386", "4AS:php-0:4.3.9-3.9.ia64", "4AS:php-0:4.3.9-3.9.ppc", "4AS:php-0:4.3.9-3.9.s390", "4AS:php-0:4.3.9-3.9.s390x", "4AS:php-0:4.3.9-3.9.src", "4AS:php-0:4.3.9-3.9.x86_64", "4AS:php-debuginfo-0:4.3.9-3.9.i386", "4AS:php-debuginfo-0:4.3.9-3.9.ia64", "4AS:php-debuginfo-0:4.3.9-3.9.ppc", "4AS:php-debuginfo-0:4.3.9-3.9.s390", "4AS:php-debuginfo-0:4.3.9-3.9.s390x", "4AS:php-debuginfo-0:4.3.9-3.9.x86_64", "4AS:php-devel-0:4.3.9-3.9.i386", "4AS:php-devel-0:4.3.9-3.9.ia64", "4AS:php-devel-0:4.3.9-3.9.ppc", "4AS:php-devel-0:4.3.9-3.9.s390", "4AS:php-devel-0:4.3.9-3.9.s390x", "4AS:php-devel-0:4.3.9-3.9.x86_64", "4AS:php-domxml-0:4.3.9-3.9.i386", "4AS:php-domxml-0:4.3.9-3.9.ia64", "4AS:php-domxml-0:4.3.9-3.9.ppc", "4AS:php-domxml-0:4.3.9-3.9.s390", "4AS:php-domxml-0:4.3.9-3.9.s390x", "4AS:php-domxml-0:4.3.9-3.9.x86_64", "4AS:php-gd-0:4.3.9-3.9.i386", "4AS:php-gd-0:4.3.9-3.9.ia64", "4AS:php-gd-0:4.3.9-3.9.ppc", "4AS:php-gd-0:4.3.9-3.9.s390", "4AS:php-gd-0:4.3.9-3.9.s390x", "4AS:php-gd-0:4.3.9-3.9.x86_64", "4AS:php-imap-0:4.3.9-3.9.i386", "4AS:php-imap-0:4.3.9-3.9.ia64", "4AS:php-imap-0:4.3.9-3.9.ppc", "4AS:php-imap-0:4.3.9-3.9.s390", "4AS:php-imap-0:4.3.9-3.9.s390x", "4AS:php-imap-0:4.3.9-3.9.x86_64", "4AS:php-ldap-0:4.3.9-3.9.i386", "4AS:php-ldap-0:4.3.9-3.9.ia64", "4AS:php-ldap-0:4.3.9-3.9.ppc", "4AS:php-ldap-0:4.3.9-3.9.s390", "4AS:php-ldap-0:4.3.9-3.9.s390x", "4AS:php-ldap-0:4.3.9-3.9.x86_64", "4AS:php-mbstring-0:4.3.9-3.9.i386", "4AS:php-mbstring-0:4.3.9-3.9.ia64", "4AS:php-mbstring-0:4.3.9-3.9.ppc", "4AS:php-mbstring-0:4.3.9-3.9.s390", "4AS:php-mbstring-0:4.3.9-3.9.s390x", "4AS:php-mbstring-0:4.3.9-3.9.x86_64", "4AS:php-mysql-0:4.3.9-3.9.i386", "4AS:php-mysql-0:4.3.9-3.9.ia64", "4AS:php-mysql-0:4.3.9-3.9.ppc", "4AS:php-mysql-0:4.3.9-3.9.s390", "4AS:php-mysql-0:4.3.9-3.9.s390x", "4AS:php-mysql-0:4.3.9-3.9.x86_64", "4AS:php-ncurses-0:4.3.9-3.9.i386", "4AS:php-ncurses-0:4.3.9-3.9.ia64", "4AS:php-ncurses-0:4.3.9-3.9.ppc", "4AS:php-ncurses-0:4.3.9-3.9.s390", "4AS:php-ncurses-0:4.3.9-3.9.s390x", "4AS:php-ncurses-0:4.3.9-3.9.x86_64", "4AS:php-odbc-0:4.3.9-3.9.i386", "4AS:php-odbc-0:4.3.9-3.9.ia64", "4AS:php-odbc-0:4.3.9-3.9.ppc", "4AS:php-odbc-0:4.3.9-3.9.s390", "4AS:php-odbc-0:4.3.9-3.9.s390x", "4AS:php-odbc-0:4.3.9-3.9.x86_64", "4AS:php-pear-0:4.3.9-3.9.i386", "4AS:php-pear-0:4.3.9-3.9.ia64", "4AS:php-pear-0:4.3.9-3.9.ppc", "4AS:php-pear-0:4.3.9-3.9.s390", "4AS:php-pear-0:4.3.9-3.9.s390x", "4AS:php-pear-0:4.3.9-3.9.x86_64", "4AS:php-pgsql-0:4.3.9-3.9.i386", "4AS:php-pgsql-0:4.3.9-3.9.ia64", "4AS:php-pgsql-0:4.3.9-3.9.ppc", "4AS:php-pgsql-0:4.3.9-3.9.s390", "4AS:php-pgsql-0:4.3.9-3.9.s390x", "4AS:php-pgsql-0:4.3.9-3.9.x86_64", "4AS:php-snmp-0:4.3.9-3.9.i386", "4AS:php-snmp-0:4.3.9-3.9.ia64", "4AS:php-snmp-0:4.3.9-3.9.ppc", "4AS:php-snmp-0:4.3.9-3.9.s390", "4AS:php-snmp-0:4.3.9-3.9.s390x", "4AS:php-snmp-0:4.3.9-3.9.x86_64", "4AS:php-xmlrpc-0:4.3.9-3.9.i386", "4AS:php-xmlrpc-0:4.3.9-3.9.ia64", "4AS:php-xmlrpc-0:4.3.9-3.9.ppc", "4AS:php-xmlrpc-0:4.3.9-3.9.s390", "4AS:php-xmlrpc-0:4.3.9-3.9.s390x", "4AS:php-xmlrpc-0:4.3.9-3.9.x86_64", "4Desktop:php-0:4.3.9-3.9.i386", "4Desktop:php-0:4.3.9-3.9.ia64", "4Desktop:php-0:4.3.9-3.9.ppc", "4Desktop:php-0:4.3.9-3.9.s390", "4Desktop:php-0:4.3.9-3.9.s390x", "4Desktop:php-0:4.3.9-3.9.src", "4Desktop:php-0:4.3.9-3.9.x86_64", "4Desktop:php-debuginfo-0:4.3.9-3.9.i386", "4Desktop:php-debuginfo-0:4.3.9-3.9.ia64", "4Desktop:php-debuginfo-0:4.3.9-3.9.ppc", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390x", "4Desktop:php-debuginfo-0:4.3.9-3.9.x86_64", "4Desktop:php-devel-0:4.3.9-3.9.i386", "4Desktop:php-devel-0:4.3.9-3.9.ia64", "4Desktop:php-devel-0:4.3.9-3.9.ppc", "4Desktop:php-devel-0:4.3.9-3.9.s390", "4Desktop:php-devel-0:4.3.9-3.9.s390x", "4Desktop:php-devel-0:4.3.9-3.9.x86_64", "4Desktop:php-domxml-0:4.3.9-3.9.i386", "4Desktop:php-domxml-0:4.3.9-3.9.ia64", "4Desktop:php-domxml-0:4.3.9-3.9.ppc", "4Desktop:php-domxml-0:4.3.9-3.9.s390", "4Desktop:php-domxml-0:4.3.9-3.9.s390x", "4Desktop:php-domxml-0:4.3.9-3.9.x86_64", "4Desktop:php-gd-0:4.3.9-3.9.i386", "4Desktop:php-gd-0:4.3.9-3.9.ia64", "4Desktop:php-gd-0:4.3.9-3.9.ppc", "4Desktop:php-gd-0:4.3.9-3.9.s390", "4Desktop:php-gd-0:4.3.9-3.9.s390x", "4Desktop:php-gd-0:4.3.9-3.9.x86_64", "4Desktop:php-imap-0:4.3.9-3.9.i386", "4Desktop:php-imap-0:4.3.9-3.9.ia64", "4Desktop:php-imap-0:4.3.9-3.9.ppc", "4Desktop:php-imap-0:4.3.9-3.9.s390", "4Desktop:php-imap-0:4.3.9-3.9.s390x", "4Desktop:php-imap-0:4.3.9-3.9.x86_64", "4Desktop:php-ldap-0:4.3.9-3.9.i386", "4Desktop:php-ldap-0:4.3.9-3.9.ia64", "4Desktop:php-ldap-0:4.3.9-3.9.ppc", "4Desktop:php-ldap-0:4.3.9-3.9.s390", "4Desktop:php-ldap-0:4.3.9-3.9.s390x", "4Desktop:php-ldap-0:4.3.9-3.9.x86_64", "4Desktop:php-mbstring-0:4.3.9-3.9.i386", "4Desktop:php-mbstring-0:4.3.9-3.9.ia64", "4Desktop:php-mbstring-0:4.3.9-3.9.ppc", "4Desktop:php-mbstring-0:4.3.9-3.9.s390", "4Desktop:php-mbstring-0:4.3.9-3.9.s390x", "4Desktop:php-mbstring-0:4.3.9-3.9.x86_64", "4Desktop:php-mysql-0:4.3.9-3.9.i386", "4Desktop:php-mysql-0:4.3.9-3.9.ia64", "4Desktop:php-mysql-0:4.3.9-3.9.ppc", "4Desktop:php-mysql-0:4.3.9-3.9.s390", "4Desktop:php-mysql-0:4.3.9-3.9.s390x", "4Desktop:php-mysql-0:4.3.9-3.9.x86_64", "4Desktop:php-ncurses-0:4.3.9-3.9.i386", "4Desktop:php-ncurses-0:4.3.9-3.9.ia64", "4Desktop:php-ncurses-0:4.3.9-3.9.ppc", "4Desktop:php-ncurses-0:4.3.9-3.9.s390", "4Desktop:php-ncurses-0:4.3.9-3.9.s390x", "4Desktop:php-ncurses-0:4.3.9-3.9.x86_64", "4Desktop:php-odbc-0:4.3.9-3.9.i386", "4Desktop:php-odbc-0:4.3.9-3.9.ia64", "4Desktop:php-odbc-0:4.3.9-3.9.ppc", "4Desktop:php-odbc-0:4.3.9-3.9.s390", "4Desktop:php-odbc-0:4.3.9-3.9.s390x", "4Desktop:php-odbc-0:4.3.9-3.9.x86_64", "4Desktop:php-pear-0:4.3.9-3.9.i386", "4Desktop:php-pear-0:4.3.9-3.9.ia64", "4Desktop:php-pear-0:4.3.9-3.9.ppc", "4Desktop:php-pear-0:4.3.9-3.9.s390", "4Desktop:php-pear-0:4.3.9-3.9.s390x", "4Desktop:php-pear-0:4.3.9-3.9.x86_64", "4Desktop:php-pgsql-0:4.3.9-3.9.i386", "4Desktop:php-pgsql-0:4.3.9-3.9.ia64", "4Desktop:php-pgsql-0:4.3.9-3.9.ppc", "4Desktop:php-pgsql-0:4.3.9-3.9.s390", "4Desktop:php-pgsql-0:4.3.9-3.9.s390x", "4Desktop:php-pgsql-0:4.3.9-3.9.x86_64", "4Desktop:php-snmp-0:4.3.9-3.9.i386", "4Desktop:php-snmp-0:4.3.9-3.9.ia64", "4Desktop:php-snmp-0:4.3.9-3.9.ppc", "4Desktop:php-snmp-0:4.3.9-3.9.s390", "4Desktop:php-snmp-0:4.3.9-3.9.s390x", "4Desktop:php-snmp-0:4.3.9-3.9.x86_64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.i386", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ia64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ppc", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390x", "4Desktop:php-xmlrpc-0:4.3.9-3.9.x86_64", "4ES:php-0:4.3.9-3.9.i386", "4ES:php-0:4.3.9-3.9.ia64", "4ES:php-0:4.3.9-3.9.ppc", "4ES:php-0:4.3.9-3.9.s390", "4ES:php-0:4.3.9-3.9.s390x", "4ES:php-0:4.3.9-3.9.src", "4ES:php-0:4.3.9-3.9.x86_64", "4ES:php-debuginfo-0:4.3.9-3.9.i386", "4ES:php-debuginfo-0:4.3.9-3.9.ia64", "4ES:php-debuginfo-0:4.3.9-3.9.ppc", "4ES:php-debuginfo-0:4.3.9-3.9.s390", "4ES:php-debuginfo-0:4.3.9-3.9.s390x", "4ES:php-debuginfo-0:4.3.9-3.9.x86_64", "4ES:php-devel-0:4.3.9-3.9.i386", "4ES:php-devel-0:4.3.9-3.9.ia64", "4ES:php-devel-0:4.3.9-3.9.ppc", "4ES:php-devel-0:4.3.9-3.9.s390", "4ES:php-devel-0:4.3.9-3.9.s390x", "4ES:php-devel-0:4.3.9-3.9.x86_64", "4ES:php-domxml-0:4.3.9-3.9.i386", "4ES:php-domxml-0:4.3.9-3.9.ia64", "4ES:php-domxml-0:4.3.9-3.9.ppc", "4ES:php-domxml-0:4.3.9-3.9.s390", "4ES:php-domxml-0:4.3.9-3.9.s390x", "4ES:php-domxml-0:4.3.9-3.9.x86_64", "4ES:php-gd-0:4.3.9-3.9.i386", "4ES:php-gd-0:4.3.9-3.9.ia64", "4ES:php-gd-0:4.3.9-3.9.ppc", "4ES:php-gd-0:4.3.9-3.9.s390", "4ES:php-gd-0:4.3.9-3.9.s390x", "4ES:php-gd-0:4.3.9-3.9.x86_64", "4ES:php-imap-0:4.3.9-3.9.i386", "4ES:php-imap-0:4.3.9-3.9.ia64", "4ES:php-imap-0:4.3.9-3.9.ppc", "4ES:php-imap-0:4.3.9-3.9.s390", "4ES:php-imap-0:4.3.9-3.9.s390x", "4ES:php-imap-0:4.3.9-3.9.x86_64", "4ES:php-ldap-0:4.3.9-3.9.i386", "4ES:php-ldap-0:4.3.9-3.9.ia64", "4ES:php-ldap-0:4.3.9-3.9.ppc", "4ES:php-ldap-0:4.3.9-3.9.s390", "4ES:php-ldap-0:4.3.9-3.9.s390x", "4ES:php-ldap-0:4.3.9-3.9.x86_64", "4ES:php-mbstring-0:4.3.9-3.9.i386", "4ES:php-mbstring-0:4.3.9-3.9.ia64", "4ES:php-mbstring-0:4.3.9-3.9.ppc", "4ES:php-mbstring-0:4.3.9-3.9.s390", "4ES:php-mbstring-0:4.3.9-3.9.s390x", "4ES:php-mbstring-0:4.3.9-3.9.x86_64", "4ES:php-mysql-0:4.3.9-3.9.i386", "4ES:php-mysql-0:4.3.9-3.9.ia64", "4ES:php-mysql-0:4.3.9-3.9.ppc", "4ES:php-mysql-0:4.3.9-3.9.s390", "4ES:php-mysql-0:4.3.9-3.9.s390x", "4ES:php-mysql-0:4.3.9-3.9.x86_64", "4ES:php-ncurses-0:4.3.9-3.9.i386", "4ES:php-ncurses-0:4.3.9-3.9.ia64", "4ES:php-ncurses-0:4.3.9-3.9.ppc", "4ES:php-ncurses-0:4.3.9-3.9.s390", "4ES:php-ncurses-0:4.3.9-3.9.s390x", "4ES:php-ncurses-0:4.3.9-3.9.x86_64", "4ES:php-odbc-0:4.3.9-3.9.i386", "4ES:php-odbc-0:4.3.9-3.9.ia64", "4ES:php-odbc-0:4.3.9-3.9.ppc", "4ES:php-odbc-0:4.3.9-3.9.s390", "4ES:php-odbc-0:4.3.9-3.9.s390x", "4ES:php-odbc-0:4.3.9-3.9.x86_64", "4ES:php-pear-0:4.3.9-3.9.i386", "4ES:php-pear-0:4.3.9-3.9.ia64", "4ES:php-pear-0:4.3.9-3.9.ppc", "4ES:php-pear-0:4.3.9-3.9.s390", "4ES:php-pear-0:4.3.9-3.9.s390x", "4ES:php-pear-0:4.3.9-3.9.x86_64", "4ES:php-pgsql-0:4.3.9-3.9.i386", "4ES:php-pgsql-0:4.3.9-3.9.ia64", "4ES:php-pgsql-0:4.3.9-3.9.ppc", "4ES:php-pgsql-0:4.3.9-3.9.s390", "4ES:php-pgsql-0:4.3.9-3.9.s390x", "4ES:php-pgsql-0:4.3.9-3.9.x86_64", "4ES:php-snmp-0:4.3.9-3.9.i386", "4ES:php-snmp-0:4.3.9-3.9.ia64", "4ES:php-snmp-0:4.3.9-3.9.ppc", "4ES:php-snmp-0:4.3.9-3.9.s390", "4ES:php-snmp-0:4.3.9-3.9.s390x", "4ES:php-snmp-0:4.3.9-3.9.x86_64", "4ES:php-xmlrpc-0:4.3.9-3.9.i386", "4ES:php-xmlrpc-0:4.3.9-3.9.ia64", "4ES:php-xmlrpc-0:4.3.9-3.9.ppc", "4ES:php-xmlrpc-0:4.3.9-3.9.s390", "4ES:php-xmlrpc-0:4.3.9-3.9.s390x", "4ES:php-xmlrpc-0:4.3.9-3.9.x86_64", "4WS:php-0:4.3.9-3.9.i386", "4WS:php-0:4.3.9-3.9.ia64", "4WS:php-0:4.3.9-3.9.ppc", "4WS:php-0:4.3.9-3.9.s390", "4WS:php-0:4.3.9-3.9.s390x", "4WS:php-0:4.3.9-3.9.src", "4WS:php-0:4.3.9-3.9.x86_64", "4WS:php-debuginfo-0:4.3.9-3.9.i386", "4WS:php-debuginfo-0:4.3.9-3.9.ia64", "4WS:php-debuginfo-0:4.3.9-3.9.ppc", "4WS:php-debuginfo-0:4.3.9-3.9.s390", "4WS:php-debuginfo-0:4.3.9-3.9.s390x", "4WS:php-debuginfo-0:4.3.9-3.9.x86_64", "4WS:php-devel-0:4.3.9-3.9.i386", "4WS:php-devel-0:4.3.9-3.9.ia64", "4WS:php-devel-0:4.3.9-3.9.ppc", "4WS:php-devel-0:4.3.9-3.9.s390", "4WS:php-devel-0:4.3.9-3.9.s390x", "4WS:php-devel-0:4.3.9-3.9.x86_64", "4WS:php-domxml-0:4.3.9-3.9.i386", "4WS:php-domxml-0:4.3.9-3.9.ia64", "4WS:php-domxml-0:4.3.9-3.9.ppc", "4WS:php-domxml-0:4.3.9-3.9.s390", "4WS:php-domxml-0:4.3.9-3.9.s390x", "4WS:php-domxml-0:4.3.9-3.9.x86_64", "4WS:php-gd-0:4.3.9-3.9.i386", "4WS:php-gd-0:4.3.9-3.9.ia64", "4WS:php-gd-0:4.3.9-3.9.ppc", "4WS:php-gd-0:4.3.9-3.9.s390", "4WS:php-gd-0:4.3.9-3.9.s390x", "4WS:php-gd-0:4.3.9-3.9.x86_64", "4WS:php-imap-0:4.3.9-3.9.i386", "4WS:php-imap-0:4.3.9-3.9.ia64", "4WS:php-imap-0:4.3.9-3.9.ppc", "4WS:php-imap-0:4.3.9-3.9.s390", "4WS:php-imap-0:4.3.9-3.9.s390x", "4WS:php-imap-0:4.3.9-3.9.x86_64", "4WS:php-ldap-0:4.3.9-3.9.i386", "4WS:php-ldap-0:4.3.9-3.9.ia64", "4WS:php-ldap-0:4.3.9-3.9.ppc", "4WS:php-ldap-0:4.3.9-3.9.s390", "4WS:php-ldap-0:4.3.9-3.9.s390x", "4WS:php-ldap-0:4.3.9-3.9.x86_64", "4WS:php-mbstring-0:4.3.9-3.9.i386", "4WS:php-mbstring-0:4.3.9-3.9.ia64", "4WS:php-mbstring-0:4.3.9-3.9.ppc", "4WS:php-mbstring-0:4.3.9-3.9.s390", "4WS:php-mbstring-0:4.3.9-3.9.s390x", "4WS:php-mbstring-0:4.3.9-3.9.x86_64", "4WS:php-mysql-0:4.3.9-3.9.i386", "4WS:php-mysql-0:4.3.9-3.9.ia64", "4WS:php-mysql-0:4.3.9-3.9.ppc", "4WS:php-mysql-0:4.3.9-3.9.s390", "4WS:php-mysql-0:4.3.9-3.9.s390x", "4WS:php-mysql-0:4.3.9-3.9.x86_64", "4WS:php-ncurses-0:4.3.9-3.9.i386", "4WS:php-ncurses-0:4.3.9-3.9.ia64", "4WS:php-ncurses-0:4.3.9-3.9.ppc", "4WS:php-ncurses-0:4.3.9-3.9.s390", "4WS:php-ncurses-0:4.3.9-3.9.s390x", "4WS:php-ncurses-0:4.3.9-3.9.x86_64", "4WS:php-odbc-0:4.3.9-3.9.i386", "4WS:php-odbc-0:4.3.9-3.9.ia64", "4WS:php-odbc-0:4.3.9-3.9.ppc", "4WS:php-odbc-0:4.3.9-3.9.s390", "4WS:php-odbc-0:4.3.9-3.9.s390x", "4WS:php-odbc-0:4.3.9-3.9.x86_64", "4WS:php-pear-0:4.3.9-3.9.i386", "4WS:php-pear-0:4.3.9-3.9.ia64", "4WS:php-pear-0:4.3.9-3.9.ppc", "4WS:php-pear-0:4.3.9-3.9.s390", "4WS:php-pear-0:4.3.9-3.9.s390x", "4WS:php-pear-0:4.3.9-3.9.x86_64", "4WS:php-pgsql-0:4.3.9-3.9.i386", "4WS:php-pgsql-0:4.3.9-3.9.ia64", "4WS:php-pgsql-0:4.3.9-3.9.ppc", "4WS:php-pgsql-0:4.3.9-3.9.s390", "4WS:php-pgsql-0:4.3.9-3.9.s390x", "4WS:php-pgsql-0:4.3.9-3.9.x86_64", "4WS:php-snmp-0:4.3.9-3.9.i386", "4WS:php-snmp-0:4.3.9-3.9.ia64", "4WS:php-snmp-0:4.3.9-3.9.ppc", "4WS:php-snmp-0:4.3.9-3.9.s390", "4WS:php-snmp-0:4.3.9-3.9.s390x", "4WS:php-snmp-0:4.3.9-3.9.x86_64", "4WS:php-xmlrpc-0:4.3.9-3.9.i386", "4WS:php-xmlrpc-0:4.3.9-3.9.ia64", "4WS:php-xmlrpc-0:4.3.9-3.9.ppc", "4WS:php-xmlrpc-0:4.3.9-3.9.s390", "4WS:php-xmlrpc-0:4.3.9-3.9.s390x", "4WS:php-xmlrpc-0:4.3.9-3.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:831" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3390", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617823" } ], "notes": [ { "category": "description", "text": "The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a \"GLOBALS\" fileupload field.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:php-0:4.3.2-26.ent.i386", "3AS:php-0:4.3.2-26.ent.ia64", "3AS:php-0:4.3.2-26.ent.ppc", "3AS:php-0:4.3.2-26.ent.s390", "3AS:php-0:4.3.2-26.ent.s390x", "3AS:php-0:4.3.2-26.ent.src", "3AS:php-0:4.3.2-26.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-26.ent.i386", "3AS:php-debuginfo-0:4.3.2-26.ent.ia64", "3AS:php-debuginfo-0:4.3.2-26.ent.ppc", "3AS:php-debuginfo-0:4.3.2-26.ent.s390", "3AS:php-debuginfo-0:4.3.2-26.ent.s390x", "3AS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3AS:php-devel-0:4.3.2-26.ent.i386", "3AS:php-devel-0:4.3.2-26.ent.ia64", "3AS:php-devel-0:4.3.2-26.ent.ppc", "3AS:php-devel-0:4.3.2-26.ent.s390", "3AS:php-devel-0:4.3.2-26.ent.s390x", "3AS:php-devel-0:4.3.2-26.ent.x86_64", "3AS:php-imap-0:4.3.2-26.ent.i386", "3AS:php-imap-0:4.3.2-26.ent.ia64", "3AS:php-imap-0:4.3.2-26.ent.ppc", "3AS:php-imap-0:4.3.2-26.ent.s390", "3AS:php-imap-0:4.3.2-26.ent.s390x", "3AS:php-imap-0:4.3.2-26.ent.x86_64", "3AS:php-ldap-0:4.3.2-26.ent.i386", "3AS:php-ldap-0:4.3.2-26.ent.ia64", "3AS:php-ldap-0:4.3.2-26.ent.ppc", "3AS:php-ldap-0:4.3.2-26.ent.s390", "3AS:php-ldap-0:4.3.2-26.ent.s390x", "3AS:php-ldap-0:4.3.2-26.ent.x86_64", "3AS:php-mysql-0:4.3.2-26.ent.i386", "3AS:php-mysql-0:4.3.2-26.ent.ia64", "3AS:php-mysql-0:4.3.2-26.ent.ppc", "3AS:php-mysql-0:4.3.2-26.ent.s390", "3AS:php-mysql-0:4.3.2-26.ent.s390x", "3AS:php-mysql-0:4.3.2-26.ent.x86_64", "3AS:php-odbc-0:4.3.2-26.ent.i386", "3AS:php-odbc-0:4.3.2-26.ent.ia64", "3AS:php-odbc-0:4.3.2-26.ent.ppc", "3AS:php-odbc-0:4.3.2-26.ent.s390", "3AS:php-odbc-0:4.3.2-26.ent.s390x", "3AS:php-odbc-0:4.3.2-26.ent.x86_64", "3AS:php-pgsql-0:4.3.2-26.ent.i386", "3AS:php-pgsql-0:4.3.2-26.ent.ia64", "3AS:php-pgsql-0:4.3.2-26.ent.ppc", "3AS:php-pgsql-0:4.3.2-26.ent.s390", "3AS:php-pgsql-0:4.3.2-26.ent.s390x", "3AS:php-pgsql-0:4.3.2-26.ent.x86_64", "3Desktop:php-0:4.3.2-26.ent.i386", "3Desktop:php-0:4.3.2-26.ent.ia64", "3Desktop:php-0:4.3.2-26.ent.ppc", "3Desktop:php-0:4.3.2-26.ent.s390", "3Desktop:php-0:4.3.2-26.ent.s390x", "3Desktop:php-0:4.3.2-26.ent.src", "3Desktop:php-0:4.3.2-26.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-26.ent.x86_64", "3Desktop:php-devel-0:4.3.2-26.ent.i386", "3Desktop:php-devel-0:4.3.2-26.ent.ia64", "3Desktop:php-devel-0:4.3.2-26.ent.ppc", "3Desktop:php-devel-0:4.3.2-26.ent.s390", "3Desktop:php-devel-0:4.3.2-26.ent.s390x", "3Desktop:php-devel-0:4.3.2-26.ent.x86_64", "3Desktop:php-imap-0:4.3.2-26.ent.i386", "3Desktop:php-imap-0:4.3.2-26.ent.ia64", "3Desktop:php-imap-0:4.3.2-26.ent.ppc", "3Desktop:php-imap-0:4.3.2-26.ent.s390", "3Desktop:php-imap-0:4.3.2-26.ent.s390x", "3Desktop:php-imap-0:4.3.2-26.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-26.ent.i386", "3Desktop:php-ldap-0:4.3.2-26.ent.ia64", "3Desktop:php-ldap-0:4.3.2-26.ent.ppc", "3Desktop:php-ldap-0:4.3.2-26.ent.s390", "3Desktop:php-ldap-0:4.3.2-26.ent.s390x", "3Desktop:php-ldap-0:4.3.2-26.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-26.ent.i386", "3Desktop:php-mysql-0:4.3.2-26.ent.ia64", "3Desktop:php-mysql-0:4.3.2-26.ent.ppc", "3Desktop:php-mysql-0:4.3.2-26.ent.s390", "3Desktop:php-mysql-0:4.3.2-26.ent.s390x", "3Desktop:php-mysql-0:4.3.2-26.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-26.ent.i386", "3Desktop:php-odbc-0:4.3.2-26.ent.ia64", "3Desktop:php-odbc-0:4.3.2-26.ent.ppc", "3Desktop:php-odbc-0:4.3.2-26.ent.s390", "3Desktop:php-odbc-0:4.3.2-26.ent.s390x", "3Desktop:php-odbc-0:4.3.2-26.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-26.ent.i386", "3Desktop:php-pgsql-0:4.3.2-26.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-26.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-26.ent.x86_64", "3ES:php-0:4.3.2-26.ent.i386", "3ES:php-0:4.3.2-26.ent.ia64", "3ES:php-0:4.3.2-26.ent.ppc", "3ES:php-0:4.3.2-26.ent.s390", "3ES:php-0:4.3.2-26.ent.s390x", "3ES:php-0:4.3.2-26.ent.src", "3ES:php-0:4.3.2-26.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-26.ent.i386", "3ES:php-debuginfo-0:4.3.2-26.ent.ia64", "3ES:php-debuginfo-0:4.3.2-26.ent.ppc", "3ES:php-debuginfo-0:4.3.2-26.ent.s390", "3ES:php-debuginfo-0:4.3.2-26.ent.s390x", "3ES:php-debuginfo-0:4.3.2-26.ent.x86_64", "3ES:php-devel-0:4.3.2-26.ent.i386", "3ES:php-devel-0:4.3.2-26.ent.ia64", "3ES:php-devel-0:4.3.2-26.ent.ppc", "3ES:php-devel-0:4.3.2-26.ent.s390", "3ES:php-devel-0:4.3.2-26.ent.s390x", "3ES:php-devel-0:4.3.2-26.ent.x86_64", "3ES:php-imap-0:4.3.2-26.ent.i386", "3ES:php-imap-0:4.3.2-26.ent.ia64", "3ES:php-imap-0:4.3.2-26.ent.ppc", "3ES:php-imap-0:4.3.2-26.ent.s390", "3ES:php-imap-0:4.3.2-26.ent.s390x", "3ES:php-imap-0:4.3.2-26.ent.x86_64", "3ES:php-ldap-0:4.3.2-26.ent.i386", "3ES:php-ldap-0:4.3.2-26.ent.ia64", "3ES:php-ldap-0:4.3.2-26.ent.ppc", "3ES:php-ldap-0:4.3.2-26.ent.s390", "3ES:php-ldap-0:4.3.2-26.ent.s390x", "3ES:php-ldap-0:4.3.2-26.ent.x86_64", "3ES:php-mysql-0:4.3.2-26.ent.i386", "3ES:php-mysql-0:4.3.2-26.ent.ia64", "3ES:php-mysql-0:4.3.2-26.ent.ppc", "3ES:php-mysql-0:4.3.2-26.ent.s390", "3ES:php-mysql-0:4.3.2-26.ent.s390x", "3ES:php-mysql-0:4.3.2-26.ent.x86_64", "3ES:php-odbc-0:4.3.2-26.ent.i386", "3ES:php-odbc-0:4.3.2-26.ent.ia64", "3ES:php-odbc-0:4.3.2-26.ent.ppc", "3ES:php-odbc-0:4.3.2-26.ent.s390", "3ES:php-odbc-0:4.3.2-26.ent.s390x", "3ES:php-odbc-0:4.3.2-26.ent.x86_64", "3ES:php-pgsql-0:4.3.2-26.ent.i386", "3ES:php-pgsql-0:4.3.2-26.ent.ia64", "3ES:php-pgsql-0:4.3.2-26.ent.ppc", "3ES:php-pgsql-0:4.3.2-26.ent.s390", "3ES:php-pgsql-0:4.3.2-26.ent.s390x", "3ES:php-pgsql-0:4.3.2-26.ent.x86_64", "3WS:php-0:4.3.2-26.ent.i386", "3WS:php-0:4.3.2-26.ent.ia64", "3WS:php-0:4.3.2-26.ent.ppc", "3WS:php-0:4.3.2-26.ent.s390", "3WS:php-0:4.3.2-26.ent.s390x", "3WS:php-0:4.3.2-26.ent.src", "3WS:php-0:4.3.2-26.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-26.ent.i386", "3WS:php-debuginfo-0:4.3.2-26.ent.ia64", "3WS:php-debuginfo-0:4.3.2-26.ent.ppc", "3WS:php-debuginfo-0:4.3.2-26.ent.s390", "3WS:php-debuginfo-0:4.3.2-26.ent.s390x", "3WS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3WS:php-devel-0:4.3.2-26.ent.i386", "3WS:php-devel-0:4.3.2-26.ent.ia64", "3WS:php-devel-0:4.3.2-26.ent.ppc", "3WS:php-devel-0:4.3.2-26.ent.s390", "3WS:php-devel-0:4.3.2-26.ent.s390x", "3WS:php-devel-0:4.3.2-26.ent.x86_64", "3WS:php-imap-0:4.3.2-26.ent.i386", "3WS:php-imap-0:4.3.2-26.ent.ia64", "3WS:php-imap-0:4.3.2-26.ent.ppc", "3WS:php-imap-0:4.3.2-26.ent.s390", "3WS:php-imap-0:4.3.2-26.ent.s390x", "3WS:php-imap-0:4.3.2-26.ent.x86_64", "3WS:php-ldap-0:4.3.2-26.ent.i386", "3WS:php-ldap-0:4.3.2-26.ent.ia64", "3WS:php-ldap-0:4.3.2-26.ent.ppc", "3WS:php-ldap-0:4.3.2-26.ent.s390", "3WS:php-ldap-0:4.3.2-26.ent.s390x", "3WS:php-ldap-0:4.3.2-26.ent.x86_64", "3WS:php-mysql-0:4.3.2-26.ent.i386", "3WS:php-mysql-0:4.3.2-26.ent.ia64", "3WS:php-mysql-0:4.3.2-26.ent.ppc", "3WS:php-mysql-0:4.3.2-26.ent.s390", "3WS:php-mysql-0:4.3.2-26.ent.s390x", "3WS:php-mysql-0:4.3.2-26.ent.x86_64", "3WS:php-odbc-0:4.3.2-26.ent.i386", "3WS:php-odbc-0:4.3.2-26.ent.ia64", "3WS:php-odbc-0:4.3.2-26.ent.ppc", "3WS:php-odbc-0:4.3.2-26.ent.s390", "3WS:php-odbc-0:4.3.2-26.ent.s390x", "3WS:php-odbc-0:4.3.2-26.ent.x86_64", "3WS:php-pgsql-0:4.3.2-26.ent.i386", "3WS:php-pgsql-0:4.3.2-26.ent.ia64", "3WS:php-pgsql-0:4.3.2-26.ent.ppc", "3WS:php-pgsql-0:4.3.2-26.ent.s390", "3WS:php-pgsql-0:4.3.2-26.ent.s390x", "3WS:php-pgsql-0:4.3.2-26.ent.x86_64", "4AS:php-0:4.3.9-3.9.i386", "4AS:php-0:4.3.9-3.9.ia64", "4AS:php-0:4.3.9-3.9.ppc", "4AS:php-0:4.3.9-3.9.s390", "4AS:php-0:4.3.9-3.9.s390x", "4AS:php-0:4.3.9-3.9.src", "4AS:php-0:4.3.9-3.9.x86_64", "4AS:php-debuginfo-0:4.3.9-3.9.i386", "4AS:php-debuginfo-0:4.3.9-3.9.ia64", "4AS:php-debuginfo-0:4.3.9-3.9.ppc", "4AS:php-debuginfo-0:4.3.9-3.9.s390", "4AS:php-debuginfo-0:4.3.9-3.9.s390x", "4AS:php-debuginfo-0:4.3.9-3.9.x86_64", "4AS:php-devel-0:4.3.9-3.9.i386", "4AS:php-devel-0:4.3.9-3.9.ia64", "4AS:php-devel-0:4.3.9-3.9.ppc", "4AS:php-devel-0:4.3.9-3.9.s390", "4AS:php-devel-0:4.3.9-3.9.s390x", "4AS:php-devel-0:4.3.9-3.9.x86_64", "4AS:php-domxml-0:4.3.9-3.9.i386", "4AS:php-domxml-0:4.3.9-3.9.ia64", "4AS:php-domxml-0:4.3.9-3.9.ppc", "4AS:php-domxml-0:4.3.9-3.9.s390", "4AS:php-domxml-0:4.3.9-3.9.s390x", "4AS:php-domxml-0:4.3.9-3.9.x86_64", "4AS:php-gd-0:4.3.9-3.9.i386", "4AS:php-gd-0:4.3.9-3.9.ia64", "4AS:php-gd-0:4.3.9-3.9.ppc", "4AS:php-gd-0:4.3.9-3.9.s390", "4AS:php-gd-0:4.3.9-3.9.s390x", "4AS:php-gd-0:4.3.9-3.9.x86_64", "4AS:php-imap-0:4.3.9-3.9.i386", "4AS:php-imap-0:4.3.9-3.9.ia64", "4AS:php-imap-0:4.3.9-3.9.ppc", "4AS:php-imap-0:4.3.9-3.9.s390", "4AS:php-imap-0:4.3.9-3.9.s390x", "4AS:php-imap-0:4.3.9-3.9.x86_64", "4AS:php-ldap-0:4.3.9-3.9.i386", "4AS:php-ldap-0:4.3.9-3.9.ia64", "4AS:php-ldap-0:4.3.9-3.9.ppc", "4AS:php-ldap-0:4.3.9-3.9.s390", "4AS:php-ldap-0:4.3.9-3.9.s390x", "4AS:php-ldap-0:4.3.9-3.9.x86_64", "4AS:php-mbstring-0:4.3.9-3.9.i386", "4AS:php-mbstring-0:4.3.9-3.9.ia64", "4AS:php-mbstring-0:4.3.9-3.9.ppc", "4AS:php-mbstring-0:4.3.9-3.9.s390", "4AS:php-mbstring-0:4.3.9-3.9.s390x", "4AS:php-mbstring-0:4.3.9-3.9.x86_64", "4AS:php-mysql-0:4.3.9-3.9.i386", "4AS:php-mysql-0:4.3.9-3.9.ia64", "4AS:php-mysql-0:4.3.9-3.9.ppc", "4AS:php-mysql-0:4.3.9-3.9.s390", "4AS:php-mysql-0:4.3.9-3.9.s390x", "4AS:php-mysql-0:4.3.9-3.9.x86_64", "4AS:php-ncurses-0:4.3.9-3.9.i386", "4AS:php-ncurses-0:4.3.9-3.9.ia64", "4AS:php-ncurses-0:4.3.9-3.9.ppc", "4AS:php-ncurses-0:4.3.9-3.9.s390", "4AS:php-ncurses-0:4.3.9-3.9.s390x", "4AS:php-ncurses-0:4.3.9-3.9.x86_64", "4AS:php-odbc-0:4.3.9-3.9.i386", "4AS:php-odbc-0:4.3.9-3.9.ia64", "4AS:php-odbc-0:4.3.9-3.9.ppc", "4AS:php-odbc-0:4.3.9-3.9.s390", "4AS:php-odbc-0:4.3.9-3.9.s390x", "4AS:php-odbc-0:4.3.9-3.9.x86_64", "4AS:php-pear-0:4.3.9-3.9.i386", "4AS:php-pear-0:4.3.9-3.9.ia64", "4AS:php-pear-0:4.3.9-3.9.ppc", "4AS:php-pear-0:4.3.9-3.9.s390", "4AS:php-pear-0:4.3.9-3.9.s390x", "4AS:php-pear-0:4.3.9-3.9.x86_64", "4AS:php-pgsql-0:4.3.9-3.9.i386", "4AS:php-pgsql-0:4.3.9-3.9.ia64", "4AS:php-pgsql-0:4.3.9-3.9.ppc", "4AS:php-pgsql-0:4.3.9-3.9.s390", "4AS:php-pgsql-0:4.3.9-3.9.s390x", "4AS:php-pgsql-0:4.3.9-3.9.x86_64", "4AS:php-snmp-0:4.3.9-3.9.i386", "4AS:php-snmp-0:4.3.9-3.9.ia64", "4AS:php-snmp-0:4.3.9-3.9.ppc", "4AS:php-snmp-0:4.3.9-3.9.s390", "4AS:php-snmp-0:4.3.9-3.9.s390x", "4AS:php-snmp-0:4.3.9-3.9.x86_64", "4AS:php-xmlrpc-0:4.3.9-3.9.i386", "4AS:php-xmlrpc-0:4.3.9-3.9.ia64", "4AS:php-xmlrpc-0:4.3.9-3.9.ppc", "4AS:php-xmlrpc-0:4.3.9-3.9.s390", "4AS:php-xmlrpc-0:4.3.9-3.9.s390x", "4AS:php-xmlrpc-0:4.3.9-3.9.x86_64", "4Desktop:php-0:4.3.9-3.9.i386", "4Desktop:php-0:4.3.9-3.9.ia64", "4Desktop:php-0:4.3.9-3.9.ppc", "4Desktop:php-0:4.3.9-3.9.s390", "4Desktop:php-0:4.3.9-3.9.s390x", "4Desktop:php-0:4.3.9-3.9.src", "4Desktop:php-0:4.3.9-3.9.x86_64", "4Desktop:php-debuginfo-0:4.3.9-3.9.i386", "4Desktop:php-debuginfo-0:4.3.9-3.9.ia64", "4Desktop:php-debuginfo-0:4.3.9-3.9.ppc", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390x", "4Desktop:php-debuginfo-0:4.3.9-3.9.x86_64", "4Desktop:php-devel-0:4.3.9-3.9.i386", "4Desktop:php-devel-0:4.3.9-3.9.ia64", "4Desktop:php-devel-0:4.3.9-3.9.ppc", "4Desktop:php-devel-0:4.3.9-3.9.s390", "4Desktop:php-devel-0:4.3.9-3.9.s390x", "4Desktop:php-devel-0:4.3.9-3.9.x86_64", "4Desktop:php-domxml-0:4.3.9-3.9.i386", "4Desktop:php-domxml-0:4.3.9-3.9.ia64", "4Desktop:php-domxml-0:4.3.9-3.9.ppc", "4Desktop:php-domxml-0:4.3.9-3.9.s390", "4Desktop:php-domxml-0:4.3.9-3.9.s390x", "4Desktop:php-domxml-0:4.3.9-3.9.x86_64", "4Desktop:php-gd-0:4.3.9-3.9.i386", "4Desktop:php-gd-0:4.3.9-3.9.ia64", "4Desktop:php-gd-0:4.3.9-3.9.ppc", "4Desktop:php-gd-0:4.3.9-3.9.s390", "4Desktop:php-gd-0:4.3.9-3.9.s390x", "4Desktop:php-gd-0:4.3.9-3.9.x86_64", "4Desktop:php-imap-0:4.3.9-3.9.i386", "4Desktop:php-imap-0:4.3.9-3.9.ia64", "4Desktop:php-imap-0:4.3.9-3.9.ppc", "4Desktop:php-imap-0:4.3.9-3.9.s390", "4Desktop:php-imap-0:4.3.9-3.9.s390x", "4Desktop:php-imap-0:4.3.9-3.9.x86_64", "4Desktop:php-ldap-0:4.3.9-3.9.i386", "4Desktop:php-ldap-0:4.3.9-3.9.ia64", "4Desktop:php-ldap-0:4.3.9-3.9.ppc", "4Desktop:php-ldap-0:4.3.9-3.9.s390", "4Desktop:php-ldap-0:4.3.9-3.9.s390x", "4Desktop:php-ldap-0:4.3.9-3.9.x86_64", "4Desktop:php-mbstring-0:4.3.9-3.9.i386", "4Desktop:php-mbstring-0:4.3.9-3.9.ia64", "4Desktop:php-mbstring-0:4.3.9-3.9.ppc", "4Desktop:php-mbstring-0:4.3.9-3.9.s390", "4Desktop:php-mbstring-0:4.3.9-3.9.s390x", "4Desktop:php-mbstring-0:4.3.9-3.9.x86_64", "4Desktop:php-mysql-0:4.3.9-3.9.i386", "4Desktop:php-mysql-0:4.3.9-3.9.ia64", "4Desktop:php-mysql-0:4.3.9-3.9.ppc", "4Desktop:php-mysql-0:4.3.9-3.9.s390", "4Desktop:php-mysql-0:4.3.9-3.9.s390x", "4Desktop:php-mysql-0:4.3.9-3.9.x86_64", "4Desktop:php-ncurses-0:4.3.9-3.9.i386", "4Desktop:php-ncurses-0:4.3.9-3.9.ia64", "4Desktop:php-ncurses-0:4.3.9-3.9.ppc", "4Desktop:php-ncurses-0:4.3.9-3.9.s390", "4Desktop:php-ncurses-0:4.3.9-3.9.s390x", "4Desktop:php-ncurses-0:4.3.9-3.9.x86_64", "4Desktop:php-odbc-0:4.3.9-3.9.i386", "4Desktop:php-odbc-0:4.3.9-3.9.ia64", "4Desktop:php-odbc-0:4.3.9-3.9.ppc", "4Desktop:php-odbc-0:4.3.9-3.9.s390", "4Desktop:php-odbc-0:4.3.9-3.9.s390x", "4Desktop:php-odbc-0:4.3.9-3.9.x86_64", "4Desktop:php-pear-0:4.3.9-3.9.i386", "4Desktop:php-pear-0:4.3.9-3.9.ia64", "4Desktop:php-pear-0:4.3.9-3.9.ppc", "4Desktop:php-pear-0:4.3.9-3.9.s390", "4Desktop:php-pear-0:4.3.9-3.9.s390x", "4Desktop:php-pear-0:4.3.9-3.9.x86_64", "4Desktop:php-pgsql-0:4.3.9-3.9.i386", "4Desktop:php-pgsql-0:4.3.9-3.9.ia64", "4Desktop:php-pgsql-0:4.3.9-3.9.ppc", "4Desktop:php-pgsql-0:4.3.9-3.9.s390", "4Desktop:php-pgsql-0:4.3.9-3.9.s390x", "4Desktop:php-pgsql-0:4.3.9-3.9.x86_64", "4Desktop:php-snmp-0:4.3.9-3.9.i386", "4Desktop:php-snmp-0:4.3.9-3.9.ia64", "4Desktop:php-snmp-0:4.3.9-3.9.ppc", "4Desktop:php-snmp-0:4.3.9-3.9.s390", "4Desktop:php-snmp-0:4.3.9-3.9.s390x", "4Desktop:php-snmp-0:4.3.9-3.9.x86_64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.i386", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ia64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ppc", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390x", "4Desktop:php-xmlrpc-0:4.3.9-3.9.x86_64", "4ES:php-0:4.3.9-3.9.i386", "4ES:php-0:4.3.9-3.9.ia64", "4ES:php-0:4.3.9-3.9.ppc", "4ES:php-0:4.3.9-3.9.s390", "4ES:php-0:4.3.9-3.9.s390x", "4ES:php-0:4.3.9-3.9.src", "4ES:php-0:4.3.9-3.9.x86_64", "4ES:php-debuginfo-0:4.3.9-3.9.i386", "4ES:php-debuginfo-0:4.3.9-3.9.ia64", "4ES:php-debuginfo-0:4.3.9-3.9.ppc", "4ES:php-debuginfo-0:4.3.9-3.9.s390", "4ES:php-debuginfo-0:4.3.9-3.9.s390x", "4ES:php-debuginfo-0:4.3.9-3.9.x86_64", "4ES:php-devel-0:4.3.9-3.9.i386", "4ES:php-devel-0:4.3.9-3.9.ia64", "4ES:php-devel-0:4.3.9-3.9.ppc", "4ES:php-devel-0:4.3.9-3.9.s390", "4ES:php-devel-0:4.3.9-3.9.s390x", "4ES:php-devel-0:4.3.9-3.9.x86_64", "4ES:php-domxml-0:4.3.9-3.9.i386", "4ES:php-domxml-0:4.3.9-3.9.ia64", "4ES:php-domxml-0:4.3.9-3.9.ppc", "4ES:php-domxml-0:4.3.9-3.9.s390", "4ES:php-domxml-0:4.3.9-3.9.s390x", "4ES:php-domxml-0:4.3.9-3.9.x86_64", "4ES:php-gd-0:4.3.9-3.9.i386", "4ES:php-gd-0:4.3.9-3.9.ia64", "4ES:php-gd-0:4.3.9-3.9.ppc", "4ES:php-gd-0:4.3.9-3.9.s390", "4ES:php-gd-0:4.3.9-3.9.s390x", "4ES:php-gd-0:4.3.9-3.9.x86_64", "4ES:php-imap-0:4.3.9-3.9.i386", "4ES:php-imap-0:4.3.9-3.9.ia64", "4ES:php-imap-0:4.3.9-3.9.ppc", "4ES:php-imap-0:4.3.9-3.9.s390", "4ES:php-imap-0:4.3.9-3.9.s390x", "4ES:php-imap-0:4.3.9-3.9.x86_64", "4ES:php-ldap-0:4.3.9-3.9.i386", "4ES:php-ldap-0:4.3.9-3.9.ia64", "4ES:php-ldap-0:4.3.9-3.9.ppc", "4ES:php-ldap-0:4.3.9-3.9.s390", "4ES:php-ldap-0:4.3.9-3.9.s390x", "4ES:php-ldap-0:4.3.9-3.9.x86_64", "4ES:php-mbstring-0:4.3.9-3.9.i386", "4ES:php-mbstring-0:4.3.9-3.9.ia64", "4ES:php-mbstring-0:4.3.9-3.9.ppc", "4ES:php-mbstring-0:4.3.9-3.9.s390", "4ES:php-mbstring-0:4.3.9-3.9.s390x", "4ES:php-mbstring-0:4.3.9-3.9.x86_64", "4ES:php-mysql-0:4.3.9-3.9.i386", "4ES:php-mysql-0:4.3.9-3.9.ia64", "4ES:php-mysql-0:4.3.9-3.9.ppc", "4ES:php-mysql-0:4.3.9-3.9.s390", "4ES:php-mysql-0:4.3.9-3.9.s390x", "4ES:php-mysql-0:4.3.9-3.9.x86_64", "4ES:php-ncurses-0:4.3.9-3.9.i386", "4ES:php-ncurses-0:4.3.9-3.9.ia64", "4ES:php-ncurses-0:4.3.9-3.9.ppc", "4ES:php-ncurses-0:4.3.9-3.9.s390", "4ES:php-ncurses-0:4.3.9-3.9.s390x", "4ES:php-ncurses-0:4.3.9-3.9.x86_64", "4ES:php-odbc-0:4.3.9-3.9.i386", "4ES:php-odbc-0:4.3.9-3.9.ia64", "4ES:php-odbc-0:4.3.9-3.9.ppc", "4ES:php-odbc-0:4.3.9-3.9.s390", "4ES:php-odbc-0:4.3.9-3.9.s390x", "4ES:php-odbc-0:4.3.9-3.9.x86_64", "4ES:php-pear-0:4.3.9-3.9.i386", "4ES:php-pear-0:4.3.9-3.9.ia64", "4ES:php-pear-0:4.3.9-3.9.ppc", "4ES:php-pear-0:4.3.9-3.9.s390", "4ES:php-pear-0:4.3.9-3.9.s390x", "4ES:php-pear-0:4.3.9-3.9.x86_64", "4ES:php-pgsql-0:4.3.9-3.9.i386", "4ES:php-pgsql-0:4.3.9-3.9.ia64", "4ES:php-pgsql-0:4.3.9-3.9.ppc", "4ES:php-pgsql-0:4.3.9-3.9.s390", "4ES:php-pgsql-0:4.3.9-3.9.s390x", "4ES:php-pgsql-0:4.3.9-3.9.x86_64", "4ES:php-snmp-0:4.3.9-3.9.i386", "4ES:php-snmp-0:4.3.9-3.9.ia64", "4ES:php-snmp-0:4.3.9-3.9.ppc", "4ES:php-snmp-0:4.3.9-3.9.s390", "4ES:php-snmp-0:4.3.9-3.9.s390x", "4ES:php-snmp-0:4.3.9-3.9.x86_64", "4ES:php-xmlrpc-0:4.3.9-3.9.i386", "4ES:php-xmlrpc-0:4.3.9-3.9.ia64", "4ES:php-xmlrpc-0:4.3.9-3.9.ppc", "4ES:php-xmlrpc-0:4.3.9-3.9.s390", "4ES:php-xmlrpc-0:4.3.9-3.9.s390x", "4ES:php-xmlrpc-0:4.3.9-3.9.x86_64", "4WS:php-0:4.3.9-3.9.i386", "4WS:php-0:4.3.9-3.9.ia64", "4WS:php-0:4.3.9-3.9.ppc", "4WS:php-0:4.3.9-3.9.s390", "4WS:php-0:4.3.9-3.9.s390x", "4WS:php-0:4.3.9-3.9.src", "4WS:php-0:4.3.9-3.9.x86_64", "4WS:php-debuginfo-0:4.3.9-3.9.i386", "4WS:php-debuginfo-0:4.3.9-3.9.ia64", "4WS:php-debuginfo-0:4.3.9-3.9.ppc", "4WS:php-debuginfo-0:4.3.9-3.9.s390", "4WS:php-debuginfo-0:4.3.9-3.9.s390x", "4WS:php-debuginfo-0:4.3.9-3.9.x86_64", "4WS:php-devel-0:4.3.9-3.9.i386", "4WS:php-devel-0:4.3.9-3.9.ia64", "4WS:php-devel-0:4.3.9-3.9.ppc", "4WS:php-devel-0:4.3.9-3.9.s390", "4WS:php-devel-0:4.3.9-3.9.s390x", "4WS:php-devel-0:4.3.9-3.9.x86_64", "4WS:php-domxml-0:4.3.9-3.9.i386", "4WS:php-domxml-0:4.3.9-3.9.ia64", "4WS:php-domxml-0:4.3.9-3.9.ppc", "4WS:php-domxml-0:4.3.9-3.9.s390", "4WS:php-domxml-0:4.3.9-3.9.s390x", "4WS:php-domxml-0:4.3.9-3.9.x86_64", "4WS:php-gd-0:4.3.9-3.9.i386", "4WS:php-gd-0:4.3.9-3.9.ia64", "4WS:php-gd-0:4.3.9-3.9.ppc", "4WS:php-gd-0:4.3.9-3.9.s390", "4WS:php-gd-0:4.3.9-3.9.s390x", "4WS:php-gd-0:4.3.9-3.9.x86_64", "4WS:php-imap-0:4.3.9-3.9.i386", "4WS:php-imap-0:4.3.9-3.9.ia64", "4WS:php-imap-0:4.3.9-3.9.ppc", "4WS:php-imap-0:4.3.9-3.9.s390", "4WS:php-imap-0:4.3.9-3.9.s390x", "4WS:php-imap-0:4.3.9-3.9.x86_64", "4WS:php-ldap-0:4.3.9-3.9.i386", "4WS:php-ldap-0:4.3.9-3.9.ia64", "4WS:php-ldap-0:4.3.9-3.9.ppc", "4WS:php-ldap-0:4.3.9-3.9.s390", "4WS:php-ldap-0:4.3.9-3.9.s390x", "4WS:php-ldap-0:4.3.9-3.9.x86_64", "4WS:php-mbstring-0:4.3.9-3.9.i386", "4WS:php-mbstring-0:4.3.9-3.9.ia64", "4WS:php-mbstring-0:4.3.9-3.9.ppc", "4WS:php-mbstring-0:4.3.9-3.9.s390", "4WS:php-mbstring-0:4.3.9-3.9.s390x", "4WS:php-mbstring-0:4.3.9-3.9.x86_64", "4WS:php-mysql-0:4.3.9-3.9.i386", "4WS:php-mysql-0:4.3.9-3.9.ia64", "4WS:php-mysql-0:4.3.9-3.9.ppc", "4WS:php-mysql-0:4.3.9-3.9.s390", "4WS:php-mysql-0:4.3.9-3.9.s390x", "4WS:php-mysql-0:4.3.9-3.9.x86_64", "4WS:php-ncurses-0:4.3.9-3.9.i386", "4WS:php-ncurses-0:4.3.9-3.9.ia64", "4WS:php-ncurses-0:4.3.9-3.9.ppc", "4WS:php-ncurses-0:4.3.9-3.9.s390", "4WS:php-ncurses-0:4.3.9-3.9.s390x", "4WS:php-ncurses-0:4.3.9-3.9.x86_64", "4WS:php-odbc-0:4.3.9-3.9.i386", "4WS:php-odbc-0:4.3.9-3.9.ia64", "4WS:php-odbc-0:4.3.9-3.9.ppc", "4WS:php-odbc-0:4.3.9-3.9.s390", "4WS:php-odbc-0:4.3.9-3.9.s390x", "4WS:php-odbc-0:4.3.9-3.9.x86_64", "4WS:php-pear-0:4.3.9-3.9.i386", "4WS:php-pear-0:4.3.9-3.9.ia64", "4WS:php-pear-0:4.3.9-3.9.ppc", "4WS:php-pear-0:4.3.9-3.9.s390", "4WS:php-pear-0:4.3.9-3.9.s390x", "4WS:php-pear-0:4.3.9-3.9.x86_64", "4WS:php-pgsql-0:4.3.9-3.9.i386", "4WS:php-pgsql-0:4.3.9-3.9.ia64", "4WS:php-pgsql-0:4.3.9-3.9.ppc", "4WS:php-pgsql-0:4.3.9-3.9.s390", "4WS:php-pgsql-0:4.3.9-3.9.s390x", "4WS:php-pgsql-0:4.3.9-3.9.x86_64", "4WS:php-snmp-0:4.3.9-3.9.i386", "4WS:php-snmp-0:4.3.9-3.9.ia64", "4WS:php-snmp-0:4.3.9-3.9.ppc", "4WS:php-snmp-0:4.3.9-3.9.s390", "4WS:php-snmp-0:4.3.9-3.9.s390x", "4WS:php-snmp-0:4.3.9-3.9.x86_64", "4WS:php-xmlrpc-0:4.3.9-3.9.i386", "4WS:php-xmlrpc-0:4.3.9-3.9.ia64", "4WS:php-xmlrpc-0:4.3.9-3.9.ppc", "4WS:php-xmlrpc-0:4.3.9-3.9.s390", "4WS:php-xmlrpc-0:4.3.9-3.9.s390x", "4WS:php-xmlrpc-0:4.3.9-3.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3390" }, { "category": "external", "summary": "RHBZ#1617823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3390", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-11-10T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:php-0:4.3.2-26.ent.i386", "3AS:php-0:4.3.2-26.ent.ia64", "3AS:php-0:4.3.2-26.ent.ppc", "3AS:php-0:4.3.2-26.ent.s390", "3AS:php-0:4.3.2-26.ent.s390x", "3AS:php-0:4.3.2-26.ent.src", "3AS:php-0:4.3.2-26.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-26.ent.i386", "3AS:php-debuginfo-0:4.3.2-26.ent.ia64", "3AS:php-debuginfo-0:4.3.2-26.ent.ppc", "3AS:php-debuginfo-0:4.3.2-26.ent.s390", "3AS:php-debuginfo-0:4.3.2-26.ent.s390x", "3AS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3AS:php-devel-0:4.3.2-26.ent.i386", "3AS:php-devel-0:4.3.2-26.ent.ia64", "3AS:php-devel-0:4.3.2-26.ent.ppc", "3AS:php-devel-0:4.3.2-26.ent.s390", "3AS:php-devel-0:4.3.2-26.ent.s390x", "3AS:php-devel-0:4.3.2-26.ent.x86_64", "3AS:php-imap-0:4.3.2-26.ent.i386", "3AS:php-imap-0:4.3.2-26.ent.ia64", "3AS:php-imap-0:4.3.2-26.ent.ppc", "3AS:php-imap-0:4.3.2-26.ent.s390", "3AS:php-imap-0:4.3.2-26.ent.s390x", "3AS:php-imap-0:4.3.2-26.ent.x86_64", "3AS:php-ldap-0:4.3.2-26.ent.i386", "3AS:php-ldap-0:4.3.2-26.ent.ia64", "3AS:php-ldap-0:4.3.2-26.ent.ppc", "3AS:php-ldap-0:4.3.2-26.ent.s390", "3AS:php-ldap-0:4.3.2-26.ent.s390x", "3AS:php-ldap-0:4.3.2-26.ent.x86_64", "3AS:php-mysql-0:4.3.2-26.ent.i386", "3AS:php-mysql-0:4.3.2-26.ent.ia64", "3AS:php-mysql-0:4.3.2-26.ent.ppc", "3AS:php-mysql-0:4.3.2-26.ent.s390", "3AS:php-mysql-0:4.3.2-26.ent.s390x", "3AS:php-mysql-0:4.3.2-26.ent.x86_64", "3AS:php-odbc-0:4.3.2-26.ent.i386", "3AS:php-odbc-0:4.3.2-26.ent.ia64", "3AS:php-odbc-0:4.3.2-26.ent.ppc", "3AS:php-odbc-0:4.3.2-26.ent.s390", "3AS:php-odbc-0:4.3.2-26.ent.s390x", "3AS:php-odbc-0:4.3.2-26.ent.x86_64", "3AS:php-pgsql-0:4.3.2-26.ent.i386", "3AS:php-pgsql-0:4.3.2-26.ent.ia64", "3AS:php-pgsql-0:4.3.2-26.ent.ppc", "3AS:php-pgsql-0:4.3.2-26.ent.s390", "3AS:php-pgsql-0:4.3.2-26.ent.s390x", "3AS:php-pgsql-0:4.3.2-26.ent.x86_64", "3Desktop:php-0:4.3.2-26.ent.i386", "3Desktop:php-0:4.3.2-26.ent.ia64", "3Desktop:php-0:4.3.2-26.ent.ppc", "3Desktop:php-0:4.3.2-26.ent.s390", "3Desktop:php-0:4.3.2-26.ent.s390x", "3Desktop:php-0:4.3.2-26.ent.src", "3Desktop:php-0:4.3.2-26.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-26.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-26.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-26.ent.x86_64", "3Desktop:php-devel-0:4.3.2-26.ent.i386", "3Desktop:php-devel-0:4.3.2-26.ent.ia64", "3Desktop:php-devel-0:4.3.2-26.ent.ppc", "3Desktop:php-devel-0:4.3.2-26.ent.s390", "3Desktop:php-devel-0:4.3.2-26.ent.s390x", "3Desktop:php-devel-0:4.3.2-26.ent.x86_64", "3Desktop:php-imap-0:4.3.2-26.ent.i386", "3Desktop:php-imap-0:4.3.2-26.ent.ia64", "3Desktop:php-imap-0:4.3.2-26.ent.ppc", "3Desktop:php-imap-0:4.3.2-26.ent.s390", "3Desktop:php-imap-0:4.3.2-26.ent.s390x", "3Desktop:php-imap-0:4.3.2-26.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-26.ent.i386", "3Desktop:php-ldap-0:4.3.2-26.ent.ia64", "3Desktop:php-ldap-0:4.3.2-26.ent.ppc", "3Desktop:php-ldap-0:4.3.2-26.ent.s390", "3Desktop:php-ldap-0:4.3.2-26.ent.s390x", "3Desktop:php-ldap-0:4.3.2-26.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-26.ent.i386", "3Desktop:php-mysql-0:4.3.2-26.ent.ia64", "3Desktop:php-mysql-0:4.3.2-26.ent.ppc", "3Desktop:php-mysql-0:4.3.2-26.ent.s390", "3Desktop:php-mysql-0:4.3.2-26.ent.s390x", "3Desktop:php-mysql-0:4.3.2-26.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-26.ent.i386", "3Desktop:php-odbc-0:4.3.2-26.ent.ia64", "3Desktop:php-odbc-0:4.3.2-26.ent.ppc", "3Desktop:php-odbc-0:4.3.2-26.ent.s390", "3Desktop:php-odbc-0:4.3.2-26.ent.s390x", "3Desktop:php-odbc-0:4.3.2-26.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-26.ent.i386", "3Desktop:php-pgsql-0:4.3.2-26.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-26.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390", "3Desktop:php-pgsql-0:4.3.2-26.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-26.ent.x86_64", "3ES:php-0:4.3.2-26.ent.i386", "3ES:php-0:4.3.2-26.ent.ia64", "3ES:php-0:4.3.2-26.ent.ppc", "3ES:php-0:4.3.2-26.ent.s390", "3ES:php-0:4.3.2-26.ent.s390x", "3ES:php-0:4.3.2-26.ent.src", "3ES:php-0:4.3.2-26.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-26.ent.i386", "3ES:php-debuginfo-0:4.3.2-26.ent.ia64", "3ES:php-debuginfo-0:4.3.2-26.ent.ppc", "3ES:php-debuginfo-0:4.3.2-26.ent.s390", "3ES:php-debuginfo-0:4.3.2-26.ent.s390x", "3ES:php-debuginfo-0:4.3.2-26.ent.x86_64", "3ES:php-devel-0:4.3.2-26.ent.i386", "3ES:php-devel-0:4.3.2-26.ent.ia64", "3ES:php-devel-0:4.3.2-26.ent.ppc", "3ES:php-devel-0:4.3.2-26.ent.s390", "3ES:php-devel-0:4.3.2-26.ent.s390x", "3ES:php-devel-0:4.3.2-26.ent.x86_64", "3ES:php-imap-0:4.3.2-26.ent.i386", "3ES:php-imap-0:4.3.2-26.ent.ia64", "3ES:php-imap-0:4.3.2-26.ent.ppc", "3ES:php-imap-0:4.3.2-26.ent.s390", "3ES:php-imap-0:4.3.2-26.ent.s390x", "3ES:php-imap-0:4.3.2-26.ent.x86_64", "3ES:php-ldap-0:4.3.2-26.ent.i386", "3ES:php-ldap-0:4.3.2-26.ent.ia64", "3ES:php-ldap-0:4.3.2-26.ent.ppc", "3ES:php-ldap-0:4.3.2-26.ent.s390", "3ES:php-ldap-0:4.3.2-26.ent.s390x", "3ES:php-ldap-0:4.3.2-26.ent.x86_64", "3ES:php-mysql-0:4.3.2-26.ent.i386", "3ES:php-mysql-0:4.3.2-26.ent.ia64", "3ES:php-mysql-0:4.3.2-26.ent.ppc", "3ES:php-mysql-0:4.3.2-26.ent.s390", "3ES:php-mysql-0:4.3.2-26.ent.s390x", "3ES:php-mysql-0:4.3.2-26.ent.x86_64", "3ES:php-odbc-0:4.3.2-26.ent.i386", "3ES:php-odbc-0:4.3.2-26.ent.ia64", "3ES:php-odbc-0:4.3.2-26.ent.ppc", "3ES:php-odbc-0:4.3.2-26.ent.s390", "3ES:php-odbc-0:4.3.2-26.ent.s390x", "3ES:php-odbc-0:4.3.2-26.ent.x86_64", "3ES:php-pgsql-0:4.3.2-26.ent.i386", "3ES:php-pgsql-0:4.3.2-26.ent.ia64", "3ES:php-pgsql-0:4.3.2-26.ent.ppc", "3ES:php-pgsql-0:4.3.2-26.ent.s390", "3ES:php-pgsql-0:4.3.2-26.ent.s390x", "3ES:php-pgsql-0:4.3.2-26.ent.x86_64", "3WS:php-0:4.3.2-26.ent.i386", "3WS:php-0:4.3.2-26.ent.ia64", "3WS:php-0:4.3.2-26.ent.ppc", "3WS:php-0:4.3.2-26.ent.s390", "3WS:php-0:4.3.2-26.ent.s390x", "3WS:php-0:4.3.2-26.ent.src", "3WS:php-0:4.3.2-26.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-26.ent.i386", "3WS:php-debuginfo-0:4.3.2-26.ent.ia64", "3WS:php-debuginfo-0:4.3.2-26.ent.ppc", "3WS:php-debuginfo-0:4.3.2-26.ent.s390", "3WS:php-debuginfo-0:4.3.2-26.ent.s390x", "3WS:php-debuginfo-0:4.3.2-26.ent.x86_64", "3WS:php-devel-0:4.3.2-26.ent.i386", "3WS:php-devel-0:4.3.2-26.ent.ia64", "3WS:php-devel-0:4.3.2-26.ent.ppc", "3WS:php-devel-0:4.3.2-26.ent.s390", "3WS:php-devel-0:4.3.2-26.ent.s390x", "3WS:php-devel-0:4.3.2-26.ent.x86_64", "3WS:php-imap-0:4.3.2-26.ent.i386", "3WS:php-imap-0:4.3.2-26.ent.ia64", "3WS:php-imap-0:4.3.2-26.ent.ppc", "3WS:php-imap-0:4.3.2-26.ent.s390", "3WS:php-imap-0:4.3.2-26.ent.s390x", "3WS:php-imap-0:4.3.2-26.ent.x86_64", "3WS:php-ldap-0:4.3.2-26.ent.i386", "3WS:php-ldap-0:4.3.2-26.ent.ia64", "3WS:php-ldap-0:4.3.2-26.ent.ppc", "3WS:php-ldap-0:4.3.2-26.ent.s390", "3WS:php-ldap-0:4.3.2-26.ent.s390x", "3WS:php-ldap-0:4.3.2-26.ent.x86_64", "3WS:php-mysql-0:4.3.2-26.ent.i386", "3WS:php-mysql-0:4.3.2-26.ent.ia64", "3WS:php-mysql-0:4.3.2-26.ent.ppc", "3WS:php-mysql-0:4.3.2-26.ent.s390", "3WS:php-mysql-0:4.3.2-26.ent.s390x", "3WS:php-mysql-0:4.3.2-26.ent.x86_64", "3WS:php-odbc-0:4.3.2-26.ent.i386", "3WS:php-odbc-0:4.3.2-26.ent.ia64", "3WS:php-odbc-0:4.3.2-26.ent.ppc", "3WS:php-odbc-0:4.3.2-26.ent.s390", "3WS:php-odbc-0:4.3.2-26.ent.s390x", "3WS:php-odbc-0:4.3.2-26.ent.x86_64", "3WS:php-pgsql-0:4.3.2-26.ent.i386", "3WS:php-pgsql-0:4.3.2-26.ent.ia64", "3WS:php-pgsql-0:4.3.2-26.ent.ppc", "3WS:php-pgsql-0:4.3.2-26.ent.s390", "3WS:php-pgsql-0:4.3.2-26.ent.s390x", "3WS:php-pgsql-0:4.3.2-26.ent.x86_64", "4AS:php-0:4.3.9-3.9.i386", "4AS:php-0:4.3.9-3.9.ia64", "4AS:php-0:4.3.9-3.9.ppc", "4AS:php-0:4.3.9-3.9.s390", "4AS:php-0:4.3.9-3.9.s390x", "4AS:php-0:4.3.9-3.9.src", "4AS:php-0:4.3.9-3.9.x86_64", "4AS:php-debuginfo-0:4.3.9-3.9.i386", "4AS:php-debuginfo-0:4.3.9-3.9.ia64", "4AS:php-debuginfo-0:4.3.9-3.9.ppc", "4AS:php-debuginfo-0:4.3.9-3.9.s390", "4AS:php-debuginfo-0:4.3.9-3.9.s390x", "4AS:php-debuginfo-0:4.3.9-3.9.x86_64", "4AS:php-devel-0:4.3.9-3.9.i386", "4AS:php-devel-0:4.3.9-3.9.ia64", "4AS:php-devel-0:4.3.9-3.9.ppc", "4AS:php-devel-0:4.3.9-3.9.s390", "4AS:php-devel-0:4.3.9-3.9.s390x", "4AS:php-devel-0:4.3.9-3.9.x86_64", "4AS:php-domxml-0:4.3.9-3.9.i386", "4AS:php-domxml-0:4.3.9-3.9.ia64", "4AS:php-domxml-0:4.3.9-3.9.ppc", "4AS:php-domxml-0:4.3.9-3.9.s390", "4AS:php-domxml-0:4.3.9-3.9.s390x", "4AS:php-domxml-0:4.3.9-3.9.x86_64", "4AS:php-gd-0:4.3.9-3.9.i386", "4AS:php-gd-0:4.3.9-3.9.ia64", "4AS:php-gd-0:4.3.9-3.9.ppc", "4AS:php-gd-0:4.3.9-3.9.s390", "4AS:php-gd-0:4.3.9-3.9.s390x", "4AS:php-gd-0:4.3.9-3.9.x86_64", "4AS:php-imap-0:4.3.9-3.9.i386", "4AS:php-imap-0:4.3.9-3.9.ia64", "4AS:php-imap-0:4.3.9-3.9.ppc", "4AS:php-imap-0:4.3.9-3.9.s390", "4AS:php-imap-0:4.3.9-3.9.s390x", "4AS:php-imap-0:4.3.9-3.9.x86_64", "4AS:php-ldap-0:4.3.9-3.9.i386", "4AS:php-ldap-0:4.3.9-3.9.ia64", "4AS:php-ldap-0:4.3.9-3.9.ppc", "4AS:php-ldap-0:4.3.9-3.9.s390", "4AS:php-ldap-0:4.3.9-3.9.s390x", "4AS:php-ldap-0:4.3.9-3.9.x86_64", "4AS:php-mbstring-0:4.3.9-3.9.i386", "4AS:php-mbstring-0:4.3.9-3.9.ia64", "4AS:php-mbstring-0:4.3.9-3.9.ppc", "4AS:php-mbstring-0:4.3.9-3.9.s390", "4AS:php-mbstring-0:4.3.9-3.9.s390x", "4AS:php-mbstring-0:4.3.9-3.9.x86_64", "4AS:php-mysql-0:4.3.9-3.9.i386", "4AS:php-mysql-0:4.3.9-3.9.ia64", "4AS:php-mysql-0:4.3.9-3.9.ppc", "4AS:php-mysql-0:4.3.9-3.9.s390", "4AS:php-mysql-0:4.3.9-3.9.s390x", "4AS:php-mysql-0:4.3.9-3.9.x86_64", "4AS:php-ncurses-0:4.3.9-3.9.i386", "4AS:php-ncurses-0:4.3.9-3.9.ia64", "4AS:php-ncurses-0:4.3.9-3.9.ppc", "4AS:php-ncurses-0:4.3.9-3.9.s390", "4AS:php-ncurses-0:4.3.9-3.9.s390x", "4AS:php-ncurses-0:4.3.9-3.9.x86_64", "4AS:php-odbc-0:4.3.9-3.9.i386", "4AS:php-odbc-0:4.3.9-3.9.ia64", "4AS:php-odbc-0:4.3.9-3.9.ppc", "4AS:php-odbc-0:4.3.9-3.9.s390", "4AS:php-odbc-0:4.3.9-3.9.s390x", "4AS:php-odbc-0:4.3.9-3.9.x86_64", "4AS:php-pear-0:4.3.9-3.9.i386", "4AS:php-pear-0:4.3.9-3.9.ia64", "4AS:php-pear-0:4.3.9-3.9.ppc", "4AS:php-pear-0:4.3.9-3.9.s390", "4AS:php-pear-0:4.3.9-3.9.s390x", "4AS:php-pear-0:4.3.9-3.9.x86_64", "4AS:php-pgsql-0:4.3.9-3.9.i386", "4AS:php-pgsql-0:4.3.9-3.9.ia64", "4AS:php-pgsql-0:4.3.9-3.9.ppc", "4AS:php-pgsql-0:4.3.9-3.9.s390", "4AS:php-pgsql-0:4.3.9-3.9.s390x", "4AS:php-pgsql-0:4.3.9-3.9.x86_64", "4AS:php-snmp-0:4.3.9-3.9.i386", "4AS:php-snmp-0:4.3.9-3.9.ia64", "4AS:php-snmp-0:4.3.9-3.9.ppc", "4AS:php-snmp-0:4.3.9-3.9.s390", "4AS:php-snmp-0:4.3.9-3.9.s390x", "4AS:php-snmp-0:4.3.9-3.9.x86_64", "4AS:php-xmlrpc-0:4.3.9-3.9.i386", "4AS:php-xmlrpc-0:4.3.9-3.9.ia64", "4AS:php-xmlrpc-0:4.3.9-3.9.ppc", "4AS:php-xmlrpc-0:4.3.9-3.9.s390", "4AS:php-xmlrpc-0:4.3.9-3.9.s390x", "4AS:php-xmlrpc-0:4.3.9-3.9.x86_64", "4Desktop:php-0:4.3.9-3.9.i386", "4Desktop:php-0:4.3.9-3.9.ia64", "4Desktop:php-0:4.3.9-3.9.ppc", "4Desktop:php-0:4.3.9-3.9.s390", "4Desktop:php-0:4.3.9-3.9.s390x", "4Desktop:php-0:4.3.9-3.9.src", "4Desktop:php-0:4.3.9-3.9.x86_64", "4Desktop:php-debuginfo-0:4.3.9-3.9.i386", "4Desktop:php-debuginfo-0:4.3.9-3.9.ia64", "4Desktop:php-debuginfo-0:4.3.9-3.9.ppc", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390", "4Desktop:php-debuginfo-0:4.3.9-3.9.s390x", "4Desktop:php-debuginfo-0:4.3.9-3.9.x86_64", "4Desktop:php-devel-0:4.3.9-3.9.i386", "4Desktop:php-devel-0:4.3.9-3.9.ia64", "4Desktop:php-devel-0:4.3.9-3.9.ppc", "4Desktop:php-devel-0:4.3.9-3.9.s390", "4Desktop:php-devel-0:4.3.9-3.9.s390x", "4Desktop:php-devel-0:4.3.9-3.9.x86_64", "4Desktop:php-domxml-0:4.3.9-3.9.i386", "4Desktop:php-domxml-0:4.3.9-3.9.ia64", "4Desktop:php-domxml-0:4.3.9-3.9.ppc", "4Desktop:php-domxml-0:4.3.9-3.9.s390", "4Desktop:php-domxml-0:4.3.9-3.9.s390x", "4Desktop:php-domxml-0:4.3.9-3.9.x86_64", "4Desktop:php-gd-0:4.3.9-3.9.i386", "4Desktop:php-gd-0:4.3.9-3.9.ia64", "4Desktop:php-gd-0:4.3.9-3.9.ppc", "4Desktop:php-gd-0:4.3.9-3.9.s390", "4Desktop:php-gd-0:4.3.9-3.9.s390x", "4Desktop:php-gd-0:4.3.9-3.9.x86_64", "4Desktop:php-imap-0:4.3.9-3.9.i386", "4Desktop:php-imap-0:4.3.9-3.9.ia64", "4Desktop:php-imap-0:4.3.9-3.9.ppc", "4Desktop:php-imap-0:4.3.9-3.9.s390", "4Desktop:php-imap-0:4.3.9-3.9.s390x", "4Desktop:php-imap-0:4.3.9-3.9.x86_64", "4Desktop:php-ldap-0:4.3.9-3.9.i386", "4Desktop:php-ldap-0:4.3.9-3.9.ia64", "4Desktop:php-ldap-0:4.3.9-3.9.ppc", "4Desktop:php-ldap-0:4.3.9-3.9.s390", "4Desktop:php-ldap-0:4.3.9-3.9.s390x", "4Desktop:php-ldap-0:4.3.9-3.9.x86_64", "4Desktop:php-mbstring-0:4.3.9-3.9.i386", "4Desktop:php-mbstring-0:4.3.9-3.9.ia64", "4Desktop:php-mbstring-0:4.3.9-3.9.ppc", "4Desktop:php-mbstring-0:4.3.9-3.9.s390", "4Desktop:php-mbstring-0:4.3.9-3.9.s390x", "4Desktop:php-mbstring-0:4.3.9-3.9.x86_64", "4Desktop:php-mysql-0:4.3.9-3.9.i386", "4Desktop:php-mysql-0:4.3.9-3.9.ia64", "4Desktop:php-mysql-0:4.3.9-3.9.ppc", "4Desktop:php-mysql-0:4.3.9-3.9.s390", "4Desktop:php-mysql-0:4.3.9-3.9.s390x", "4Desktop:php-mysql-0:4.3.9-3.9.x86_64", "4Desktop:php-ncurses-0:4.3.9-3.9.i386", "4Desktop:php-ncurses-0:4.3.9-3.9.ia64", "4Desktop:php-ncurses-0:4.3.9-3.9.ppc", "4Desktop:php-ncurses-0:4.3.9-3.9.s390", "4Desktop:php-ncurses-0:4.3.9-3.9.s390x", "4Desktop:php-ncurses-0:4.3.9-3.9.x86_64", "4Desktop:php-odbc-0:4.3.9-3.9.i386", "4Desktop:php-odbc-0:4.3.9-3.9.ia64", "4Desktop:php-odbc-0:4.3.9-3.9.ppc", "4Desktop:php-odbc-0:4.3.9-3.9.s390", "4Desktop:php-odbc-0:4.3.9-3.9.s390x", "4Desktop:php-odbc-0:4.3.9-3.9.x86_64", "4Desktop:php-pear-0:4.3.9-3.9.i386", "4Desktop:php-pear-0:4.3.9-3.9.ia64", "4Desktop:php-pear-0:4.3.9-3.9.ppc", "4Desktop:php-pear-0:4.3.9-3.9.s390", "4Desktop:php-pear-0:4.3.9-3.9.s390x", "4Desktop:php-pear-0:4.3.9-3.9.x86_64", "4Desktop:php-pgsql-0:4.3.9-3.9.i386", "4Desktop:php-pgsql-0:4.3.9-3.9.ia64", "4Desktop:php-pgsql-0:4.3.9-3.9.ppc", "4Desktop:php-pgsql-0:4.3.9-3.9.s390", "4Desktop:php-pgsql-0:4.3.9-3.9.s390x", "4Desktop:php-pgsql-0:4.3.9-3.9.x86_64", "4Desktop:php-snmp-0:4.3.9-3.9.i386", "4Desktop:php-snmp-0:4.3.9-3.9.ia64", "4Desktop:php-snmp-0:4.3.9-3.9.ppc", "4Desktop:php-snmp-0:4.3.9-3.9.s390", "4Desktop:php-snmp-0:4.3.9-3.9.s390x", "4Desktop:php-snmp-0:4.3.9-3.9.x86_64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.i386", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ia64", "4Desktop:php-xmlrpc-0:4.3.9-3.9.ppc", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390", "4Desktop:php-xmlrpc-0:4.3.9-3.9.s390x", "4Desktop:php-xmlrpc-0:4.3.9-3.9.x86_64", "4ES:php-0:4.3.9-3.9.i386", "4ES:php-0:4.3.9-3.9.ia64", "4ES:php-0:4.3.9-3.9.ppc", "4ES:php-0:4.3.9-3.9.s390", "4ES:php-0:4.3.9-3.9.s390x", "4ES:php-0:4.3.9-3.9.src", "4ES:php-0:4.3.9-3.9.x86_64", "4ES:php-debuginfo-0:4.3.9-3.9.i386", "4ES:php-debuginfo-0:4.3.9-3.9.ia64", "4ES:php-debuginfo-0:4.3.9-3.9.ppc", "4ES:php-debuginfo-0:4.3.9-3.9.s390", "4ES:php-debuginfo-0:4.3.9-3.9.s390x", "4ES:php-debuginfo-0:4.3.9-3.9.x86_64", "4ES:php-devel-0:4.3.9-3.9.i386", "4ES:php-devel-0:4.3.9-3.9.ia64", "4ES:php-devel-0:4.3.9-3.9.ppc", "4ES:php-devel-0:4.3.9-3.9.s390", "4ES:php-devel-0:4.3.9-3.9.s390x", "4ES:php-devel-0:4.3.9-3.9.x86_64", "4ES:php-domxml-0:4.3.9-3.9.i386", "4ES:php-domxml-0:4.3.9-3.9.ia64", "4ES:php-domxml-0:4.3.9-3.9.ppc", "4ES:php-domxml-0:4.3.9-3.9.s390", "4ES:php-domxml-0:4.3.9-3.9.s390x", "4ES:php-domxml-0:4.3.9-3.9.x86_64", "4ES:php-gd-0:4.3.9-3.9.i386", "4ES:php-gd-0:4.3.9-3.9.ia64", "4ES:php-gd-0:4.3.9-3.9.ppc", "4ES:php-gd-0:4.3.9-3.9.s390", "4ES:php-gd-0:4.3.9-3.9.s390x", "4ES:php-gd-0:4.3.9-3.9.x86_64", "4ES:php-imap-0:4.3.9-3.9.i386", "4ES:php-imap-0:4.3.9-3.9.ia64", "4ES:php-imap-0:4.3.9-3.9.ppc", "4ES:php-imap-0:4.3.9-3.9.s390", "4ES:php-imap-0:4.3.9-3.9.s390x", "4ES:php-imap-0:4.3.9-3.9.x86_64", "4ES:php-ldap-0:4.3.9-3.9.i386", "4ES:php-ldap-0:4.3.9-3.9.ia64", "4ES:php-ldap-0:4.3.9-3.9.ppc", "4ES:php-ldap-0:4.3.9-3.9.s390", "4ES:php-ldap-0:4.3.9-3.9.s390x", "4ES:php-ldap-0:4.3.9-3.9.x86_64", "4ES:php-mbstring-0:4.3.9-3.9.i386", "4ES:php-mbstring-0:4.3.9-3.9.ia64", "4ES:php-mbstring-0:4.3.9-3.9.ppc", "4ES:php-mbstring-0:4.3.9-3.9.s390", "4ES:php-mbstring-0:4.3.9-3.9.s390x", "4ES:php-mbstring-0:4.3.9-3.9.x86_64", "4ES:php-mysql-0:4.3.9-3.9.i386", "4ES:php-mysql-0:4.3.9-3.9.ia64", "4ES:php-mysql-0:4.3.9-3.9.ppc", "4ES:php-mysql-0:4.3.9-3.9.s390", "4ES:php-mysql-0:4.3.9-3.9.s390x", "4ES:php-mysql-0:4.3.9-3.9.x86_64", "4ES:php-ncurses-0:4.3.9-3.9.i386", "4ES:php-ncurses-0:4.3.9-3.9.ia64", "4ES:php-ncurses-0:4.3.9-3.9.ppc", "4ES:php-ncurses-0:4.3.9-3.9.s390", "4ES:php-ncurses-0:4.3.9-3.9.s390x", "4ES:php-ncurses-0:4.3.9-3.9.x86_64", "4ES:php-odbc-0:4.3.9-3.9.i386", "4ES:php-odbc-0:4.3.9-3.9.ia64", "4ES:php-odbc-0:4.3.9-3.9.ppc", "4ES:php-odbc-0:4.3.9-3.9.s390", "4ES:php-odbc-0:4.3.9-3.9.s390x", "4ES:php-odbc-0:4.3.9-3.9.x86_64", "4ES:php-pear-0:4.3.9-3.9.i386", "4ES:php-pear-0:4.3.9-3.9.ia64", "4ES:php-pear-0:4.3.9-3.9.ppc", "4ES:php-pear-0:4.3.9-3.9.s390", "4ES:php-pear-0:4.3.9-3.9.s390x", "4ES:php-pear-0:4.3.9-3.9.x86_64", "4ES:php-pgsql-0:4.3.9-3.9.i386", "4ES:php-pgsql-0:4.3.9-3.9.ia64", "4ES:php-pgsql-0:4.3.9-3.9.ppc", "4ES:php-pgsql-0:4.3.9-3.9.s390", "4ES:php-pgsql-0:4.3.9-3.9.s390x", "4ES:php-pgsql-0:4.3.9-3.9.x86_64", "4ES:php-snmp-0:4.3.9-3.9.i386", "4ES:php-snmp-0:4.3.9-3.9.ia64", "4ES:php-snmp-0:4.3.9-3.9.ppc", "4ES:php-snmp-0:4.3.9-3.9.s390", "4ES:php-snmp-0:4.3.9-3.9.s390x", "4ES:php-snmp-0:4.3.9-3.9.x86_64", "4ES:php-xmlrpc-0:4.3.9-3.9.i386", "4ES:php-xmlrpc-0:4.3.9-3.9.ia64", "4ES:php-xmlrpc-0:4.3.9-3.9.ppc", "4ES:php-xmlrpc-0:4.3.9-3.9.s390", "4ES:php-xmlrpc-0:4.3.9-3.9.s390x", "4ES:php-xmlrpc-0:4.3.9-3.9.x86_64", "4WS:php-0:4.3.9-3.9.i386", "4WS:php-0:4.3.9-3.9.ia64", "4WS:php-0:4.3.9-3.9.ppc", "4WS:php-0:4.3.9-3.9.s390", "4WS:php-0:4.3.9-3.9.s390x", "4WS:php-0:4.3.9-3.9.src", "4WS:php-0:4.3.9-3.9.x86_64", "4WS:php-debuginfo-0:4.3.9-3.9.i386", "4WS:php-debuginfo-0:4.3.9-3.9.ia64", "4WS:php-debuginfo-0:4.3.9-3.9.ppc", "4WS:php-debuginfo-0:4.3.9-3.9.s390", "4WS:php-debuginfo-0:4.3.9-3.9.s390x", "4WS:php-debuginfo-0:4.3.9-3.9.x86_64", "4WS:php-devel-0:4.3.9-3.9.i386", "4WS:php-devel-0:4.3.9-3.9.ia64", "4WS:php-devel-0:4.3.9-3.9.ppc", "4WS:php-devel-0:4.3.9-3.9.s390", "4WS:php-devel-0:4.3.9-3.9.s390x", "4WS:php-devel-0:4.3.9-3.9.x86_64", "4WS:php-domxml-0:4.3.9-3.9.i386", "4WS:php-domxml-0:4.3.9-3.9.ia64", "4WS:php-domxml-0:4.3.9-3.9.ppc", "4WS:php-domxml-0:4.3.9-3.9.s390", "4WS:php-domxml-0:4.3.9-3.9.s390x", "4WS:php-domxml-0:4.3.9-3.9.x86_64", "4WS:php-gd-0:4.3.9-3.9.i386", "4WS:php-gd-0:4.3.9-3.9.ia64", "4WS:php-gd-0:4.3.9-3.9.ppc", "4WS:php-gd-0:4.3.9-3.9.s390", "4WS:php-gd-0:4.3.9-3.9.s390x", "4WS:php-gd-0:4.3.9-3.9.x86_64", "4WS:php-imap-0:4.3.9-3.9.i386", "4WS:php-imap-0:4.3.9-3.9.ia64", "4WS:php-imap-0:4.3.9-3.9.ppc", "4WS:php-imap-0:4.3.9-3.9.s390", "4WS:php-imap-0:4.3.9-3.9.s390x", "4WS:php-imap-0:4.3.9-3.9.x86_64", "4WS:php-ldap-0:4.3.9-3.9.i386", "4WS:php-ldap-0:4.3.9-3.9.ia64", "4WS:php-ldap-0:4.3.9-3.9.ppc", "4WS:php-ldap-0:4.3.9-3.9.s390", "4WS:php-ldap-0:4.3.9-3.9.s390x", "4WS:php-ldap-0:4.3.9-3.9.x86_64", "4WS:php-mbstring-0:4.3.9-3.9.i386", "4WS:php-mbstring-0:4.3.9-3.9.ia64", "4WS:php-mbstring-0:4.3.9-3.9.ppc", "4WS:php-mbstring-0:4.3.9-3.9.s390", "4WS:php-mbstring-0:4.3.9-3.9.s390x", "4WS:php-mbstring-0:4.3.9-3.9.x86_64", "4WS:php-mysql-0:4.3.9-3.9.i386", "4WS:php-mysql-0:4.3.9-3.9.ia64", "4WS:php-mysql-0:4.3.9-3.9.ppc", "4WS:php-mysql-0:4.3.9-3.9.s390", "4WS:php-mysql-0:4.3.9-3.9.s390x", "4WS:php-mysql-0:4.3.9-3.9.x86_64", "4WS:php-ncurses-0:4.3.9-3.9.i386", "4WS:php-ncurses-0:4.3.9-3.9.ia64", "4WS:php-ncurses-0:4.3.9-3.9.ppc", "4WS:php-ncurses-0:4.3.9-3.9.s390", "4WS:php-ncurses-0:4.3.9-3.9.s390x", "4WS:php-ncurses-0:4.3.9-3.9.x86_64", "4WS:php-odbc-0:4.3.9-3.9.i386", "4WS:php-odbc-0:4.3.9-3.9.ia64", "4WS:php-odbc-0:4.3.9-3.9.ppc", "4WS:php-odbc-0:4.3.9-3.9.s390", "4WS:php-odbc-0:4.3.9-3.9.s390x", "4WS:php-odbc-0:4.3.9-3.9.x86_64", "4WS:php-pear-0:4.3.9-3.9.i386", "4WS:php-pear-0:4.3.9-3.9.ia64", "4WS:php-pear-0:4.3.9-3.9.ppc", "4WS:php-pear-0:4.3.9-3.9.s390", "4WS:php-pear-0:4.3.9-3.9.s390x", "4WS:php-pear-0:4.3.9-3.9.x86_64", "4WS:php-pgsql-0:4.3.9-3.9.i386", "4WS:php-pgsql-0:4.3.9-3.9.ia64", "4WS:php-pgsql-0:4.3.9-3.9.ppc", "4WS:php-pgsql-0:4.3.9-3.9.s390", "4WS:php-pgsql-0:4.3.9-3.9.s390x", "4WS:php-pgsql-0:4.3.9-3.9.x86_64", "4WS:php-snmp-0:4.3.9-3.9.i386", "4WS:php-snmp-0:4.3.9-3.9.ia64", "4WS:php-snmp-0:4.3.9-3.9.ppc", "4WS:php-snmp-0:4.3.9-3.9.s390", "4WS:php-snmp-0:4.3.9-3.9.s390x", "4WS:php-snmp-0:4.3.9-3.9.x86_64", "4WS:php-xmlrpc-0:4.3.9-3.9.i386", "4WS:php-xmlrpc-0:4.3.9-3.9.ia64", "4WS:php-xmlrpc-0:4.3.9-3.9.ppc", "4WS:php-xmlrpc-0:4.3.9-3.9.s390", "4WS:php-xmlrpc-0:4.3.9-3.9.s390x", "4WS:php-xmlrpc-0:4.3.9-3.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:831" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2006_0549
Vulnerability from csaf_redhat
Published
2006-07-27 20:05
Modified
2024-11-05 16:37
Summary
Red Hat Security Advisory: php security update for Stronghold
Notes
Topic
An updated version of PHP that addresses several security issues is now
available for Stronghold 4.0 for Enterprise Linux.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
PHP is an HTML-embedded scripting language. Several security issues were
found in the PHP package in Stronghold 4.0:
The wordwrap() PHP function did not properly check for integer overflow in
the way the "break" parameter was handled. An attacker who could control a
string passed to the "break" parameter could cause a heap overflow.
(CVE-2006-1990)
The phpinfo() PHP function did not properly sanitize long strings. This
could allow an attacker to perform cross-site scripting attacks against
sites that had publicly-available PHP scripts that called phpinfo().
(CVE-2006-0996)
The error handling output was found to improperly escape HTML output in
certain cases. This could allow an attacker to perform cross-site
scripting attacks against sites where both display_errors and html_errors
were enabled. (CVE-2006-0208)
A flaw in the way PHP registered global variables during a file upload
request was discovered. A remote attacker could submit a carefully crafted
multipart/form-data POST request that could overwrite the $GLOBALS array,
which could alter expected script behavior and possibly lead to the
execution of arbitrary PHP commands. Note that this vulnerability only
affects installations which have register_globals enabled in the PHP
configuration file, which is neither a default nor recommended option.
(CVE-2005-3390)
A flaw in the PHP parse_str() function was discovered. If a PHP script
passed only one argument to the parse_str() function, and the script was
forced to abort execution during operation (for example, due to the
memory_limit setting), the register_globals may be enabled even if it was
disabled in the PHP configuration file. This vulnerability only affects
installations that have PHP scripts using the parse_str function in this
way. (CVE-2005-3389)
A Cross-Site Scripting flaw in the phpinfo() function was discovered. If a
victim was tricked into following a malicious URL to a site with a page
displaying the phpinfo() output, it was possible to inject javascript or
HTML content into the displayed page or steal data such as cookies. This
vulnerability only affects installations that allow users to view the
output of the phpinfo() function. As the phpinfo() function outputs a large
amount of information about the current state of PHP, it should only be
used during debugging or if protected by authentication. (CVE-2005-3388)
A buffer overflow flaw was discovered in uw-imap, the University of
Washington's IMAP Server. php-imap is compiled against the static c-client
libraries from imap and therefore needed to be recompiled against the fixed
version. (CVE-2005-2933)
A flaw was found in the zend_hash_del() PHP function. For PHP scripts that
rely on the use of the unset() function, a remote attacker could force
variable initialization to be bypassed. This would be a security issue
particularly for installations that enable the "register_globals" setting.
"register_globals" is disabled by default in Red Hat Enterprise Linux.
(CVE-2006-3017)
A directory traversal vulnerability was found in PHP. Local users could
bypass open_basedir restrictions allowing remote attackers to create files
in arbitrary directories via the tempnam() function. (CVE-2006-1494)
Users of Stronghold are advised to upgrade to this update, which
contains backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated version of PHP that addresses several security issues is now\navailable for Stronghold 4.0 for Enterprise Linux.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "PHP is an HTML-embedded scripting language. Several security issues were\nfound in the PHP package in Stronghold 4.0:\n\nThe wordwrap() PHP function did not properly check for integer overflow in\nthe way the \"break\" parameter was handled. An attacker who could control a\nstring passed to the \"break\" parameter could cause a heap overflow.\n(CVE-2006-1990)\n\nThe phpinfo() PHP function did not properly sanitize long strings. This\ncould allow an attacker to perform cross-site scripting attacks against\nsites that had publicly-available PHP scripts that called phpinfo().\n(CVE-2006-0996)\n\nThe error handling output was found to improperly escape HTML output in\ncertain cases. This could allow an attacker to perform cross-site\nscripting attacks against sites where both display_errors and html_errors\nwere enabled. (CVE-2006-0208) \n\nA flaw in the way PHP registered global variables during a file upload\nrequest was discovered. A remote attacker could submit a carefully crafted\nmultipart/form-data POST request that could overwrite the $GLOBALS array,\nwhich could alter expected script behavior and possibly lead to the\nexecution of arbitrary PHP commands. Note that this vulnerability only\naffects installations which have register_globals enabled in the PHP\nconfiguration file, which is neither a default nor recommended option.\n(CVE-2005-3390)\n\nA flaw in the PHP parse_str() function was discovered. If a PHP script\npassed only one argument to the parse_str() function, and the script was\nforced to abort execution during operation (for example, due to the\nmemory_limit setting), the register_globals may be enabled even if it was\ndisabled in the PHP configuration file. This vulnerability only affects\ninstallations that have PHP scripts using the parse_str function in this\nway. (CVE-2005-3389) \n\nA Cross-Site Scripting flaw in the phpinfo() function was discovered. If a\nvictim was tricked into following a malicious URL to a site with a page\ndisplaying the phpinfo() output, it was possible to inject javascript or\nHTML content into the displayed page or steal data such as cookies. This\nvulnerability only affects installations that allow users to view the\noutput of the phpinfo() function. As the phpinfo() function outputs a large\namount of information about the current state of PHP, it should only be\nused during debugging or if protected by authentication. (CVE-2005-3388) \n\nA buffer overflow flaw was discovered in uw-imap, the University of\nWashington\u0027s IMAP Server. php-imap is compiled against the static c-client\nlibraries from imap and therefore needed to be recompiled against the fixed\nversion. (CVE-2005-2933) \n\nA flaw was found in the zend_hash_del() PHP function. For PHP scripts that\nrely on the use of the unset() function, a remote attacker could force\nvariable initialization to be bypassed. This would be a security issue\nparticularly for installations that enable the \"register_globals\" setting.\n\"register_globals\" is disabled by default in Red Hat Enterprise Linux.\n(CVE-2006-3017)\n\nA directory traversal vulnerability was found in PHP. Local users could\nbypass open_basedir restrictions allowing remote attackers to create files\nin arbitrary directories via the tempnam() function. (CVE-2006-1494)\n\nUsers of Stronghold are advised to upgrade to this update, which\ncontains backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0549", "url": "https://access.redhat.com/errata/RHSA-2006:0549" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://stronghold.redhat.com/", "url": "http://stronghold.redhat.com/" }, { "category": "external", "summary": "190520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190520" }, { "category": "external", "summary": "190525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190525" }, { "category": "external", "summary": "190527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190527" }, { "category": "external", "summary": "195880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=195880" }, { "category": "external", "summary": "196258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=196258" }, { "category": "external", "summary": "197500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=197500" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0549.json" } ], "title": "Red Hat Security Advisory: php security update for Stronghold", "tracking": { "current_release_date": "2024-11-05T16:37:53+00:00", "generator": { "date": "2024-11-05T16:37:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2006:0549", "initial_release_date": "2006-07-27T20:05:00+00:00", "revision_history": [ { "date": "2006-07-27T20:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:37:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)", "product": { "name": "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)", "product_id": "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_stronghold:4.0" } } } ], "category": "product_family", "name": "Stronghold 4.0 for Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-2933", "discovery_date": "2005-10-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617767" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington\u0027s IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (\") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2933" }, { "category": "external", "summary": "RHBZ#1617767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617767" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2933", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2933" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2933", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2933" } ], "release_date": "2005-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T20:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0549" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-3388", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617821" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a \"stacked array assignment.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3388" }, { "category": "external", "summary": "RHBZ#1617821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3388", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T20:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0549" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3389", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617822" } ], "notes": [ { "category": "description", "text": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3389" }, { "category": "external", "summary": "RHBZ#1617822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T20:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0549" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3390", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617823" } ], "notes": [ { "category": "description", "text": "The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a \"GLOBALS\" fileupload field.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3390" }, { "category": "external", "summary": "RHBZ#1617823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3390", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T20:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0549" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-0208", "discovery_date": "2006-01-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617878" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in PHP 4.4.1 and 5.1.1, when display_errors and html_errors are on, allow remote attackers to inject arbitrary web script or HTML via inputs to PHP applications that are not filtered when they are included in the resulting error message.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0208" }, { "category": "external", "summary": "RHBZ#1617878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617878" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0208", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0208" } ], "release_date": "2006-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T20:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0549" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-0996", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618022" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0996" }, { "category": "external", "summary": "RHBZ#1618022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0996", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0996" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0996", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0996" } ], "release_date": "2006-03-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T20:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0549" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-1494", "discovery_date": "2006-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618037" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of OpenSSH as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.", "title": "Statement" } ], "product_status": { "fixed": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1494" }, { "category": "external", "summary": "RHBZ#1618037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1494", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1494" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1494", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1494" } ], "release_date": "2006-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T20:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0549" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-1990", "discovery_date": "2006-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618082" } ], "notes": [ { "category": "description", "text": "Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent attackers to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1990" }, { "category": "external", "summary": "RHBZ#1618082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618082" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1990", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1990" } ], "release_date": "2006-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T20:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0549" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-3017", "discovery_date": "2006-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618131" } ], "notes": [ { "category": "description", "text": "zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable\u0027s value to be used in security-relevant operations.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3017" }, { "category": "external", "summary": "RHBZ#1618131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618131" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3017", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3017" } ], "release_date": "2006-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T20:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0549" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2005_838
Vulnerability from csaf_redhat
Published
2005-11-10 19:19
Modified
2024-11-05 16:35
Summary
Red Hat Security Advisory: php security update
Notes
Topic
Updated PHP packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 2.1
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.
A flaw was found in the way PHP registers global variables during a file
upload request. A remote attacker could submit a carefully crafted
multipart/form-data POST request that would overwrite the $GLOBALS array,
altering expected script behavior, and possibly leading to the execution of
arbitrary PHP commands. Note that this vulnerability only affects
installations which have register_globals enabled in the PHP configuration
file, which is not a default or recommended option. The Common
Vulnerabilities and Exposures project assigned the name CVE-2005-3390 to
this issue.
A flaw was found in the PHP parse_str() function. If a PHP script passes
only one argument to the parse_str() function, and the script can be forced
to abort execution during operation (for example due to the memory_limit
setting), the register_globals may be enabled even if it is disabled in the
PHP configuration file. This vulnerability only affects installations that
have PHP scripts using the parse_str function in this way. (CVE-2005-3389)
A Cross-Site Scripting flaw was found in the phpinfo() function. If a
victim can be tricked into following a malicious URL to a site with a page
displaying the phpinfo() output, it may be possible to inject javascript
or HTML content into the displayed page or steal data such as cookies.
This vulnerability only affects installations which allow users to view the
output of the phpinfo() function. As the phpinfo() function outputs a
large amount of information about the current state of PHP, it should only
be used during debugging or if protected by authentication. (CVE-2005-3388)
Additionally, a bug introduced in the updates to fix CVE-2004-1019 has been
corrected.
Users of PHP should upgrade to these updated packages, which contain
backported patches that resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated PHP packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 2.1\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Web server.\n\nA flaw was found in the way PHP registers global variables during a file\nupload request. A remote attacker could submit a carefully crafted\nmultipart/form-data POST request that would overwrite the $GLOBALS array,\naltering expected script behavior, and possibly leading to the execution of\narbitrary PHP commands. Note that this vulnerability only affects\ninstallations which have register_globals enabled in the PHP configuration\nfile, which is not a default or recommended option. The Common\nVulnerabilities and Exposures project assigned the name CVE-2005-3390 to\nthis issue.\n\nA flaw was found in the PHP parse_str() function. If a PHP script passes\nonly one argument to the parse_str() function, and the script can be forced\nto abort execution during operation (for example due to the memory_limit\nsetting), the register_globals may be enabled even if it is disabled in the\nPHP configuration file. This vulnerability only affects installations that\nhave PHP scripts using the parse_str function in this way. (CVE-2005-3389)\n\nA Cross-Site Scripting flaw was found in the phpinfo() function. If a\nvictim can be tricked into following a malicious URL to a site with a page\ndisplaying the phpinfo() output, it may be possible to inject javascript\nor HTML content into the displayed page or steal data such as cookies. \nThis vulnerability only affects installations which allow users to view the\noutput of the phpinfo() function. As the phpinfo() function outputs a\nlarge amount of information about the current state of PHP, it should only\nbe used during debugging or if protected by authentication. (CVE-2005-3388)\n\nAdditionally, a bug introduced in the updates to fix CVE-2004-1019 has been\ncorrected.\n\nUsers of PHP should upgrade to these updated packages, which contain\nbackported patches that resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:838", "url": "https://access.redhat.com/errata/RHSA-2005:838" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "150778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150778" }, { "category": "external", "summary": "172207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172207" }, { "category": "external", "summary": "172209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172209" }, { "category": "external", "summary": "172212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172212" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_838.json" } ], "title": "Red Hat Security Advisory: php security update", "tracking": { "current_release_date": "2024-11-05T16:35:18+00:00", "generator": { "date": "2024-11-05T16:35:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2005:838", "initial_release_date": "2005-11-10T19:19:00+00:00", "revision_history": [ { "date": "2005-11-10T19:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-11-10T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:35:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-3388", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617821" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a \"stacked array assignment.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3388" }, { "category": "external", "summary": "RHBZ#1617821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3388", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-11-10T19:19:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:838" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3389", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617822" } ], "notes": [ { "category": "description", "text": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3389" }, { "category": "external", "summary": "RHBZ#1617822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-11-10T19:19:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:838" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3390", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617823" } ], "notes": [ { "category": "description", "text": "The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a \"GLOBALS\" fileupload field.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3390" }, { "category": "external", "summary": "RHBZ#1617823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3390", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-11-10T19:19:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:838" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
gsd-2005-3389
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2005-3389", "description": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.", "id": "GSD-2005-3389", "references": [ "https://www.suse.com/security/cve/CVE-2005-3389.html", "https://access.redhat.com/errata/RHSA-2006:0549", "https://access.redhat.com/errata/RHSA-2005:882", "https://access.redhat.com/errata/RHSA-2005:838", "https://access.redhat.com/errata/RHSA-2005:831" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-3389" ], "details": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.", "id": "GSD-2005-3389", "modified": "2023-12-13T01:20:12.851114Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15249", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15249" }, { "name": "21252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21252" }, { "name": "22691", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22691" }, { "name": "134", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/134" }, { "name": "MDKSA-2005:213", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:213" }, { "name": "RHSA-2005:831", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-831.html" }, { "name": "TLSA-2006-38", "refsource": "TURBO", "url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm" }, { "name": "18198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18198" }, { "name": "SSRT061238", "refsource": "HP", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "name": "HPSBMA02159", "refsource": "HP", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "name": "18054", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18054" }, { "name": "ADV-2005-2254", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2254" }, { "name": "20051031 Advisory 19/2005: PHP register_globals Activation Vulnerability in parse_str()", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/415291" }, { "name": "1015131", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015131" }, { "name": "http://www.hardened-php.net/advisory_192005.78.html", "refsource": "MISC", "url": "http://www.hardened-php.net/advisory_192005.78.html" }, { "name": "17559", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17559" }, { "name": "FLSA:166943", "refsource": "FEDORA", "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html" }, { "name": "17371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17371" }, { "name": "ADV-2006-4320", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4320" }, { "name": "RHSA-2006:0549", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2006-0549.html" }, { "name": "17490", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17490" }, { "name": "SUSE-SA:2005:069", "refsource": "SUSE", "url": "http://www.securityfocus.com/archive/1/419504/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11481", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11481" }, { "name": "http://www.php.net/release_4_4_1.php", "refsource": "CONFIRM", "url": "http://www.php.net/release_4_4_1.php" }, { "name": "17510", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17510" }, { "name": "17531", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17531" }, { "name": "OpenPKG-SA-2005.027", "refsource": "OPENPKG", "url": "http://www.openpkg.org/security/OpenPKG-SA-2005.027-php.html" }, { "name": "18669", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18669" }, { "name": "17557", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17557" }, { "name": "GLSA-200511-08", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml" }, { "name": "USN-232-1", "refsource": "UBUNTU", "url": "https://www.ubuntu.com/usn/usn-232-1/" }, { "name": "RHSA-2005:838", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-838.html" }, { "name": "SUSE-SR:2005:027", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_27_sr.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3389" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.hardened-php.net/advisory_192005.78.html", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "http://www.hardened-php.net/advisory_192005.78.html" }, { "name": "http://www.php.net/release_4_4_1.php", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://www.php.net/release_4_4_1.php" }, { "name": "15249", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15249" }, { "name": "17371", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17371" }, { "name": "1015131", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1015131" }, { "name": "GLSA-200511-08", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml" }, { "name": "FLSA:166943", "refsource": "FEDORA", "tags": [], "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html" }, { "name": "OpenPKG-SA-2005.027", "refsource": "OPENPKG", "tags": [], "url": "http://www.openpkg.org/security/OpenPKG-SA-2005.027-php.html" }, { "name": "18054", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18054" }, { "name": "18198", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18198" }, { "name": "17559", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17559" }, { "name": "RHSA-2005:831", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-831.html" }, { "name": "RHSA-2005:838", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-838.html" }, { "name": "17490", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17490" }, { "name": "17510", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17510" }, { "name": "17531", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17531" }, { "name": "17557", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17557" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm" }, { "name": "18669", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18669" }, { "name": "SUSE-SR:2005:027", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2005_27_sr.html" }, { "name": "21252", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21252" }, { "name": "20051031 Advisory 19/2005: PHP register_globals Activation Vulnerability in parse_str()", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/415291" }, { "name": "RHSA-2006:0549", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0549.html" }, { "name": "22691", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22691" }, { "name": "TLSA-2006-38", "refsource": "TURBO", "tags": [], "url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt" }, { "name": "MDKSA-2005:213", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:213" }, { "name": "134", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/134" }, { "name": "ADV-2005-2254", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/2254" }, { "name": "ADV-2006-4320", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4320" }, { "name": "SSRT061238", "refsource": "HP", "tags": [], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "name": "USN-232-1", "refsource": "UBUNTU", "tags": [], "url": "https://www.ubuntu.com/usn/usn-232-1/" }, { "name": "oval:org.mitre.oval:def:11481", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11481" }, { "name": "SUSE-SA:2005:069", "refsource": "SUSE", "tags": [], "url": "http://www.securityfocus.com/archive/1/419504/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:25Z", "publishedDate": "2005-11-01T12:47Z" } } }
ghsa-7vjg-5rq8-r4h2
Vulnerability from github
Published
2022-05-01 02:17
Modified
2022-05-01 02:17
Details
The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.
{ "affected": [], "aliases": [ "CVE-2005-3389" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-11-01T12:47:00Z", "severity": "MODERATE" }, "details": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.", "id": "GHSA-7vjg-5rq8-r4h2", "modified": "2022-05-01T02:17:32Z", "published": "2022-05-01T02:17:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11481" }, { "type": "WEB", "url": "https://www.ubuntu.com/usn/usn-232-1" }, { "type": "WEB", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2006-0549.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/17371" }, { "type": "WEB", "url": "http://secunia.com/advisories/17490" }, { "type": "WEB", "url": "http://secunia.com/advisories/17510" }, { "type": "WEB", "url": "http://secunia.com/advisories/17531" }, { "type": "WEB", "url": "http://secunia.com/advisories/17557" }, { "type": "WEB", "url": "http://secunia.com/advisories/17559" }, { "type": "WEB", "url": "http://secunia.com/advisories/18054" }, { "type": "WEB", "url": "http://secunia.com/advisories/18198" }, { "type": "WEB", "url": "http://secunia.com/advisories/18669" }, { "type": "WEB", "url": "http://secunia.com/advisories/21252" }, { "type": "WEB", "url": "http://secunia.com/advisories/22691" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/134" }, { "type": "WEB", "url": "http://securitytracker.com/id?1015131" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-037.htm" }, { "type": "WEB", "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml" }, { "type": "WEB", "url": "http://www.hardened-php.net/advisory_192005.78.html" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:213" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_27_sr.html" }, { "type": "WEB", "url": "http://www.openpkg.org/security/OpenPKG-SA-2005.027-php.html" }, { "type": "WEB", "url": "http://www.php.net/release_4_4_1.php" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-831.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-838.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/415291" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/419504/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/15249" }, { "type": "WEB", "url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/2254" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4320" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.